최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국지반신소재학회논문집 = Journal of the Korean Geosynthetics Society, v.22 no.1, 2023년, pp.67 - 74
최준혁 (Department of Industrial Management Engineering, Pohang University of Science and Technology) , 김용진 (Smart Geotech) , 조준휘 (Department of Regional Infrastructure Engineering, Kangwon National University) , 정우철 (Department of Regional Infrastructure Engineering, Kangwon National University) , 석송희 (Department of Regional Infrastructure Engineering, Kangwon National University) , 최송 (Department of Regional Infrastructure Engineering, Kangwon National University) , 김용성 (Department of Regional Infrastructure Engineering, Kangwon National University) , 지봉준 (Department of Regional Infrastructure Engineering, Kangwon National University)
In order to monitor the stability of slopes, research on data-based slope failure prediction and early warning is increasing. However, most papers overlook the quality of data. Poor data quality can cause problems such as false alarms. Therefore, this paper proposes a two-step hybrid approach consis...
Bosman, H. H., Iacca, G., Tejada, A., Wortche, H. J. and Liotta,?A. (2017), "Spatial anomaly detection in sensor networks using?neighborhood information", Information Fusion, Vol.33, pp.41-56.
Chen, Z., Yeo, C. K., Lee, B. S. and Lau, C. T. (2018),?"Autoencoder-based network anomaly detection", In 2018 Wireless telecommunications symposium (WTS), Arizona, pp.1-5.
Dereszynski, E. W. and Dietterich, T. G. (2011), "Spatiotemporal models for data-anomaly detection in dynamic?environmental monitoring campaigns", ACM Transactions on?Sensor Networks, Vol.9, No.1, pp.1-36.
Duffield, N., Haffner, P., Krishnamurthy, B. and Ringberg,?H. (2009), "Rule-based anomaly detection on IP flows", In?IEEE INFOCOM 2009, Rio de Janeiro, pp.424-432.
Hochreiter, S. and Schmidhuber, J. (1997), "Long short-term?memory", Neural computation, Vol.9, No.8, pp.1735-1780.
Ilgun, K. (1992), A real-time intrusion detection system for?unix, Master Thesis, University of California Santa Barbara.
Jesus, G., Casimiro, A. and Oliveira, A. (2017), "A survey?on data quality for dependable monitoring in wireless sensor?networks", Sensors, Vol.17, No.9, pp.2010.
Lane, T. and Brodley, C. E. (1997), "An application of?machine learning to anomaly detection", In Proc. of the 20th?national information systems security conference, Baltimore,?Vol.377, pp.366-380.
Li, Y. and Parker, L. E. (2014), "Nearest neighbor imputation?using spatial-temporal correlations in wireless sensor networks", Information Fusion, Vol.15, pp.64-79.
Liu, H., Shah, S. and Jiang, W. (2004), "On-line outlier?detection and data cleaning", Computers & Chemical Engineering, Vol.28, No.9, pp.1635-1647.
Liu, P., Sun, X., Han, Y., He, Z., Zhang, W. and Wu, C.?(2022), "Arrhythmia classification of LSTM autoencoder?based on time series anomaly detection", Biomedical Signal?Processing and Control, Vol.71, Part B, 103228.
Mahalanobis, P. C. (1936), "On the generalised distance in?statistics", In Proc. of the National Institute of Science of?India, Kolkata, Vol.12, pp.49-55.
Mori, A., Subramanian, S. S., Ishikawa, T. and Komatsu, M.?(2017), "A case study of a cut slope failure influenced by?snowmelt and rainfall", Procedia engineering, Vol.189,?pp.533-538.
Nassif, A. B., Talib, M. A., Nasir, Q. and Dakalbab, F. M.?(2021), "Machine learning for anomaly detection: A systematic review", Ieee Access, Vol.9, pp.78658-78700.
Omar, S., Ngadi, A. and Jebur, H. H. (2013), "Machine?learning techniques for anomaly detection: an overview",?International Journal of Computer Applications, Vol.79,?No.2.
Rabatel, J., Bringay, S. and Poncelet, P. (2011), "Anomaly?detection in monitoring sensor data for preventive maintenance", Expert Systems with Applications, Vol.38, No.6,?pp.7003-7015.
Rassam, M. A., Maarof, M. A. and Zainal, A. (2014), "Adaptive and online data anomaly detection for wireless sensor?systems", Knowledge-Based Systems, Vol.60, pp.44-57.
Rumelhart, D. E., Hinton, G. E. and Williams, R. J. (1986),?"Learning representations by back-propagating errors", Nature,?Vol.323, No.6088, pp.533-536.
Teh, H. Y., Kempa-Liehr, A. W. and Wang, K. I. K. (2020),?"Sensor data quality: A systematic review", Journal of Big?Data, Vol.7, No.1, pp.1-49.
Zhang, H., Liu, J. and Pang, A. C. (2018), "A Bayesian?network model for data losses and faults in medical body?sensor networks", Computer Networks, Vol.143, pp.166-175.
Zhang, L. L., Zhang, J., Zhang, L. M. and Tang, W. H.?(2011), "Stability analysis of rainfall-induced slope failure:?a review", Proc. of the Institution of Civil Engineers-Geotechnical Engineering, Vol.164, No.5, pp.299-316.
Zhang, Y., Meratnia, N. and Havinga, P. J. (2010), "Ensuring?high sensor data quality through use of online outlier?detection techniques", International Journal of Sensor Networks, Vol.7, No.3, pp.141-151.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.