[go: up one dir, main page]

Thill et al., 2017 - Google Patents

Time series anomaly detection with discrete wavelet transforms and maximum likelihood estimation

Thill et al., 2017

View PDF
Document ID
12954301965468875312
Author
Thill M
Konen W
Bäck T
Publication year
Publication venue
Intern. Conference on Time Series (ITISE)

External Links

Snippet

A new algorithm, based on the Discrete Wavelet Transform (DWT), for unsupervised anomaly detection in time series is introduced in this paper. The approach is based on using maximum likelihood estimation (MLE) on the DWT of time series. On a diverse set of 158 …
Continue reading at blogs.gm.fh-koeln.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00496Recognising patterns in signals and combinations thereof
    • G06K9/00536Classification; Matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis

Similar Documents

Publication Publication Date Title
Thill et al. Time series anomaly detection with discrete wavelet transforms and maximum likelihood estimation
Sadreazami et al. Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems
US11886994B1 (en) System and method for anomaly detection in dynamically evolving data using random neural network decomposition
Krithivasan et al. Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN)
US11150974B2 (en) Anomaly detection using circumstance-specific detectors
US9245235B2 (en) Integrated approach to model time series dynamics in complex physical systems
Ahmed et al. Multivariate online anomaly detection using kernel recursive least squares
JP6609050B2 (en) Anomalous fusion in temporal causal graphs
US9386030B2 (en) System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
US10719768B1 (en) System and method for detecting an undesirable event
Sun et al. An improved k-nearest neighbours method for traffic time series imputation
Chan et al. Robust recursive eigendecomposition and subspace-based algorithms with application to fault detection in wireless sensor networks
KR102079359B1 (en) Process Monitoring Device and Method using RTC method with improved SAX method
WO2018211721A1 (en) Abnormal information estimation device, abnormal information estimation method, and program
Zerbini et al. Wavelet against random forest for anomaly mitigation in software-defined networking
Zohrevand et al. Should i raise the red flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms
Money et al. Sparse online learning with kernels using random features for estimating nonlinear dynamic graphs
Dai et al. Distance-based outliers method for detecting disease outbreaks using social media
Suboh et al. Anomaly detection with machine learning in the presence of extreme value-a review paper
Alqahtani et al. A novel decentralized analytical methodology for cyber physical networks attack detection
Fahrnberger Outlier removal for the reliable condition monitoring of telecommunication services
Jirachan et al. Applying KSE-test and K-means clustering towards scalable unsupervised intrusion detection
Thuy et al. A novel method for time series anomaly detection based on segmentation and clustering
Qader et al. Fault classification system for computer networks using fuzzy probabilistic neural network classifier (fpnnc)
Othon et al. Evaluation of the removal of anomalies in data collected by sensors