최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털콘텐츠학회 논문지 = Journal of Digital Contents Society, v.19 no.4, 2018년, pp.789 - 799
(전남대학교 전자컴퓨터공학과) , (전남대학교 전자컴퓨터공학과) , 김진술 (전남대학교 전자컴퓨터공학과)
This article presents machine learning based approach on Big data to analyzing time series data for anomaly detection in such industrial complex system. Long Short-Term Memory (LSTM) network have been demonstrated to be improved version of RNN and have become a useful aid for many tasks. This LSTM b...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
B. Chen, J. Wan, L. Shu, P. Li, M. Mukherjee, and B. Yin, "Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges," IEEE Access, Vol. 6, pp. 6505-6519, 2017.
T. Skripcak and P. Tanuska, "Utilisation of on-line machine learning for SCADA system alarms forecasting," Proceedings of 2013 Science and Information Conference, SAI 2013, pp. 477-484, 2013.
S. Mohanty, M. Jagadeesh, and H. Srivatsa, " 'Big Data' warehouse, 'BI'implementations and analytics," Apress, 2013.
I. Garitano, R. Uribeetxeberria and U. Zurutuza, "A review of SCADA Anomaly Detection System," Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, Vol. 87, 2011.
M. Shafiee and M. Finkelstein, "An optimal age-based group maintenance policy for multi-unit degrading systems," Reliability Engineering \& System Safety, Vol. 134, pp. 230-238, 2015.
Kv, R. Satish, and N. P. Kavya, "Trend Analysis of E-Commerce Data using Hadoop Ecosystem," International Journal of Computer Applications, Vol. 147, No. 6, pp. 1-5, 2016.
J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Communication of ACM, Vol. 51, No. 1, pp. 107-113, 2008.
Flume: http://flume.apache.org/
Hive:https://hive.apache.org/
Zeppelin: https://zeppelin.apache.org/docs/0.6.2/
L. Zhou, S. Pan, J. Wang, and A. V. Vasilakos, "Machine learning on big data: Opportunities and challenges," Neurocomputing, Vol. 237, pp. 350-361, 2017.
Jordan, I. Michael and M. M. Tom, "Machine learning: Trends, perspectives, and prospects," Science , Vol.349, No. 6245, pp. 255-260, 2015.
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing survey (CSUR), Vol. 41, No. 3, pp. 1-58, 2009.
P. Malhotra, L. Vig, G. Shroff, and P. Agarwal, "Long short term memory networks for anomaly detection in time series," Proceedings, pp. 89, 2015.
S. Hochreiter and J. Urgen Schmidhuber, "Long Short-Term Memory," Neural Computation, Vol. 9, No. 8, pp. 1735-1780, 1997.
T. Olsson and A. Holst, "A Probabilistic Approach to Aggregating Anomalies for Unsupervised Anomaly Detection with Industrial Applications," in FLAIRS Conference, pp. 434-439, 2015.
E. Marchi, F. Vesperini, F. Weninger, F. Eyben, S. Squartini, and B. Schuller, "Non-linear prediction with LSTM recurrent neural networks for acoustic novelty detection," in Neural Networks (IJCNN), 2015 International Joint Conference, pp. 1-7, 2015.
L. Bontemps, J. McDermott, N.-A. Le-Khac, and others, "Collective anomaly detection based on long short-term memory recurrent neural networks," in International Conference on Future Data and Security Engineering, pp. 141-152, 2016.
S. D. Anton, D. Fraunholz, C. Lipps, F. Pohl, M. Zimmermann, and H. D. Schotten, "Two decades of SCADA exploitation: A brief history," in Application, Information and Network Security (AINS), 2017 IEEE Conference, pp. 98-104, 2017.
Understanding LSTM Network [Internet]. Available: http://colah.github.io/posts/2015-08-Understanding-LSTMs
Xisom solution: http://www.xisom.com
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.