Search results for "Anomaly detection"

showing 10 items of 82 documents

Unsupervised Anomaly and Change Detection With Multivariate Gaussianization

2022

Anomaly detection (AD) is a field of intense research in remote sensing (RS) image processing. Identifying low probability events in RS images is a challenging problem given the high dimensionality of the data, especially when no (or little) information about the anomaly is available a priori. While a plenty of methods are available, the vast majority of them do not scale well to large datasets and require the choice of some (very often critical) hyperparameters. Therefore, unsupervised and computationally efficient detection methods become strictly necessary, especially now with the data deluge problem. In this article, we propose an unsupervised method for detecting anomalies and changes …

FOS: Computer and information sciencesComputer Science - Machine LearningMultivariate statisticsComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionFOS: Physical sciencesImage processingPattern recognitionMultivariate normal distributionComputational Physics (physics.comp-ph)Machine Learning (cs.LG)Methodology (stat.ME)Transformation (function)Robustness (computer science)General Earth and Planetary SciencesAnomaly detectionArtificial intelligenceElectrical and Electronic EngineeringbusinessPhysics - Computational PhysicsStatistics - MethodologyChange detectionCurse of dimensionalityIEEE Transactions on Geoscience and Remote Sensing
researchProduct

Randomized Rx For Target Detection

2018

This work tackles the target detection problem through the well-known global RX method. The RX method models the clutter as a multivariate Gaussian distribution, and has been extended to nonlinear distributions using kernel methods. While the kernel RX can cope with complex clutters, it requires a considerable amount of computational resources as the number of clutter pixels gets larger. Here we propose random Fourier features to approximate the Gaussian kernel in kernel RX and consequently our development keep the accuracy of the nonlinearity while reducing the computational cost which is now controlled by an hyperparameter. Results over both synthetic and real-world image target detection…

FOS: Computer and information sciencesHyperparameter020301 aerospace & aeronauticsComputer Science - Machine LearningComputer scienceComputer Vision and Pattern Recognition (cs.CV)0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionMultivariate normal distribution02 engineering and technologyObject detectionMachine Learning (cs.LG)symbols.namesakeKernel (linear algebra)Kernel method0203 mechanical engineeringKernel (statistics)Gaussian functionsymbolsClutterAnomaly detectionAlgorithm021101 geological & geomatics engineering
researchProduct

A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection

2014

Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …

Finite-state machineVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Computational complexity theoryData stream miningComputer scienceNearest neighbor searchSearch engine indexingInformationSystems_DATABASEMANAGEMENTIntrusion detection systemcomputer.software_genreCardinalityAnomaly detectionData miningcomputer
researchProduct

A method for detecting malfunctions in PV solar panels based on electricity production monitoring

2017

In this paper a new method is developed for automatically detecting outliers or faults in the solar energy production of identical sets (sister arrays) of photovoltaic (PV) solar panels. The method involves a two-stage unsupervised approach. In the first stage, "in control" energy production data are created by using outlier detection methods and functional principal component analysis in order to remove global and local outliers from the data set. In the second stage, control charts for the "in control" data are constructed using both a parametric method and three non-parametric methods. The control charts can be used to detect outliers or faults in the production data in real-time or at t…

Functional principal component analysisRenewable Energy Sustainability and the EnvironmentComputer sciencebusiness.industryElectricity production monitoring020209 energyPhotovoltaic systemStatistical quality control02 engineering and technologyAnomaly detectionStatistical process controlcomputer.software_genreSolar energyOutlier0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceControl chartAnomaly detectionData miningbusinesscomputerPhotovoltaic solar panel sister arraysParametric statistics
researchProduct

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

2016

Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…

Fuzzy clusteringbusiness.industryNetwork securityComputer scienceNetwork packet05 social sciencesDenial-of-service attack02 engineering and technologyIntrusion detection systemEncryption0502 economics and business0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionActivity-based costingbusiness050203 business & managementComputer network
researchProduct

Talent identification in soccer using a one-class support vector machine

2019

Abstract Identifying potential future elite athletes is important in many sporting events. The successful identification of potential future elite athletes at an early age would help to provide high-quality coaching and training environments in which to optimize their development. However, a large variety of different skills and qualities are needed to succeed in elite sports, making talent identification generally a complex and multifaceted problem. Due to the rarity of elite athletes, datasets are inherently imbalanced, making classical statistical inference difficult. Therefore, we approach talent identification as an anomaly detection problem. We trained a nonlinear one-class support ve…

General Computer ScienceComputer scienceBiomedical Engineering02 engineering and technologyMachine learningcomputer.software_genretalent identification03 medical and health sciences0302 clinical medicine0202 electrical engineering electronic engineering information engineeringtunnistaminenlajitaidotClass (computer programming)lahjakkuusbusiness.industryone-class svm030229 sport sciencesanomaly detectionSupport vector machineIdentification (information)koneoppiminenjalkapallo020201 artificial intelligence & image processingArtificial intelligencetiedonlouhintabusinesscomputerInternational Journal of Computer Science in Sport
researchProduct

Improving point matching on multimodal images using distance and orientation automatic filtering

2016

International audience; Speed Up Robust Features SURF is one of the most popular and efficient methods used for image registration task. In order to achieve a correct registration, a good matching of feature point is required. However in the case of multimodal images, the high and non-linear intensity changes between different modalities led to many outliers (mismatching of detected points) and consequently a fail in the registration. Therefore, in this paper we introduce an efficient method devoted to the detection and removal of such outlier. It's based on an automatic filtering of outliers on both distance and orientation between features points. We tested our proposed method on a set of…

HistogramsComputer scienceFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registration02 engineering and technologyimage matchingfeature point matchingRANSACElectronic mailautomatic outlier filteringHistogramautomatic orientation filteringhigh-nonlinear intensity[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringautomatic distance filteringOutlier detectionComputer visionIR visible imagesRobustnessmultimodal imagesUV imagesImage registrationimage filteringMeasurementbusiness.industryFeature matchingSURF020206 networking & telecommunicationsPoint set registrationPattern recognitionDetectorsdetected point mismatchingcultural heritagefluorescence imagesElectronic mail[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Outlierspeed-up robust featuresFeature extraction020201 artificial intelligence & image processingAnomaly detectionArtificial intelligencebusiness
researchProduct

Some Experiments in Supervised Pattern Recognition with Incomplete Training Samples

2002

This paper presents some ideas about automatic procedures to implement a system with the capability of detecting patterns arising from classes not represented in the training sample. The procedure aims at incorporating automatically to the training sample the necessary information about the new class for correctly recognizing patterns from this class in future classification tasks. The Nearest Neighbor rule is employed as the central classifier and several techniques are added to cope with the peril of incorporating noisy data to the training sample. Experimental results with real data confirm the benefits of the proposed procedure.

Information extractionComputer sciencebusiness.industryAnomaly detectionPattern recognitionArtificial intelligencebusinessMachine learningcomputer.software_genreClassifier (UML)computerk-nearest neighbors algorithm
researchProduct

IoT-Based Home Monitoring: Supporting Practitioners' Assessment by Behavioral Analysis.

2019

This paper introduces technical solutions devised to support the Deployment Site - Regione Emilia Romagna (DS-RER) of the ACTIVAGE project. The ACTIVAGE project aims at promoting IoT (Internet of Things)-based solutions for Active and Healthy ageing. DS-RER focuses on improving continuity of care for older adults (65+) suffering from aftereffects of a stroke event. A Wireless Sensor Kit based on Wi-Fi connectivity was suitably engineered and realized to monitor behavioral aspects, possibly relevant to health and wellbeing assessment. This includes bed/rests patterns, toilet usage, room presence and many others. Besides hardware design and validation, cloud-based analytics services are intro…

IoTComputer sciencesmart homeCloud computing02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Use caseElectrical and Electronic EngineeringInstrumentationToiletbusiness.industryEvent (computing)020206 networking & telecommunicationsData scienceAtomic and Molecular Physics and Opticsanomaly detectioncontinuous monitoring3. Good healthactive assisted living (AAL)behavioural analysisSoftware deploymentAnalyticsbusiness030217 neurology & neurosurgerySensors (Basel, Switzerland)
researchProduct

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct