Runtime Anomaly Detection Method in Smart Factories using Machine Learning on RDF Event Streams

Author(s):  
Joong-Hyun Choi ◽  
Kang-Woo Lee ◽  
Hyungkun Jung ◽  
Eun-Sun Cho
2020 ◽  
Vol 69 (8) ◽  
pp. 8459-8467 ◽  
Author(s):  
Yutao Lu ◽  
Juan Wang ◽  
Miao Liu ◽  
Kaixuan Zhang ◽  
Guan Gui ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 884 ◽  
Author(s):  
Zizheng Zhang ◽  
Shigemi Ishida ◽  
Shigeaki Tagashira ◽  
Akira Fukuda

A bathroom has higher probability of accidents than other rooms due to a slippery floor and temperature change. Because of high privacy and humidity, we face difficulties in monitoring inside a bathroom using traditional healthcare methods based on cameras and wearable sensors. In this paper, we present a danger-pose detection system using commodity Wi-Fi devices, which can be applied to bathroom monitoring, preserving privacy. A machine learning-based detection method usually requires data collected in target situations, which is difficult in detection-of-danger situations. We therefore employ a machine learning-based anomaly-detection method that requires a small amount of data in anomaly conditions, minimizing the required training data collected in dangerous conditions. We first derive the amplitude and phase shift from Wi-Fi channel state information (CSI) to extract low-frequency components that are related to human activities. We then separately extract static and dynamic features from the CSI changes in time. Finally, the static and dynamic features are fed into a one-class support vector machine (SVM), which is used as an anomaly-detection method, to classify whether a user is not in bathtub, bathing safely, or in dangerous conditions. We conducted experimental evaluations and demonstrated that our danger-pose detection system achieved a high detection performance in a non-line-of-sight (NLOS) scenario.


2021 ◽  
Vol 11 (3-4) ◽  
pp. 1-23
Author(s):  
Linhao Meng ◽  
Yating Wei ◽  
Rusheng Pan ◽  
Shuyue Zhou ◽  
Jianwei Zhang ◽  
...  

Federated Learning (FL) provides a powerful solution to distributed machine learning on a large corpus of decentralized data. It ensures privacy and security by performing computation on devices (which we refer to as clients) based on local data to improve the shared global model. However, the inaccessibility of the data and the invisibility of the computation make it challenging to interpret and analyze the training process, especially to distinguish potential client anomalies. Identifying these anomalies can help experts diagnose and improve FL models. For this reason, we propose a visual analytics system, VADAF, to depict the training dynamics and facilitate analyzing potential client anomalies. Specifically, we design a visualization scheme that supports massive training dynamics in the FL environment. Moreover, we introduce an anomaly detection method to detect potential client anomalies, which are further analyzed based on both the client model’s visual and objective estimation. Three case studies have demonstrated the effectiveness of our system in understanding the FL training process and supporting abnormal client detection and analysis.


Author(s):  
Zhiguo Ding ◽  
Minrui Fei ◽  
Dajun Du

Online anomaly detection for stream data has been explored recently, where the detector is supposed to be able to perform an accurate and timely judgment for the upcoming observation. However, due to the inherent complex characteristics of stream data, such as quick generation, tremendous volume and dynamic evolution distribution, how to develop an effective online anomaly detection method is a challenge. The main objective of this paper is to propose an adaptive online anomaly detection method for stream data. This is achieved by combining isolation principle with online ensemble learning, which is then optimized by statistic histogram. Three main algorithms are developed, i.e., online detector building algorithm, anomaly detecting algorithm and adaptive detector updating algorithm. To evaluate our proposed method, four massive datasets from the UCI machine learning repository recorded from real events were adopted. Extensive simulations based on these datasets show that our method is effective and robust against different scenarios.


2016 ◽  
Vol 136 (3) ◽  
pp. 363-372
Author(s):  
Takaaki Nakamura ◽  
Makoto Imamura ◽  
Masashi Tatedoko ◽  
Norio Hirai

2015 ◽  
Vol 135 (12) ◽  
pp. 749-755
Author(s):  
Taiyo Matsumura ◽  
Ippei Kamihira ◽  
Katsuma Ito ◽  
Takashi Ono

Sign in / Sign up

Export Citation Format

Share Document