Anomaly Detection Based on Multidimensional Data Processing for Protecting Vital Devices in 6G Enabled Massive IIoT

Author(s):  
Guangjie Han ◽  
Juntao Tu ◽  
Li Liu ◽  
Miguel Martinez-Garcia ◽  
Yan Peng
Author(s):  
E. E. Akimkina

The problems of structuring of indicators in multidimensional data cubes with their subsequent processing with the help of end-user tools providing multidimensional visualization and data management are analyzed; the possibilities of multidimensional data processing technologies for managing and supporting decision making at a design and technological enterprise are shown; practical recommendations on the use of domestic computer environments for the structuring and visualization of multidimensional data cubes are given.


2013 ◽  
Vol 312 ◽  
pp. 714-718
Author(s):  
Zi Qi Zhao ◽  
Xiao Jun Ye ◽  
Chun Ping Li

Multidimensional clustering analysis algorithm is for a class of cell-based clustering method of processing speed quickly, time efficiency, mainly to CLIQUE representatives. With time efficient clustering algorithm CLIQUE algorithm can achieve multi-dimensional k - Anonymous the algorithm KLIQUE, KLIQUE algorithm based CLIQUE efficiently retained their CLIQUE algorithm time complexity of features, can play the CLIQUE multidimensional data for the large amount of data processing advantage.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Xuguang Liu

Aiming at the anomaly detection problem in sensor data, traditional algorithms usually only focus on the continuity of single-source data and ignore the spatiotemporal correlation between multisource data, which reduces detection accuracy to a certain extent. Besides, due to the rapid growth of sensor data, centralized cloud computing platforms cannot meet the real-time detection needs of large-scale abnormal data. In order to solve this problem, a real-time detection method for abnormal data of IoT sensors based on edge computing is proposed. Firstly, sensor data is represented as time series; K-nearest neighbor (KNN) algorithm is further used to detect outliers and isolated groups of the data stream in time series. Secondly, an improved DBSCAN (Density Based Spatial Clustering of Applications with Noise) algorithm is proposed by considering spatiotemporal correlation between multisource data. It can be set according to sample characteristics in the window and overcomes the slow convergence problem using global parameters and large samples, then makes full use of data correlation to complete anomaly detection. Moreover, this paper proposes a distributed anomaly detection model for sensor data based on edge computing. It performs data processing on computing resources close to the data source as much as possible, which improves the overall efficiency of data processing. Finally, simulation results show that the proposed method has higher computational efficiency and detection accuracy than traditional methods and has certain feasibility.


Author(s):  
M.A Ganzhur ◽  
◽  
A.P. Ganzhur ◽  
D.L. Romanov

. The article provides a multidimensional analysis of the Anomaly detection process in "smart field" data processing systems. Simulation of anomaly


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 4255-4264
Author(s):  
Tao Yang ◽  
Yibo Hu ◽  
Yang Li ◽  
Wei Hu ◽  
Quan Pan

2020 ◽  
Author(s):  
Anatoliy Grigor'ev ◽  
Evgeniy Isaev

The tutorial deals with selected methods and algorithms of data processing, the sequence of solving problems of processing and analysis of data to create models behavior of the object taking into account all the components of its mathematical model. Describes the types of technological methods for the use of software and hardware for solving problems in this area. The algorithms of distributions, regressions vremenny series, transform them with the aim of obtaining mathematical models and prediction of the behavior information and economic systems (objects). The second edition is supplemented by materials that are in demand by researchers in the part of the correct use of clustering algorithms. Are elements of the classification algorithms to identify their capabilities, strengths and weaknesses. Are the procedures of justification and verify the adequacy of the results of the cluster analysis, conducted a comparison and evaluation of different clustering techniques, given information about visualization of multidimensional data and examples of practical application of clustering algorithms. Meets the requirements of Federal state educational standards of higher education of the last generation. For students of economic specialties, specialists, and graduate students.


Sign in / Sign up

Export Citation Format

Share Document