| Literature DB >> 30181441 |
Zhenhao Yu1,2, Fang Liu3,4, Yinquan Yuan5, Sihan Li6, Zhengying Li7,8.
Abstract
To detect perimeter intrusion accurately and quickly, a stream computing technology was used to improve real-time data processing in perimeter intrusion detection systems. Based on the traditional density-based spatial clustering of applications with noise (T-DBSCAN) algorithm, which depends on manual adjustments of neighborhood parameters, an adaptive parameters DBSCAN (AP-DBSCAN) method that can achieve unsupervised calculations was proposed. The proposed AP-DBSCAN method was implemented on a Spark Streaming platform to deal with the problems of data stream collection and real-time analysis, as well as judging and identifying the different types of intrusion. A number of sensing and processing experiments were finished and the experimental data indicated that the proposed AP-DBSCAN method on the Spark Streaming platform exhibited a fine calibration capacity for the adaptive parameters and the same accuracy as the T-DBSCAN method without the artificial setting of neighborhood parameters, in addition to achieving good performances in the perimeter intrusion detection systems.Entities:
Keywords: AP-DBSCAN; FBGs signal processing; perimeter security monitoring; spark streaming
Year: 2018 PMID: 30181441 PMCID: PMC6163731 DOI: 10.3390/s18092937
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Adaptive parameters density-based spatial clustering of applications with noise (AP-DBSCAN) clustering analysis based on the Spark Streaming mechanism.
Figure 2The workflows of AP-DBSCAN implementation on Spark Streaming.
Figure 3Architecture of the intrusion monitoring and identification system.
Figure 4Three types of railing intrusion. (a) Knocking the railing; (b) shaking the railing; and, (c) climbing on the railing.
Figure 5AP-DBSCAN results of three kinds of railing intrusion behaviors.
Comparison of calculated data by two methods for railing sensors.
| Data Set | Clustering Algorithm | |
|---|---|---|
| T-DBSCAN | AP-DBSCAN | |
| C1 | 119 | 119 |
| C2 | 113 | 113 |
| C3 | 111 | 111 |
| C4 | 121 | 121 |
| Number of clusters | 4 | 4 |
Comparisons of misclassified patterns, computation time and the error rate (ER) for different sizes of data sets for railing sensors. A: K-means; B: Fuzzy C-means (FCM); C: AP-DBSCAN.
| Data Size (kB) | Misclassified Patterns (kB) | Computation Time (s) | ER (%) | ||||||
|---|---|---|---|---|---|---|---|---|---|
| A | B | C | A | B | C | A | B | C | |
| 150 | 12 | 3 |
| 10 | 10 |
| 8.0 | 2.0 |
|
| 185 | 15 | 4 |
| 27 | 29 |
| 8.1 | 2.1 |
|
| 286 | 26 | 10 |
| 43 | 44 |
| 9.1 | 3.5 |
|
| 768 | 59 | 24 |
| 391 | 401 |
| 7.7 | 3.1 |
|
| 1024 | 93 | 32 |
| 578 | 593 |
| 9.1 | 3.2 |
|
| 1625 | 131 | 49 |
| 1601 | 1701 |
| 8.1 | 3.0 |
|
Figure 6Four types of underground fence intrusion. (a) Walking on the buried cable; (b) walking parallel to the cable at a distance of 20 cm; (c) walking parallel to the cable at a distance of 40 cm; and, (d) walking parallel to the cable at a distance of 60 cm.
Figure 7AP-DBSCAN results of four kinds of buried intrusion behaviors.
Comparison of calculated data by two methods for buried sensors.
| Data Set | Clustering Algorithm | |
|---|---|---|
| T-DBSCAN | AP-DBSCAN | |
| C1 | 116 | 116 |
| C2 | 115 | 115 |
| C3 | 115 | 115 |
| C4 | 115 | 115 |
| C5 | 114 | 114 |
| Number of clusters | 5 | 5 |
Comparisons of misclassified patterns, computation time and the error rate (ER) for different sizes of data sets for buried sensors. A: K-means; B: FCM; C: AP-DBSCAN.
| Data Size (kB) | Misclassified Patterns (kB) | Computation Time (s) | ER (%) | ||||||
|---|---|---|---|---|---|---|---|---|---|
| A | B | C | A | B | C | A | B | C | |
| 131 | 10 | 5 |
| 9 | 9 |
| 7.6 | 3.8 |
|
| 254 | 23 | 15 |
| 40 | 42 |
| 9.1 | 5.9 |
|
| 552 | 46 | 27 |
| 287 | 301 |
| 8.3 | 4.9 |
|
| 783 | 62 | 34 |
| 399 | 420 |
| 7.9 | 4.3 |
|
| 1131 | 101 | 81 |
| 583 | 606 |
| 8.9 | 7.1 |
|
| 1721 | 140 | 121 |
| 1721 | 1835 |
| 8.1 | 7.0 |
|
Figure 8Time response of AP-DBSCAN on Spark Streaming.
Figure 9Computing times by AP-DBSCAN and AP-DBSCAN on Spark Streaming.