2019
DOI: 10.1049/iet-gtd.2019.0682
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection for condition monitoring data using auxiliary feature vector and density‐based clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Smart contracts have great potential to simplify these processes, thereby reducing costs [ 13 ]. Liu H. et al adopted the smart contract technology based on Ethereum platform, established a hierarchical intelligent power distribution trading platform architecture for real-time transaction request and data acquisition, and realized the data security interaction under the high coupling of energy flow and information flow [ 14 ]. The combination of homomorphic encryption and Ethereum's smart contract technology makes it possible for insurance companies to obtain a customer's simple EHR text and claim object ID and decide whether to settle a claim even if patient information is not available, strengthening the confidentiality of any confidential information and user information disclosed to unauthorized users during interactions [ 15 ].…”
Section: Related Workmentioning
confidence: 99%
“…Smart contracts have great potential to simplify these processes, thereby reducing costs [ 13 ]. Liu H. et al adopted the smart contract technology based on Ethereum platform, established a hierarchical intelligent power distribution trading platform architecture for real-time transaction request and data acquisition, and realized the data security interaction under the high coupling of energy flow and information flow [ 14 ]. The combination of homomorphic encryption and Ethereum's smart contract technology makes it possible for insurance companies to obtain a customer's simple EHR text and claim object ID and decide whether to settle a claim even if patient information is not available, strengthening the confidentiality of any confidential information and user information disclosed to unauthorized users during interactions [ 15 ].…”
Section: Related Workmentioning
confidence: 99%
“…Yu and Xiong used the principal component analysis method to construct the state evaluation matrix of the studied index parameters, as well as the principal component analysis method to eliminate index correlation and reduce the number of evaluation indexes [16]. Liu et al used the linear discriminant analysis method to solve the grid problem and set the repetition problem between the index weights of evaluation indexes [17]. They chose index parameters related to the viability of the grid structure from four aspects of grid backbone evaluation.…”
Section: Research On Condition Monitoring Of Power Systemmentioning
confidence: 99%
“…On the other hand, density‐based clustering algorithms are defined as effective techniques among clustering approaches. As compared to centroid‐based clustering algorithms, density‐based clustering works by identifying a ‘dense’ group of points, allowing it to learn clusters of arbitrary shape and detect outliers in the data [43]. Considering that we want to identify the noise data and do not have any idea about the number and shape of the clusters at the beginning of the clustering process, density‐based clustering is a suitable choice for this purpose.…”
Section: Integration Of Ai Techniques Into the Developed Modelmentioning
confidence: 99%