abnormality detection in a landing operation using hidden markov model

نویسندگان

hasan keyghobadi

data fusion laboratory, electrical engineering department, ferdowsi university, mashhad, iran alireza seyedin

data fusion laboratory, electrical engineering department, ferdowsi university, mashhad, iran

چکیده

the air transport industry is seeking to manage risks in air travels. its main objective is to detect abnormal behaviors in various flight conditions. the current methods have some limitations and are based on studying the risks and measuring the effective parameters. these parameters do not remove the dependency of a flight process on the time and human decisions. in this paper, we used an hmm-based method which is among the main methods of situation assessment in data fusion. this method includes two clustering levels based on data and model. the experiments were conducted with b_777 flight data and the variables considered in the next generation of ads_b. according to the results of this study, our method has high speed and sensitivity in detection of abnormal changes which are effective in the flight parameters when landing. with the dynamic modelling, there is no dependency on time and conditions. the adaptation of this method to other air traffic control systems makes its extension possible to cover all flight conditions.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Abnormality Detection in a Landing Operation Using Hidden Markov Model

The air transport industry is seeking to manage risks in air travels. Its main objective is to detect abnormal behaviors in various flight conditions. The current methods have some limitations and are based on studying the risks and measuring the effective parameters. These parameters do not remove the dependency of a flight process on the time and human decisions. In this paper, we used an HMM...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

tuberculosis surveillance using a hidden markov model

background: routinely collected data from tuberculosis surveillance system can be used to investigate and monitor the irregularities and abrupt changes of the disease incidence. we aimed at using a hidden markov model in order to detect the abnormal states of pulmonary tuberculosis in iran. methods: data for this study were the weekly number of newly diagnosed cases with sputum smear-positive p...

متن کامل

Introducing Busy Customer Portfolio Using Hidden Markov Model

Due to the effective role of Markov models in customer relationship management (CRM), there is a lack of comprehensive literature review which contains all related literatures. In this paper the focus is on academic databases to find all the articles that had been published in 2011 and earlier. One hundred articles were identified and reviewed to find direct relevance for applying Markov models...

متن کامل

Modelling Intrusion Detection System using Hidden Markov Model: A Review

Information security has become a major concern to various businesses and organizations and requires an intelligent security system that can automatically detect the intrusions. An Intrusion Detection System (IDS) is used for this purpose. An Intrusion Detection System has become popular tool for observing patterns of activities in user accounts and detects malicious behaviour. Hidden Markov Mo...

متن کامل

Credit Card Fraud Detection Using Hidden Markov Model-A Survey

Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of computer and robotics

جلد ۱۰، شماره ۱، صفحات ۳۱-۳۷

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023