2021 IEEE International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT) 2021
DOI: 10.1109/iceemt52412.2021.9601888
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Based on Edge Computing Framework for AMI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The paper evaluates the proposed model on three public datasets: UMN, Violent Flows, and Hockey Fights, and reports the accuracy, precision, recall, and F1-score metrics. Anomaly detection in mining scenarios is addressed through the endorsement of edge computing over traditional cloud methods, and an anomaly detection algorithm based on fuzzy theory is proposed for enhanced professionalism [38]. In [39], a framework is presented for implementing the ELM (ex-treme learning machines) model, a variation of autoencoders, validated using the NASA bearing dataset, with a specific emphasis on online anomaly detection in machinery.…”
Section: IVmentioning
confidence: 99%
“…The paper evaluates the proposed model on three public datasets: UMN, Violent Flows, and Hockey Fights, and reports the accuracy, precision, recall, and F1-score metrics. Anomaly detection in mining scenarios is addressed through the endorsement of edge computing over traditional cloud methods, and an anomaly detection algorithm based on fuzzy theory is proposed for enhanced professionalism [38]. In [39], a framework is presented for implementing the ELM (ex-treme learning machines) model, a variation of autoencoders, validated using the NASA bearing dataset, with a specific emphasis on online anomaly detection in machinery.…”
Section: IVmentioning
confidence: 99%
“…To capture the feature mapping, the input data are multiplied by the convolutional kernel in the convolutional network, which is then activated by a nonlinear function. The convolution kernel randomly initializes weights and biases (Liang, Ye, Zhou, & Yang, 2021). After each CNN layer, a normalization layer and a max-pooling layer are added.…”
Section: System Modelmentioning
confidence: 99%
“…A typical neural network comprises numerous small, interconnected processes called neurons, each generating a string of activations with real values. Environmental sensors activate input neurons, and weighted connections from previously active neurons excite more neurons (Komyakov, Erbes, & Ivanchenko, 2015;Liang et al, 2021;Schmidhuber, 2015) (see Fig. 3).…”
Section: Deep Neural Network Structurementioning
confidence: 99%
“…In the AMI, the smart meters are uploading their power usage information to the data concentrators through wired and wireless communication in the Neighborhood Area Network (NAN). And then the data center actively requests power data from data concentrators through the wide area network (WAN), or data concentrators pass through the WAN at a preset time interval, and they centrally upload power consumption data to the data center, then the data center distributes electricity price information to users and implements related measures such as load management, demand response, and meter control commands to improve customer service (Liang et al, 2021).…”
Section: Advanced Metering Infrastructurementioning
confidence: 99%