2008 International Conference on Prognostics and Health Management 2008
DOI: 10.1109/phm.2008.4711445
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection: A robust approach to detection of unanticipated faults

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…The most common goal of anomaly detection is to raise an alarm when anomalous observations are encountered, such as insider threats [17], cyber attacks [15,23,16,21], machine component failures [27,28,1], sensor failures [7], novel astronomical phenomena [26], or the emergence of cancer cells in normal tissue [22,10]. In all of these cases, the underlying goal is to detect observations that are semantically distinct from normal observations.…”
Section: Requirements For Anomaly De-tection Benchmarksmentioning
confidence: 99%
“…The most common goal of anomaly detection is to raise an alarm when anomalous observations are encountered, such as insider threats [17], cyber attacks [15,23,16,21], machine component failures [27,28,1], sensor failures [7], novel astronomical phenomena [26], or the emergence of cancer cells in normal tissue [22,10]. In all of these cases, the underlying goal is to detect observations that are semantically distinct from normal observations.…”
Section: Requirements For Anomaly De-tection Benchmarksmentioning
confidence: 99%
“…Both Markov-based and AI-based methods require extensive training before actual detection, and in practice, there might not be sufficient data for training purpose. Fault detection can also be performed with particle filters [27]- [29]. Particle filters are usually computationally expensive and also require extensive trainings beforehand.…”
Section: In Addition Online Diagnosis Methods Allow Automatic Remotementioning
confidence: 99%
“…Proof: The proof is given in Appendix A. Theorem 1: Assume the elements in the feature vector x n are independent. With the multi-candidate procedure defined in 1, the probability of false alarm is upper bounded by PFA ≤θ w A (27) whereθ = ∞ k=0 π k k is the prior mean of the change point θ , and w is the number of candidates.…”
Section: Performance Analysismentioning
confidence: 99%
“…The idea is that measurements using multiple sensors in combination with environmental, operational, and performance-related parameters can provide a more accurate system health status. The sensor data can also be used along with statistical pattern recognition and machine-learning techniques to detect changes in machine parameter data, isolate faults, and estimate the remaining useful life (RUL) of the machines [6][7][8][9]. This approach assumes a product's loading and operating conditions, geometry, material properties, and failure mechanisms as the parameters to estimate RUL.…”
Section: Industry Segment Global Basementioning
confidence: 99%