1,260 research outputs found

    Detection of emerging faults on industrial gas turbines using extended Gaussian mixture models

    Get PDF
    The paper extends traditional Gaussian Mixture Model (GMM) techniques to provide recognition of operational states and detection of emerging faults for industrial or complex systems. A Variational Bayesian (VB) method allows a GMM to cluster with its Mixture Components (MCs) to facilitate the extraction of steady-state operational behaviour — this is recognised as being a primary factor in reducing the susceptibility of alternative prognostic/diagnostic techniques which can initiate false-alarms resulting from control set-point and load changes. Furthermore, a GMM with an Outlier Component (GMMOC) is discussed and applied for direct fault detection. To demonstrate the efficacy of the proposed techniques, real-time measurements from operational Industrial Gas Turbines (IGTs) show that the resulting VBGMM facilitates the selection of the number of required MCs to cluster the data, and thereby provide essential input for operational signature recognition. Moreover, GMMOC is shown to facilitate the early detection of emerging faults. An advantage of the VBGMM over traditional pre-defined thresholds is the extraction of steady-state data during both full- and part-load cases, and a primary advantage of the GMMOC method is its applicability for novelty detection when there is a lack of prior knowledge of fault patterns. Results based on measurements taken from IGTs operating in the field are therefore also included which show that the techniques provide an integrated pre-processing, benchmarking and novelty/fault detection methodology

    SUSIG: an on-line signature database, associated protocols and benchmark results

    Get PDF
    We present a new online signature database (SUSIG). The database consists of two parts that are collected using different pressure-sensitive tablets ( one with and the other without an LCD display). A total of 100 people contributed to each part, resulting in a database of more than 3,000 genuine signatures and 2,000 skilled forgeries. The genuine signatures in the database are real signatures of the contributors. In collecting skilled forgeries, forgers were shown the signing process on the monitor and were given a chance to practice. Furthermore, for a subset of the forgeries ( highly skilled forgeries), this animation was mapped onto the LCD screen of the tablet so that the forgers could trace over the mapped signature. Forgers in this group were also informed of how close they were to the reference signature, so that they could improve their forgery quality. We describe the signature acquisition process and several verification protocols for this database. We also report the performance of a state-of-the-art signature verification system using the associated protocols. The results show that the highly skilled forgery set is significantly more difficult compared to the skilled forgery set, providing researchers with challenging forgeries. The database is available through http://icproxy.sabanciuniv.edu:215

    In-home monitoring system based on WiFi fingerprints for ambient assisted living

    Get PDF
    This paper presents an in-home monitoring system based on WiFi fingerprints for Ambient Assisted Living. WiFi fingerprints are used to continuously locate a patient at the different rooms in her/his home. The experiments performed provide a correctly location rate of 96% in the best case of all studied scenarios. The behavior obtained by location monitoring allows to detect anomalous behavior such as long stays in rooms out of the common schedule. The main characteristics of the presented system are: a) it is robust enough to work without an own WiFi access point, which in turn means a very affordable solution; b) low obtrusiveness, as it is based on the use of a mobile phone; c) highly interoperable with other wireless connections (bluetooth, RFID) present in current mobile phones; d) alarms are triggered when any anomalous behavior is detected

    Source Anonymization of Digital Images: A Counter–Forensic Attack on PRNU based Source Identification Techniques

    Get PDF
    A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique to mislead this PRNU sensor noise pattern based source–identification, by using a median filter to suppress PRNU noise in an image, iteratively. Our experimental results prove that the proposed method achieves considerably higher degree of source anonymity, measured as an inverse of Peak–to–Correlation Energy (PCE) ratio, as compared to the state–of–the–art

    Providing Databases for Different Indoor Positioning Technologies: Pros and Cons of Magnetic Field and Wi-Fi Based Positioning

    Get PDF
    Localization is one of the main pillars for indoor services. However, it is still very difficult for the mobile sensing community to compare state-of-the-art indoor positioning systems due to the scarcity of publicly available databases. To make fair and meaningful comparisons between indoor positioning systems, they must be evaluated in the same situation, or in the same sets of situations. In this paper, two databases are introduced for studying the performance of magnetic field and Wi-Fi fingerprinting based positioning systems in the same environment (i.e., indoor area). The “magnetic” database contains more than 40,000 discrete captures (270 continuous samples), whereas the “Wi-Fi” one contains 1,140 ones. The environment and both databases are fully detailed in this paper. A set of experiments is also presented where two simple but effective baselines have been developed to test the suitability of the databases. Finally, the pros and cons of both types of positioning techniques are discussed in detail.The authors gratefully acknowledge funding from the European Union through the GEO-C project (H2020-MSCA-ITN- 2014, Grant Agreement no. 642332, http://www.geo-c.eu/). The authors also gratefully acknowledge funding from the Spanish Ministry of Economy and Competitiveness through the “Metodolog´ıas avanzadas para el diseno, desarrollo, eval- ˜ uacion e integraci ´ on de algoritmos de localizaci ´ on en inte- ´ riores” project (Proyectos I+D Excelencia, codigo TIN2015- ´ 70202-P) and the “Red de Posicionamiento y Navegacion en ´ Interiores” network (Redes de Excelencia, codigo TEC2015- ´ 71426-REDT). The authors would like to thank all the current and past members of the Geospatial Technologies Research Group and Ubik Geospatial Solutions S.L. for their valuable help in creating the SmartUJI platform and providing us with the supporting services that allowed integrating the existing GIS services in the applications developed to create both databases
    corecore