[go: up one dir, main page]

Meng et al., 2006 - Google Patents

Rare event detection in a spatiotemporal environment

Meng et al., 2006

View PDF
Document ID
2980488373336497448
Author
Meng Y
Dunham M
Marchetti F
Huang J
Publication year
Publication venue
2006 IEEE International Conference on Granular Computing

External Links

Snippet

In this paper we explore the use of Extensible Markov Models (EMM) to detect rare events in a spatiotemporal environment. This initial work shows that an EMM is scalable, dynamic, and can detect rare events based on spatial values, temporal values, or transitions between …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification

Similar Documents

Publication Publication Date Title
Gama et al. Learning with drift detection
CN111475804B (en) Alarm prediction method and system
Lee et al. Mining discriminative patterns for classifying trajectories on road networks
CN108023876A (en) Intrusion detection method and intruding detection system based on sustainability integrated study
Ahmed et al. An investigation of performance analysis of anomaly detection techniques for big data in scada systems
Meng et al. Rare event detection in a spatiotemporal environment
Poenaru-Olaru et al. Are concept drift detectors reliable alarming systems?-a comparative study
Xian et al. A novel intrusion detection method based on clonal selection clustering algorithm
Xu et al. Comparisons of logistic regression and artificial neural network on power distribution systems fault cause identification
Berjab et al. Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks
Panda et al. Evaluating machine learning algorithms for detecting network intrusions
Id et al. Handling concept drifts and limited label problems using semi-supervised combine-merge Gaussian mixture model
Grzech Anomaly detection in distributed computer communication systems
Sun et al. Immunity-based dynamic anomaly detection method
Arostegi et al. SLAYER: A Semi-supervised Learning Approach for Drifting Data Streams under Extreme Verification Latency.
Frank et al. Applications of neural networks to telecommunications systems
TWI789003B (en) Service anomaly detection and alerting method, apparatus using the same, storage media for storing the same, and computer software program for generating service anomaly alert
Spiliopoulou et al. Temporal evolution and local patterns
Padmalatha et al. Classification of concept drift data streams
Mohammed et al. Chaotic sparrow search algorithm with deep learning for anomaly detection in internet of things
Hairuman et al. Evaluation of machine learning techniques for anomaly detection on hourly basis kpi
Subha et al. The Enhanced Anomaly Deduction Techniques for Detecting Redundant Data in IoT
Anand et al. Anomaly Detection in Disaster Recovery: A Review, Current Trends and New Perspectives
Kamel et al. Novel Data Mining Approach Predicting Alerts in The Telecom Industry
Vinila Jinny et al. Encrusted CRF in intrusion detection system