Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Bayesian Belief Networks in Anomaly Detection, Fault Diagnosis & Failure.

Slides:



Advertisements
Similar presentations
Autonomic Scaling of Cloud Computing Resources
Advertisements

VSE Corporation Proprietary Information
June 15, 2005 Integration of Diagnostics and Prognostics.
ICT IGCSE Expert Systems.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 A Preamble into Aligning Systems Engineering and Information Security Risk Dr. Craig.
Robot Localization Using Bayesian Methods
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Estimating Missing Parameters in a Distributed Real-Time System: Anti-Lock.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
1 © 1998 HRL Laboratories, LLC. All Rights Reserved Construction of Bayesian Networks for Diagnostics K. Wojtek Przytula: HRL Laboratories & Don Thompson:
4/27/2006 ELEC7250: White 1 ELEC7250 VLSI Testing: Final Project Andrew White.
4/20/2006ELEC7250: Alexander 1 LOGIC SIMULATION AND FAULT DIAGNOSIS BY JINS DAVIS ALEXANDER ELEC 7250 PRESENTATION.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering On-line Alert Systems for Production Plants A Conflict Based Approach.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 580 Artificial Intelligence Ch.6 [P]: Reasoning Under Uncertainty Sections.
Fitting models to data. Step 5) Express the relationships mathematically in equations Step 6)Get values of parameters Determine what type of model you.
CSE 322: Software Reliability Engineering Topics covered: Architecture-based reliability analysis.
EXPERT SYSTEMS Part I.
August 7, 2003 Sensor Network Modeling and Simulation in Ptolemy II Philip Baldwin University of Virginia Motivation With.
Evaluation of Bayesian Networks Used for Diagnostics[1]
Hazards Analysis & Risks Assessment By Sebastien A. Daleyden Vincent M. Goussen.
An example of a data mining project. Problem Detect and explain faults of a continuous pulp digester Faults: drops in the output quality of the digester.
Network Management 1 School of Business Eastern Illinois University © Abdou Illia, Spring 2006 (Week 15, Friday 4/21/2006) (Week 16, Monday 4/24/2006)
Speed and Direction Prediction- based localization for Mobile Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI Computer Science Department.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Traffic Classification through Simple Statistical Fingerprinting M. Crotti, M. Dusi, F. Gringoli, L. Salgarelli ACM SIGCOMM Computer Communication Review,
Overview G. Jogesh Babu. Probability theory Probability is all about flip of a coin Conditional probability & Bayes theorem (Bayesian analysis) Expectation,
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 FPGA: Field Programmable Gate Arrays Vincent Giannone Mentor: Dr. Janusz.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Behavior Based Robotics: A Wall Following Behavior Arun Mahendra - Dept. of Math, Physics & Engineering, Tarleton State University Mentor: Dr. Mircea Agapie.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Nicholas Alteen Evan McKeon Michael Humphries Computer Science Program.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Near Field Communication: Experiments with Android Michael Humphries.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Introduction to MCMC and BUGS. Computational problems More parameters -> even more parameter combinations Exact computation and grid approximation become.
Distributed Computation in MANets Robot swarm developed by James Rice University.
The Science of Prediction Location Intelligence Conference April 4, 2006 How Next Generation Traffic Services Will Impact Business Dr. Oliver Downs, Chief.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
1 Software Reliability Assurance for Real-time Systems Joel Henry, Ph.D. University of Montana NASA Software Assurance Symposium September 4, 2002.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Fault Prediction with Particle Filters by David Hatfield mentors: Dr.
Using Virtual Links to Discover Network Topology Brett Holbert, Thomas F. La Porta Topology Discovery -Network topology may only be partially known -Want.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
I Robot.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
METU Informatics Institute Min720 Pattern Classification with Bio-Medical Applications Lecture notes 9 Bayesian Belief Networks.
Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets Lynne E. Parker Autonomous Robots, 2002 Yousuf Ahmad Distributed Information.
Prediction statistics Prediction generally True and false, positives and negatives Quality of a prediction Usefulness of a prediction Prediction goes Bayesian.
Zhong Zhou +, Zheng Peng +, Jun-Hong Cui +, Zaihan Jiang * Handling Triple Hidden Terminal Problems for Multichannel MAC in Long-Delay Underwater Sensor.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
SOFTWARE METRICS Software Metrics :Roadmap Norman E Fenton and Martin Neil Presented by Santhosh Kumar Grandai.
Discovery and Systems Health Technical Area NASA Ames Research Center - Computational Sciences Division Automated Diagnosis Sriram Narasimhan University.
Abdul-Rahman Elshafei – ID  Introduction  SLAT & iSTAT  Multiplet Scoring  Matching Passing Tests  Matching Complex Failures  Multiplet.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 RFID Security Nicholas Alteen Computer Science Program Florida Gulf.
Robotics in Education How robotics can help students engage in STEAM learning.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Remotely Controlled Robotic Arm Kyle Rosier Adrian Saldivar Computer.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
ITEC 1010 Information and Organizations Chapter V Expert Systems.
REU 2009-Traffic Analysis of IP Networks Daniel S. Allen, Mentor: Dr. Rahul Tripathi Department of Computer Science & Engineering Data Streams Data streams.
Unique Packet Identifiers for Multipoint Monitoring of QoS Parameters Juraj Giertl, František Jakab Gorazd Baldovský, Ján Genči.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Some Great Open Source Intrusion Detection Systems (IDSs)
1 1)Bayes’ Theorem 2)MAP, ML Hypothesis 3)Bayes optimal & Naïve Bayes classifiers IES 511 Machine Learning Dr. Türker İnce (Lecture notes by Prof. T. M.
Software Defects Cmpe 550 Fall 2005
Introduction Characteristics Advantages Limitations
Statistical Data Analysis
How to Make (Almost) Anything Electrical Unit 3
Analysis of RF Circuit Degradation to Ensure Circuit Security
Statistical Data Analysis
Prepared by: Mahmoud Rafeek Al-Farra
Presentation transcript:

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Bayesian Belief Networks in Anomaly Detection, Fault Diagnosis & Failure Prognostics Joseph Gehring Anthony Hadding Santiago Salazar Mentor: Dr. Janusz Zalewski FGCU, April 2012

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 What is Bayesian Belief Network? Bayesian Belief Network is a graphical method of data analysis employing an algorithm based on the Bayes Theorem. It allows reasoning about data by deriving conclusions about causes of system behavior based on its symptoms.

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Bayesian Belief Networks Use data for known occurrences to determine probabilities of unknown conditions. These relationships can be created in a network, with each relationship building on the probabilities known before. Software tools help represent complex relationships in a simple, easy-to-use format

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Project Description Use Bayesian Belief Networks to analyze data from three different sources: Wireshark – to reason about network security based on anomaly detection Solar Power Plant – to diagnose device faults NASA Engine Degradation – to predict failures

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Wireshark Data Set Network packet information Analyzed for threats and anomalies Malformed packets Unknown source Broadcast destination Combinations of these Other packet information also analyzed How protocol influences packet length

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Wireshark Data Set

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Solar Plant Data Set Analyzed a month worth of solar plant sensor data, collected every 15 minutes Temperature, Wind Speed, Voltage, Current, Power, Solar Energy Analyzed for sensor faults and failures Failed temperature sensor Failed wind speed sensor

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Solar Plant Data Set

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Turbofan Engine Degradation Simulation Data 21 sensors, plus other values 100 different engines in the same network Failure prediction, using sensor input to determine Remaining Useful Life based on previously determined average life NASA Data Set

Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 NASA Data Set