IPSJ SIG Technical Report Vol.2013-ICS-172 No /11/12 1,a), 1,b) Anomaly Detection 1. 1 Nagoya Institute of Technology 1 Presently with Nagoya In

Similar documents
% 69.5% Support Vector Machine(SVM) [7] ALSOK [8] [1], [2][3] RFID [4] [5] [6], 2.2 Anomaly Detection[10] Anomaly Detect

untitled

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

Run-Based Trieから構成される 決定木の枝刈り法

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2


3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

PDA 8) ID ZigBee 10) 7) 12) 10) 11) ( 1) Bluetooth Bluetooth Bluetooth 9) WiFi WiFi NTP (X,Y,Z 3 ) ZigBee 10) Fig. 1 1 Overview of recording, analyzin

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

20mm 63.92% ConstantZoom U 5

知能と情報, Vol.29, No.6, pp

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

2 2.1 SNS web Facebook Google+ SNS web SNS web HITS ANT(Auction Network Trust) web [4] SNS WEB PageRank HITS HITS web authorities, hubs Pagerank web S

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T

DEIM Forum 2010 D Development of a La

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

27 AR

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

JAPAN MARKETING JOURNAL 122 Vol.31 No.22011

2 3 Pockets Pockest Java [6] API (Backtracking) 2 [7] [8] [3] i == Pockets 2.1 C3PV web [9] Pockets [10]Pockets 1 3 C

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

23

IPSJ SIG Technical Report Vol.2018-SE-200 No /12/ Proposal of test description support environment for request acquisition in web appli

Fig. 1 Relative delay coding.

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

SICE東北支部研究集会資料(2017年)

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4

CASP WildCAT WildCAT Java CASP CASP XML Context Query API CASP 1 Fig. 1 Outline Of Framework WildCAT CASP 3. 1.,,,.,

Computer Security Symposium October 2015 DDoS

1 2 3 マルチメディア, 分散, 協調とモバイル (DICOMO2013) シンポジウム 平成 25 年 7 月.,.,,.,. Surrogate Diner,., Surrogate Diner,, 3,, Surrogate Diner. An Interface Agent for Ps


& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

BIT -2-

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

untitled

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions

SEJulyMs更新V7

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2


,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b) - [5], [6] [7] Stahl [8], [9] Fang [1], [11] Itti [12] Itti [13] [7] Fang [1],

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

IPSJ SIG Technical Report Vol.2013-HCI-152 No /3/13 1,a) 1,b) 2,c) / GPS Bluetooth(BT) WiFi BT WiFi 1. Bluetooth WiFi 1 / 1 2 a)

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. TRECVID2012 Instance Search {sak

外国語学部_紀要34号(横書)/11_若山

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

2

Vol.7 6 No Contents June

知識ベースCFD

586 HEMS 1 HEMS Table 1 Various comparisons of Smart Tap HEMS. HEMS HEMS 1 HEMS HEMS PLC Power Line Communication EL HEMS 2) 3) Bluetooth 4),5) ZigBee

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

1(a) (b),(c) - [5], [6] Itti [12] [13] gaze eyeball head 2: [time] [7] Stahl [8], [9] Fang [1], [11] 3 -


dews2004-final.dvi

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

Computer Security Symposium October 2013 Android OS kub


.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

ア 接続 管理 ーバ ー GPS インター ッ S C バス位置情報 バス ー ータ ー バス運行情報 & ニ ース 1 S バス停 ー C コンセン ータ CATV/FTTH GPS Web 2.2 Linux GPS Linux GPS c 2015 Infor

4) 5) ) ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) ( 6 ) )8) ( 1 ) ( 2 ) ( 3 ) ( 200 9) ( 10) 1 2 (

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

_先端融合開発専攻_観音0314PDF用

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S


情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-DBS-162 No /11/26 1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid r

2 3, 4, [1] [2] [3]., [4], () [3], [5]. Mel Frequency Cepstral Coefficients (MFCC) [9] Logan [4] MFCC MFCC Flexer [10] Bogdanov2010 [3] [14],,,

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

2) 3) LAN 4) 2 5) 6) 7) K MIC NJR4261JB0916 8) 24.11GHz V 5V 3kHz 4 (1) (8) (1)(5) (2)(3)(4)(6)(7) (1) (2) (3) (4)

IPSJ SIG Technical Report Vol.2014-CE-126 No /10/11 1,a) Kinect Support System for Romaji Learning through Exercise Abstract: Educatio

GUI(Graphical User Interface) GUI CLI(Command Line Interface) GUI

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

untitled

04.™ƒ”R/’Ô”�/’Xfl©

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

IPSJ SIG Technical Report Vol.2017-SLP-115 No /2/18 1,a) 1 1,2 Sakriani Sakti [1][2] [3][4] [5][6][7] [8] [9] 1 Nara Institute of Scie

3: OFF WEB 4 4: 30 (3) Radio Frequency Identification RFID RFID RFID IC Suica ICOCA PASMO PiTaPa Edy id 1 RFID RFID RFID 1 1mm 2.3 ON/OFF 3 3 (1) (2)

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

Transcription:

1,a), 1,b) Anomaly Detection 1. 1 Nagoya Institute of Technology 1 Presently with Nagoya Institute of Technology a) otsuka.takanobu@nitech.ac.jp b) ito.takayuki@nitech.ac.jp Anomaly Detection 2 3 4 5 6 2. 2.1 [7] ALSOK [8] [1], [2][3] 1

RFID [4] [5] [6], GE QuietCare[9] QuietCare 2.2 Anomaly Detection[11] Anomaly Detection [12] MRI [13] [14] [15] [16] [17] 3. 3.1 ID Zigbee CR2032 6 A B to Zigbee 64bit 65,536 Zigbee Zigbee Zigbee 1. ZigBee 64bit AVR Arduino Arduino PIC 2

1 SDK Arduino OTA(Over The Air API Zigbee Zigebee Zigbee Arduino Ethernet Zigbee Wireless SD Arduino Ethernet POE Ethernet POE Ethernet Wireless SD micro SD Arduino Arduino 2 web web ID(Zigbee 64bit ) Ruby 5 2 64bit web 3 Sensor location Sensing time Sensor ID (64bit adress) 3 Web web PC 3

. Zigbee Digi Corp. Xbee S2B) Motion (Panasonic Corp.Motionsensor Napion ) DC-DC (Linear Technology Corp. LTC3105) Li- (S.T.L Japan Corp. LI-3400SP 3.7V4000mAh) 1 Fig 4 5 3.2 4 6 2 6 4 [10] 75mm 5. 3 6 5m 4. 4.1 e a b c 4

24 1, (1) id id,time 24 1., ( ) P (ID T ime) = P (ID, T ime) P (T ime) (1) 1 1 1 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 12:00 0 1 0 1 1 0 1 0 4 0.571 12:01 0 1 0 0 1 0 1 0 3 0.428 12:02 1 1 1 1 1 0 1 1 7 1 12:03 1 1 0 1 1 1 1 0 6 0.857 12:04 0 1 0 0 1 0 1 0 3 0.428 12:05 1 1 0 1 0 0 1 0 4 0.571 12:06 1 1 0 0 1 0 1 1 5 0.714!"#$%&'()*+,-./0123 *+3 453 6783 6:003 6:303 7:003 7:303 8:003 8:303 9:003 9:303 10:003 10:303 11:003 11:303 8./3 ST'K&A; UVWXYZ'[\ %&'9:;!<1=>%&?@ AB-C8DEFG3 HI'?@J'K&LMNOPFQ RDEF3 1 9 @A#'BC)$./312456)!"7893 :;<='>;$ 7!"#$!"#'()%&*+, -!"=./012$!"#'?)%&*+,!"=./012$ %&$ 9 5. 7 4.2 8 8 5.1 3 2013/7/1 2013/7/6 2013/7/1 2013/7/20 2013/7/1 2013/8/30 2 ) 10 5 5

15 ( 10, 11, 12) 30 (??,??, 15) 60 ( 16, 17, 18) 90 ( 19, 20, 21) 120 ( 22, 23, 24) 12 [ ] 15 13 [ ] 30 10 [ ] 15 14 [ ] 30 11 [ ] 15 5.2 5 10 2 15 [ ] 30 6

16 [ ] 60 20 [ ] 90 17 [ ] 60 21 [ ] 90 18 [ ] 60 22 [ ] 120 19 [ ] 90 23 [ ] 120 7

24 [ ] 120 15 (??) 9 30 15 9 60 ( 18) 15 30 6. [1] http://www.mimamori.net/ [2] (E) vol.125-e, no.6, pp.259-265, June 2005 [3] Vol.102,2003 [4],,, RFID,. IIS,,2009. [5],,,, No,75-760, 2009. [6],,,, Vol.122, 2000. [7]., http://www.secom.co.jp/homesecurity/plan/kodate/ [8] ALSOK., http://www.alsok.co.jp/person/hs price.html [9] Intel-GE Care Innovations, Quiet Care, http://www.seniorlifestyle.com/quiet-care.aspx [10] Takanobu Otsuka, Tatsunosuke Tsuboi, Takayuki Ito, Prototyping and evaluation of a wireless sensor network that aims easy installation,the 26TH INTERNATIONAL CONFERENCE ON INDUS- TRIAL,ENGINEERING & OTHER APPLICATIONS OF APPLIED INTELLIGENT SYSTEMS, 2013. [11] Varun Chandola, Arindam Banerjee, and Vipin Kumar, Anomaly Detection: A Survey, Technical Report,Department of Computer Science and Engineering University of Minnesota, TR- 07-017,2007. [12] Kumar, V. 2005. Parallel and distributed computing for cybersecurity. Distributed Systems Online, IEEE 6, 2010. [13] Spence, C., Parra, L., and Sajda, P. 2001. Detection, synthesis and compression in mammo- graphic image analysis with a hierarchical image probability model. In Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. IEEE Computer Society, Washington, DC, USA, 3. [14] Fujimaki, R., Yairi, T., and Machida, K. 2005. An approach to spacecraft anomaly detection problem using kernel feature space. In Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM Press, New York, NY, USA, 401410. [15] Janakiram, D., Reddy, V., and Kumar, A. 2006. Outlier detection in wireless sensor networks using bayesian belief networks. In First International Conference on Communication SystemSoftware and Middleware. 16. [16] Du. W Fang, L., and Peng, N. 2006. Lad: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66, 7, 874886. [17] Chatzigiannakis, V., Papavassiliou, S., Grammatikou, M., and Maglaris, B. 2006. Hierarchical anomaly detection in distributed large-scale sensor networks. In ISCC 06: Proceedings of the 11th IEEE Symposium on Computers and Communications. IEEE Computer Society, Washington, DC, USA, 761767. [18] Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall,W. Philip Kegelmeyer, SMOTE: Synthetic Minority Over-sampling Technique,Journal of Articial Intelligence Research [19] Rehan Akbani, Stephen Kwek, and Nathalie Japkowicz, Applying Support Vector Machines to Imbalanced Datasets, Lecture Notes in Computer Science Volume 3201, 2004, pp. 39-50.16 (2002) 321357 [20],, JAWS2012 2012 8