Anomaly Detection Applied to ISHM for Thickness Reduction Analysis in Controlled Environments
نویسندگان
چکیده
In this work, three machine learning approaches were evaluated for detecting anomalies in impedance-based structural health monitoring (ISHM – Impedance-based Structural Health Monitoring) of a specimen controlled environment. Supervised, unsupervised, and semi-supervised algorithms chosen to compare them regarding an aluminum beam with failure induced by surface machining on one the faces. After applying algorithms, it was found that, types learning, supervised ones that achieved best accuracy anomalies. On other hand, unsupervised type model did not obtain good results conditions investigated. Thus, can be important technique comparison achievement implementing real anomaly detection ISHM systems.
منابع مشابه
Anomaly Detection in Cloud Environments
Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf...
متن کاملAnomaly Detection and Structural Analysis in Industrial Production Environments
Detecting anomalous behavior can be of critical importance in an industrial application context. While modern production sites feature sophisticated alarm management systems, they mostly react to single events. Due to the large number and various types of data sources a unified approach for anomaly detection is not always feasible. One prominent type of data are log entries of alarm messages. T...
متن کاملNode anomaly detection for homogeneous distributed environments
Identifying the anomalies is a critical task to maintain the uptime of the monitored distributed systems. For this reason, the trace data collected from real time monitors are often provided in form of streams for anomaly detection. Due to the dramatic increase of the scale of modern distributed systems, it is challenging to effectively and efficiently discover the anomalies from a voluminous a...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملAnomaly Detection in Dynamic Execution Environments
OF DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Engineering Research and Science
سال: 2022
ISSN: ['2456-1908']
DOI: https://doi.org/10.22161/ijaers.912.46