75,264 research outputs found

    Application of a bio-inspired anomaly detection algorithm for unsupervised SHM of a historic masonry church

    Get PDF
    Variations in dynamic properties are commonly used in Structural Health Monitoring to assess the conditions of a structural system, being these parameters sensitive to damage-induced changes. Yet, such variations can also be due to changes in environmental parameters, like fluctuations in temperature, humidity, etc. By performing a continuous monitoring, the correlation between those factors appears and their variations, if no damage exists, result in a cyclic phenomenon. Negative selection, a bio-inspired classification algorithm, can be exploited to distinguish anomalous from normal changes, thus eliminating the influence of environmental effects on the assessment of the structural condition. This algorithm can be trained to relate specific extracted features (e.g. modal frequencies) and other monitored parameters (e.g. environmental conditions), allowing to identify damage when the registered value oversteps the confidence interval defined around the predicted value. Negative selection draws inspiration from the mammalian immune system, whose physiology demonstrates the efficiency of this process in discriminating non-self elements, despite the restricted number of receptors available to face a vast amount of aggressors. In this paper, a negative-selection algorithm based on a non-random strategy for detector generation is optimized and tested on the monitoring data of a prominent monument of the Portuguese architecture.- (undefined

    Real valued negative selection for anomaly detection in wireless ad hoc networks

    Get PDF
    Wireless ad hoc network is one of the network technologies that have gained lots of attention from computer scientists for the future telecommunication applications. However it has inherits the major vulnerabilities from its ancestor (i.e., the fixed wired networks) but cannot inherit all the conventional intrusion detection capabilities due to its features and characteristics. Wireless ad hoc network has the potential to become the de facto standard for future wireless networking because of its open medium and dynamic features. Non-infrastructure network such as wireless ad hoc networks are expected to become an important part of 4G architecture in the future. In this paper, we study the use of an Artificial Immune System (AIS) as anomaly detector in a wireless ad hoc network. The main goal of our research is to build a system that can learn and detect new and unknown attacks. To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network

    Identification of MHC Class II Binders/ Non-binders using Negative Selection Algorithm

    Get PDF
    The identification of major histocompatibility complex (MHC) class-II restricted peptides is an important goal in human immunological research leading to peptide based vaccine design. These MHC class–II peptides are predominantly recognized by CD4+ T-helper cells, which when turned on, have profound immune regulatory effects. Thus, prediction of such MHC class-II binding peptides is very helpful towards epitope-based vaccine design. HLA-DR proteins were found to be associated with autoimmune diseases e.g. HLA-DRB1*0401 with rheumatoid arthritis. It is important for the treatment of autoimmune diseases to determine which peptides bind to MHC class II molecules. The experimental methods for identification of these peptides are both time consuming and cost intensive. Therefore, computational methods have been found helpful in classifying these peptides as binders or non-binders. We have applied negative selection algorithm, an artificial immune system approach to predict MHC class–II binders and non-binders. For the evaluation of the NSA algorithm, five fold cross validation has been used and six MHC class–II alleles have been taken. The average area under ROC curve for HLA-DRB1*0301, DRB1*0401, DRB1*0701, DRB1*1101, DRB1*1501, DRB1*1301 have been found to be 0.75, 0.77, 0.71, 0.72, and 0.69, and 0.84 respectively indicating good predictive performance for the small training set

    A methodology for the generation of efficient error detection mechanisms

    Get PDF
    A dependable software system must contain error detection mechanisms and error recovery mechanisms. Software components for the detection of errors are typically designed based on a system specification or the experience of software engineers, with their efficiency typically being measured using fault injection and metrics such as coverage and latency. In this paper, we introduce a methodology for the design of highly efficient error detection mechanisms. The proposed methodology combines fault injection analysis and data mining techniques in order to generate predicates for efficient error detection mechanisms. The results presented demonstrate the viability of the methodology as an approach for the development of efficient error detection mechanisms, as the predicates generated yield a true positive rate of almost 100% and a false positive rate very close to 0% for the detection of failure-inducing states. The main advantage of the proposed methodology over current state-of-the-art approaches is that efficient detectors are obtained by design, rather than by using specification-based detector design or the experience of software engineers

    Immunotronics - novel finite-state-machine architectures with built-in self-test using self-nonself differentiation

    Get PDF
    A novel approach to hardware fault tolerance is demonstrated that takes inspiration from the human immune system as a method of fault detection. The human immune system is a remarkable system of interacting cells and organs that protect the body from invasion and maintains reliable operation even in the presence of invading bacteria or viruses. This paper seeks to address the field of electronic hardware fault tolerance from an immunological perspective with the aim of showing how novel methods based upon the operation of the immune system can both complement and create new approaches to the development of fault detection mechanisms for reliable hardware systems. In particular, it is shown that by use of partial matching, as prevalent in biological systems, high fault coverage can be achieved with the added advantage of reducing memory requirements. The development of a generic finite-state-machine immunization procedure is discussed that allows any system that can be represented in such a manner to be "immunized" against the occurrence of faulty operation. This is demonstrated by the creation of an immunized decade counter that can detect the presence of faults in real tim

    Automatic annotation for weakly supervised learning of detectors

    Get PDF
    PhDObject detection in images and action detection in videos are among the most widely studied computer vision problems, with applications in consumer photography, surveillance, and automatic media tagging. Typically, these standard detectors are fully supervised, that is they require a large body of training data where the locations of the objects/actions in images/videos have been manually annotated. With the emergence of digital media, and the rise of high-speed internet, raw images and video are available for little to no cost. However, the manual annotation of object and action locations remains tedious, slow, and expensive. As a result there has been a great interest in training detectors with weak supervision where only the presence or absence of object/action in image/video is needed, not the location. This thesis presents approaches for weakly supervised learning of object/action detectors with a focus on automatically annotating object and action locations in images/videos using only binary weak labels indicating the presence or absence of object/action in images/videos. First, a framework for weakly supervised learning of object detectors in images is presented. In the proposed approach, a variation of multiple instance learning (MIL) technique for automatically annotating object locations in weakly labelled data is presented which, unlike existing approaches, uses inter-class and intra-class cue fusion to obtain the initial annotation. The initial annotation is then used to start an iterative process in which standard object detectors are used to refine the location annotation. Finally, to ensure that the iterative training of detectors do not drift from the object of interest, a scheme for detecting model drift is also presented. Furthermore, unlike most other methods, our weakly supervised approach is evaluated on data without manual pose (object orientation) annotation. Second, an analysis of the initial annotation of objects, using inter-class and intra-class cues, is carried out. From the analysis, a new method based on negative mining (NegMine) is presented for the initial annotation of both object and action data. The NegMine based approach is a much simpler formulation using only inter-class measure and requires no complex combinatorial optimisation but can still meet or outperform existing approaches including the previously pre3 sented inter-intra class cue fusion approach. Furthermore, NegMine can be fused with existing approaches to boost their performance. Finally, the thesis will take a step back and look at the use of generic object detectors as prior knowledge in weakly supervised learning of object detectors. These generic object detectors are typically based on sampling saliency maps that indicate if a pixel belongs to the background or foreground. A new approach to generating saliency maps is presented that, unlike existing approaches, looks beyond the current image of interest and into images similar to the current image. We show that our generic object proposal method can be used by itself to annotate the weakly labelled object data with surprisingly high accuracy
    corecore