Search results
1 – 10 of over 1000Tran Khanh Dang, Duc Minh Chau Pham and Duc Dan Ho
Data crawling in e-commerce for market research often come with the risk of poor authenticity due to modification attacks. The purpose of this paper is to propose a novel data…
Abstract
Purpose
Data crawling in e-commerce for market research often come with the risk of poor authenticity due to modification attacks. The purpose of this paper is to propose a novel data authentication model for such systems.
Design/methodology/approach
The data modification problem requires careful examinations in which the data are re-collected to verify their reliability by overlapping the two datasets. This approach is to use different anomaly detection techniques to determine which data are potential for frauds and to be re-collected. The paper also proposes a data selection model using their weights of importance in addition to anomaly detection. The target is to significantly reduce the amount of data in need of verification, but still guarantee that they achieve their high authenticity. Empirical experiments are conducted with real-world datasets to evaluate the efficiency of the proposed scheme.
Findings
The authors examine several techniques for detecting anomalies in the data of users and products, which give the accuracy of 80 per cent approximately. The integration with the weight selection model is also proved to be able to detect more than 80 per cent of the existing fraudulent ones while being careful not to accidentally include ones which are not, especially when the proportion of frauds is high.
Originality/value
With the rapid development of e-commerce fields, fraud detection on their data, as well as in Web crawling systems is new and necessary for research. This paper contributes a novel approach in crawling systems data authentication problem which has not been studied much.
Details
Keywords
Xiang Xie, Qiuchen Lu, David Rodenas-Herraiz, Ajith Kumar Parlikad and Jennifer Mary Schooling
Visual inspection and human judgement form the cornerstone of daily operations and maintenance (O&M) services activities carried out by facility managers nowadays. Recent advances…
Abstract
Purpose
Visual inspection and human judgement form the cornerstone of daily operations and maintenance (O&M) services activities carried out by facility managers nowadays. Recent advances in technologies such as building information modelling (BIM), distributed sensor networks, augmented reality (AR) technologies and digital twins present an immense opportunity to radically improve the way daily O&M is conducted. This paper aims to describe the development of an AR-supported automated environmental anomaly detection and fault isolation method to assist facility managers in addressing problems that affect building occupants’ thermal comfort.
Design/methodology/approach
The developed system focusses on the detection of environmental anomalies related to the thermal comfort of occupants within a building. The performance of three anomaly detection algorithms in terms of their ability to detect indoor temperature anomalies is compared. Based on the fault tree analysis (FTA), a decision-making tree is developed to assist facility management (FM) professionals in identifying corresponding failed assets according to the detected anomalous symptoms. The AR system facilitates easy maintenance by highlighting the failed assets hidden behind walls/ceilings on site to the maintenance personnel. The system can thus provide enhanced support to facility managers in their daily O&M activities such as inspection, recording, communication and verification.
Findings
Taking the indoor temperature inspection as an example, the case study demonstrates that the O&M management process can be improved using the proposed AR-enhanced inspection system. Comparative analysis of different anomaly detection algorithms reveals that the binary segmentation-based change point detection is effective and efficient in identifying temperature anomalies. The decision-making tree supported by FTA helps formalise the linkage between temperature issues and the corresponding failed assets. Finally, the AR-based model enhanced the maintenance process by visualising and highlighting the hidden failed assets to the maintenance personnel on site.
Originality/value
The originality lies in bringing together the advances in augmented reality, digital twins and data-driven decision-making to support the daily O&M management activities. In particular, the paper presents a novel binary segmentation-based change point detection for identifying temperature anomalous symptoms, a decision-making tree for matching the symptoms to the failed assets, and an AR system for visualising those assets with related information.
Details
Keywords
D. Divya, Bhasi Marath and M.B. Santosh Kumar
This study aims to bring awareness to the developing of fault detection systems using the data collected from sensor devices/physical devices of various systems for predictive…
Abstract
Purpose
This study aims to bring awareness to the developing of fault detection systems using the data collected from sensor devices/physical devices of various systems for predictive maintenance. Opportunities and challenges in developing anomaly detection algorithms for predictive maintenance and unexplored areas in this context are also discussed.
Design/methodology/approach
For conducting a systematic review on the state-of-the-art algorithms in fault detection for predictive maintenance, review papers from the years 2017–2021 available in the Scopus database were selected. A total of 93 papers were chosen. They are classified under electrical and electronics, civil and constructions, automobile, production and mechanical. In addition to this, the paper provides a detailed discussion of various fault-detection algorithms that can be categorised under supervised, semi-supervised, unsupervised learning and traditional statistical method along with an analysis of various forms of anomalies prevalent across different sectors of industry.
Findings
Based on the literature reviewed, seven propositions with a focus on the following areas are presented: need for a uniform framework while scaling the number of sensors; the need for identification of erroneous parameters; why there is a need for new algorithms based on unsupervised and semi-supervised learning; the importance of ensemble learning and data fusion algorithms; the necessity of automatic fault diagnostic systems; concerns about multiple fault detection; and cost-effective fault detection. These propositions shed light on the unsolved issues of predictive maintenance using fault detection algorithms. A novel architecture based on the methodologies and propositions gives more clarity for the reader to further explore in this area.
Originality/value
Papers for this study were selected from the Scopus database for predictive maintenance in the field of fault detection. Review papers published in this area deal only with methods used to detect anomalies, whereas this paper attempts to establish a link between different industrial domains and the methods used in each industry that uses fault detection for predictive maintenance.
Details
Keywords
Neetika Jain and Sangeeta Mittal
A cost-effective way to achieve fuel economy is to reinforce positive driving behaviour. Driving behaviour can be controlled if drivers can be alerted for behaviour that results…
Abstract
Purpose
A cost-effective way to achieve fuel economy is to reinforce positive driving behaviour. Driving behaviour can be controlled if drivers can be alerted for behaviour that results in poor fuel economy. Fuel consumption must be tracked and monitored instantaneously rather than tracking average fuel economy for the entire trip duration. A single-step application of machine learning (ML) is not sufficient to model prediction of instantaneous fuel consumption and detection of anomalous fuel economy. The study designs an ML pipeline to track and monitor instantaneous fuel economy and detect anomalies.
Design/methodology/approach
This research iteratively applies different variations of a two-step ML pipeline to the driving dataset for hatchback cars. The first step addresses the problem of accurate measurement and prediction of fuel economy using time series driving data, and the second step detects abnormal fuel economy in relation to contextual information. Long short-term memory autoencoder method learns and uses the most salient features of time series data to build a regression model. The contextual anomaly is detected by following two approaches, kernel quantile estimator and one-class support vector machine. The kernel quantile estimator sets dynamic threshold for detecting anomalous behaviour. Any error beyond a threshold is classified as an anomaly. The one-class support vector machine learns training error pattern and applies the model to test data for anomaly detection. The two-step ML pipeline is further modified by replacing long short term memory autoencoder with gated recurrent network autoencoder, and the performance of both models is compared. The speed recommendations and feedback are issued to the driver based on detected anomalies for controlling aggressive behaviour.
Findings
A composite long short-term memory autoencoder was compared with gated recurrent unit autoencoder. Both models achieve prediction accuracy within a range of 98%–100% for prediction as a first step. Recall and accuracy metrics for anomaly detection using kernel quantile estimator remains within 98%–100%, whereas the one-class support vector machine approach performs within the range of 99.3%–100%.
Research limitations/implications
The proposed approach does not consider socio-demographics or physiological information of drivers due to privacy concerns. However, it can be extended to correlate driver's physiological state such as fatigue, sleep and stress to correlate with driving behaviour and fuel economy. The anomaly detection approach here is limited to providing feedback to driver, it can be extended to give contextual feedback to the steering controller or throttle controller. In the future, a controller-based system can be associated with an anomaly detection approach to control the acceleration and braking action of the driver.
Practical implications
The suggested approach is helpful in monitoring and reinforcing fuel-economical driving behaviour among fleet drivers as per different environmental contexts. It can also be used as a training tool for improving driving efficiency for new drivers. It keeps drivers engaged positively by issuing a relevant warning for significant contextual anomalies and avoids issuing a warning for minor operational errors.
Originality/value
This paper contributes to the existing literature by providing an ML pipeline approach to track and monitor instantaneous fuel economy rather than relying on average fuel economy values. The approach is further extended to detect contextual driving behaviour anomalies and optimises fuel economy. The main contributions for this approach are as follows: (1) a prediction model is applied to fine-grained time series driving data to predict instantaneous fuel consumption. (2) Anomalous fuel economy is detected by comparing prediction error against a threshold and analysing error patterns based on contextual information.
Details
Keywords
Anagha Vaidya and Sarika Sharma
Course evaluations are formative and are used to evaluate learnings of the students for a course. Anomalies in the evaluation process can lead to a faulty educational outcome…
Abstract
Purpose
Course evaluations are formative and are used to evaluate learnings of the students for a course. Anomalies in the evaluation process can lead to a faulty educational outcome. Learning analytics and educational data mining provide a set of techniques that can be conveniently applied to extensive data collected as part of the evaluation process to ensure remedial actions. This study aims to conduct an experimental research to detect anomalies in the evaluation methods.
Design/methodology/approach
Experimental research is conducted with scientific approach and design. The researchers categorized anomaly into three categories, namely, an anomaly in criteria assessment, subject anomaly and anomaly in subject marks allocation. The different anomaly detection algorithms are used to educate data through the software R, and the results are summarized in the tables.
Findings
The data points occurring in all algorithms are finally detected as an anomaly. The anomaly identifies the data points that deviate from the data set’s normal behavior. The subject which is consistently identified as anomalous by the different techniques is marked as an anomaly in evaluation. After identification, one can drill down to more details into the title of anomalies in the evaluation criteria.
Originality/value
This paper proposes an analytical model for the course evaluation process and demonstrates the use of actionable analytics to detect anomalies in the evaluation process.
Details
Keywords
Aryana Collins Jackson and Seán Lacey
The discrete Fourier transformation (DFT) has been proven to be a successful method for determining whether a discrete time series is seasonal and, if so, for detecting the…
Abstract
Purpose
The discrete Fourier transformation (DFT) has been proven to be a successful method for determining whether a discrete time series is seasonal and, if so, for detecting the period. This paper deals exclusively with rare data, in which instances occur periodically at a low frequency.
Design/methodology/approach
Data based on real-world situations is simulated for analysis.
Findings
Cycle number detection is done with spectral analysis, period detection is completed using DFT coefficients and signal shifts in the time domain are found using the convolution theorem. Additionally, a new method for detecting anomalies in binary, rare data is presented: the sum of distances. Using this method, expected events which have not occurred and unexpected events which have occurred at various sampling frequencies can be detected. Anomalies which are not considered outliers to be found.
Research limitations/implications
Aliasing can contribute to extra frequencies which point to extra periods in the time domain. This can be reduced or removed with techniques such as windowing. In future work, this will be explored.
Practical implications
Applications include determining seasonality and thus investigating the underlying causes of hard drive failure, power outages and other undesired events. This work will also lend itself well to finding patterns among missing desired events, such as a scheduled hard drive backup or an employee's regular login to a server.
Originality/value
This paper has shown how seasonality and anomalies are successfully detected in seasonal, discrete, rare and binary data. Previously, the DFT has only been used for non-rare data.
Details
Keywords
Hui Liu, Tinglong Tang, Jake Luo, Meng Zhao, Baole Zheng and Yirong Wu
This study aims to address the challenge of training a detection model for the robot to detect the abnormal samples in the industrial environment, while abnormal patterns are very…
Abstract
Purpose
This study aims to address the challenge of training a detection model for the robot to detect the abnormal samples in the industrial environment, while abnormal patterns are very rare under this condition.
Design/methodology/approach
The authors propose a new model with double encoder–decoder (DED) generative adversarial networks to detect anomalies when the model is trained without any abnormal patterns. The DED approach is used to map high-dimensional input images to a low-dimensional space, through which the latent variables are obtained. Minimizing the change in the latent variables during the training process helps the model learn the data distribution. Anomaly detection is achieved by calculating the distance between two low-dimensional vectors obtained from two encoders.
Findings
The proposed method has better accuracy and F1 score when compared with traditional anomaly detection models.
Originality/value
A new architecture with a DED pipeline is designed to capture the distribution of images in the training process so that anomalous samples are accurately identified. A new weight function is introduced to control the proportion of losses in the encoding reconstruction and adversarial phases to achieve better results. An anomaly detection model is proposed to achieve superior performance against prior state-of-the-art approaches.
Details
Keywords
Junfu Chen, Xiaodong Zhao and Dechang Pi
The purpose of this paper is to ensure the stable operation of satellites in orbit and to assist ground personnel in continuously monitoring the satellite telemetry data and…
Abstract
Purpose
The purpose of this paper is to ensure the stable operation of satellites in orbit and to assist ground personnel in continuously monitoring the satellite telemetry data and finding anomalies in advance, which can improve the reliability of satellite operation and prevent catastrophic losses.
Design/methodology/approach
This paper proposes a deep auto-encoder (DAE) satellite anomaly advance warning framework for satellite telemetry data. Firstly, this study performs grey correlation analysis, extracts important feature attributes to construct feature vectors and builds the variational auto-encoder with bidirectional long short-term memory generative adversarial network discriminator (VAE/BLGAN). Then, the Mahalanobis distance is used to measure the reconstruction score of input and output. According to the periodic characteristic of satellite operation, a dynamic threshold method based on periodic time window is proposed. Satellite health monitoring and advance warning are achieved using reconstruction scores and dynamic thresholds.
Findings
Experiment results indicate DAE methods can probe that satellite telemetry data appear abnormal, trigger a warning before the anomaly occurring and thus allow enough time for troubleshooting. This paper further verifies that the proposed VAE/BLGAN model has stronger data learning ability than other two auto-encoder models and is sensitive to satellite monitoring data.
Originality/value
This paper provides a DAE framework to apply in the field of satellite health monitoring and anomaly advance warning. To the best of the authors’ knowledge, this is the first paper to combine DAE methods with satellite anomaly detection, which can promote the application of artificial intelligence in spacecraft health monitoring.
Details
Keywords
Anomaly detection of network attacks has become a high priority because of the need to guarantee security, privacy and reliability. This work aims to describe both intelligent…
Abstract
Purpose
Anomaly detection of network attacks has become a high priority because of the need to guarantee security, privacy and reliability. This work aims to describe both intelligent immunological approaches and traditional monitoring systems for anomaly detection.
Design/methodology/approach
Author investigated different artificial immune system (AIS) theories and proposes how to combine different ideas to solve problems of network security domain. An anomaly detection system that applies those ideas was built and tested in a real time environment, to test the pros and cons of AIS and clarify its applicability. Rather than building a detailed signature based model of intrusion detection system, the scope of this study tries to explore the principle in an immune network focusing on its self-organization, adaptive learning capability, and immune feedback.
Findings
The natural immune system has its own intelligent mechanisms to detect the foreign bodies and fight them and without it, an individual cannot live, even just for several days. Network attackers evolved new types of attacks. Attacks became more complex, severe and hard to detect. This results in increasing needs for network defense systems, especially those with ability to extraordinary approaches or to face the dynamic nature of continuously changing network threats. KDD CUP'99 dataset are used as a training data to evaluate the proposed hybrid artificial immune principles anomaly detection. The average cost of the proposed model was 0.1195 where that the wining of KDD99 dataset computation had 0.233.
Originality/value
It is original to introduce investigation on the vaccination biological process. A special module was built to perform this process and check its usage and how it could be formulated in artificial life.
Details
Keywords
Raman Singh, Harish Kumar, Ravinder Kumar Singla and Ramachandran Ramkumar Ketti
The paper addresses various cyber threats and their effects on the internet. A review of the literature on intrusion detection systems (IDSs) as a means of mitigating internet…
Abstract
Purpose
The paper addresses various cyber threats and their effects on the internet. A review of the literature on intrusion detection systems (IDSs) as a means of mitigating internet attacks is presented, and gaps in the research are identified. The purpose of this paper is to identify the limitations of the current research and presents future directions for intrusion/malware detection research.
Design/methodology/approach
The paper presents a review of the research literature on IDSs, prior to identifying research gaps and limitations and suggesting future directions.
Findings
The popularity of the internet makes it vulnerable against various cyber-attacks. Ongoing research on intrusion detection methods aims to overcome the limitations of earlier approaches to internet security. However, findings from the literature review indicate a number of different limitations of existing techniques: poor accuracy, high detection time, and low flexibility in detecting zero-day attacks.
Originality/value
This paper provides a review of major issues in intrusion detection approaches. On the basis of a systematic and detailed review of the literature, various research limitations are discovered. Clear and concise directions for future research are provided.
Details