2017 6th Mediterranean Conference on Embedded Computing (MECO) 2017
DOI: 10.1109/meco.2017.7977130
|View full text |Cite
|
Sign up to set email alerts
|

Robust anomaly detection algorithms for real-time big data: Comparison of algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…Our proposed algorithm (HW-GA) [1] with GA optimized parameters (α, β, γ, δ, k, n) and with improved is copared with ARIMA, MA (implemented in our previous work [2]), HW where smoothing parameters are calculated by formula and default MASE (HW calc.MASE), HW by default smoothing parameters (optimized in R) and default MASE (HW def.MASE), HW by default smoothing parameters and improved (HW def.MASE(k,n)).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Our proposed algorithm (HW-GA) [1] with GA optimized parameters (α, β, γ, δ, k, n) and with improved is copared with ARIMA, MA (implemented in our previous work [2]), HW where smoothing parameters are calculated by formula and default MASE (HW calc.MASE), HW by default smoothing parameters (optimized in R) and default MASE (HW def.MASE), HW by default smoothing parameters and improved (HW def.MASE(k,n)).…”
Section: Resultsmentioning
confidence: 99%
“…In our previous research [2] we have compared many algorithms as MAD, RunMAD, Boxplot, Twitter ADVec, DBSCAN, Moving Range Technique, Statistical Control Chart Techniques, ARIMA and Moving Average, to nd which one is faster. So the most important aspects that we considered, in order to nd anomaly detection algorithm suitable for future implementation in the online environment was the execution time (complexity), the CPU usage and the satisfactory quality of algorithm (measured through…”
Section: Related Workmentioning
confidence: 99%
“…The testing is done in real-time data that comes from the e-dnevnik application. This tool enables us to implement our evaluated algorithms (Hasani, 2017) and visualize the results. Visualization of the real-time anomaly detected is an important part of the infrastructure as a powerful tool for online monitoring the work of the system.…”
Section: Resultsmentioning
confidence: 99%
“…As part of this infrastructure, Timelion, enables programming and implementation of user defined anomaly detection algorithms, as example algorithms we analyzed in (Hasani, 2017). There are some algorithms used for anomaly detection and we explore some of them and implement in real time environment in our proposed infrastructure.…”
Section: Anomaly Detection With Timelionmentioning
confidence: 99%
“…is compared with ARIMA, MA (implemented in our previous work[54]), HTM[5] algorithm, HW where smoothing parameters are calculated by formula and default MASE (HW calc. MASE), HW by default smoothing parameters (optimized in R) and default MASE (HW def.…”
mentioning
confidence: 99%