2022
DOI: 10.1016/j.procir.2022.09.065
|View full text |Cite
|
Sign up to set email alerts
|

Extended kernel density estimation for anomaly detection in streaming data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The decisions are made in dependence on the states of the IIoT network, i.e., the current available resources. In the context of this work, a task q can either be a pair of data stream and processing algorithm, e.g., anomaly detection [41] or data compression [42], or only a computing task that does not process data, e.g., a node in a distributed ledger technology network [43]. The proposed system optimizes the usage of multiple resources.…”
Section: Inputmentioning
confidence: 99%
“…The decisions are made in dependence on the states of the IIoT network, i.e., the current available resources. In the context of this work, a task q can either be a pair of data stream and processing algorithm, e.g., anomaly detection [41] or data compression [42], or only a computing task that does not process data, e.g., a node in a distributed ledger technology network [43]. The proposed system optimizes the usage of multiple resources.…”
Section: Inputmentioning
confidence: 99%
“…For evaluation, the exemplary use case of an RL-based MAS for intelligent resource allocation in IIoT with edge computing is examined. It comprises both the MAS as enabler for DSPSs [ 83 ] on the middleware layer as well as different data stream processing algorithms [ 4 , 22 , 88 ] that belong to the logic layer. While the single approaches have already been evaluated individually, the proposed application of simulation is used for a realistic evaluation of the overall system and the interaction of the single approaches in combination with an industrial plant.…”
Section: Simulation Experimentsmentioning
confidence: 99%
“…Three kinds of high-level edge computing algorithms are run on the edge devices: Anomaly detection: The anomaly detection is based on unsupervised learning, i.e., the nonparametric statistic method kernel density estimation. The efficient one-pass algorithm is suited for the detection of different kinds of anomalies in streaming data (for details, see [ 4 ]). DLT and SCs: In a previous work ([ 22 ]), we presented two use cases for DLT in the IIoT.…”
Section: Simulation Experimentsmentioning
confidence: 99%
See 2 more Smart Citations