Anomaly Detection Applied to ISHM for Thickness Reduction Analysis in Controlled Environments

نویسندگان

چکیده

In this work, three machine learning approaches were evaluated for detecting anomalies in impedance-based structural health monitoring (ISHM – Impedance-based Structural Health Monitoring) of a specimen controlled environment. Supervised, unsupervised, and semi-supervised algorithms chosen to compare them regarding an aluminum beam with failure induced by surface machining on one the faces. After applying algorithms, it was found that, types learning, supervised ones that achieved best accuracy anomalies. On other hand, unsupervised type model did not obtain good results conditions investigated. Thus, can be important technique comparison achievement implementing real anomaly detection ISHM systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection in Cloud Environments

Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf...

متن کامل

Anomaly Detection and Structural Analysis in Industrial Production Environments

Detecting anomalous behavior can be of critical importance in an industrial application context. While modern production sites feature sophisticated alarm management systems, they mostly react to single events. Due to the large number and various types of data sources a unified approach for anomaly detection is not always feasible. One prominent type of data are log entries of alarm messages. T...

متن کامل

Node anomaly detection for homogeneous distributed environments

Identifying the anomalies is a critical task to maintain the uptime of the monitored distributed systems. For this reason, the trace data collected from real time monitors are often provided in form of streams for anomaly detection. Due to the dramatic increase of the scale of modern distributed systems, it is challenging to effectively and efficiently discover the anomalies from a voluminous a...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Anomaly Detection in Dynamic Execution Environments

OF DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Engineering Research and Science

سال: 2022

ISSN: ['2456-1908']

DOI: https://doi.org/10.22161/ijaers.912.46