Meng et al., 2006 - Google Patents
Rare event detection in a spatiotemporal environmentMeng et al., 2006
View PDF- Document ID
- 2980488373336497448
- Author
- Meng Y
- Dunham M
- Marchetti F
- Huang J
- Publication year
- Publication venue
- 2006 IEEE International Conference on Granular Computing
External Links
Snippet
In this paper we explore the use of Extensible Markov Models (EMM) to detect rare events in a spatiotemporal environment. This initial work shows that an EMM is scalable, dynamic, and can detect rare events based on spatial values, temporal values, or transitions between …
- 238000001514 detection method 0 title description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gama et al. | Learning with drift detection | |
CN111475804B (en) | Alarm prediction method and system | |
Lee et al. | Mining discriminative patterns for classifying trajectories on road networks | |
CN108023876A (en) | Intrusion detection method and intruding detection system based on sustainability integrated study | |
Ahmed et al. | An investigation of performance analysis of anomaly detection techniques for big data in scada systems | |
Meng et al. | Rare event detection in a spatiotemporal environment | |
Poenaru-Olaru et al. | Are concept drift detectors reliable alarming systems?-a comparative study | |
Xian et al. | A novel intrusion detection method based on clonal selection clustering algorithm | |
Xu et al. | Comparisons of logistic regression and artificial neural network on power distribution systems fault cause identification | |
Berjab et al. | Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks | |
Panda et al. | Evaluating machine learning algorithms for detecting network intrusions | |
Id et al. | Handling concept drifts and limited label problems using semi-supervised combine-merge Gaussian mixture model | |
Grzech | Anomaly detection in distributed computer communication systems | |
Sun et al. | Immunity-based dynamic anomaly detection method | |
Arostegi et al. | SLAYER: A Semi-supervised Learning Approach for Drifting Data Streams under Extreme Verification Latency. | |
Frank et al. | Applications of neural networks to telecommunications systems | |
TWI789003B (en) | Service anomaly detection and alerting method, apparatus using the same, storage media for storing the same, and computer software program for generating service anomaly alert | |
Spiliopoulou et al. | Temporal evolution and local patterns | |
Padmalatha et al. | Classification of concept drift data streams | |
Mohammed et al. | Chaotic sparrow search algorithm with deep learning for anomaly detection in internet of things | |
Hairuman et al. | Evaluation of machine learning techniques for anomaly detection on hourly basis kpi | |
Subha et al. | The Enhanced Anomaly Deduction Techniques for Detecting Redundant Data in IoT | |
Anand et al. | Anomaly Detection in Disaster Recovery: A Review, Current Trends and New Perspectives | |
Kamel et al. | Novel Data Mining Approach Predicting Alerts in The Telecom Industry | |
Vinila Jinny et al. | Encrusted CRF in intrusion detection system |