Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 10 (2023)  /  Artículo
ARTÍCULO
TITULO

Review of Anomaly Detection Algorithms for Data Streams

Tianyuan Lu    
Lei Wang and Xiaoyong Zhao    

Resumen

With the rapid development of emerging technologies such as self-media, the Internet of Things, and cloud computing, massive data applications are crossing the threshold of the era of real-time analysis and value realization, which makes data streams ubiquitous in all kinds of industries. Therefore, detecting anomalies in such data streams could be very important and full of challenges. For example, in industries such as electricity and finance, data stream anomalies often contain information that can help avoiding risks and support decision making. However, most traditional anomaly detection algorithms rely on acquiring global information about the data, which is hard to apply to stream data scenarios. Currently, the reviews of the algorithm in the field of anomaly detection, both domestically and internationally, tend to focus on the exposition of anomaly detection algorithms in static data environments, while lacking in the induction and analysis of anomaly detection algorithms in the context of streaming data. As a result, unlike the existing literature reviews, this review provides the current mainstream anomaly detection algorithms in data streaming scenarios and categorizes them into three types on the basis of their fundamental principles: (1) based on offline learning; (2) based on semi-online learning; (3) based on online learning. This review discusses the current state of research on data stream anomaly detection and studies the key issues in various algorithms for detecting anomalies in data streams on the basis of concise summarization. Moreover, the review conducts a detailed comparison of the pros and cons of the algorithms. Finally, the future challenges in the field are analyzed, and future research directions are proposed.

 Artículos similares

       
 
Jingyi Chang, Yuanyuan Li and Hailong Lu    
Pyrites are widely distributed in marine sediments, the morphology of which is applied as a proxy to infer the redox conditions of bottom water, and identify diagenetic stages and hydrocarbon leakage activities. In this review, the methods used for the m... ver más

 
Yi-Chung Chiu, Loren C. Chang, Chi-Kuang Chao, Tzu-Ya Tai, Kai-Lun Cheng, Hsin-Tzu Liu, Rong Tsai-Lin, Chi-Ting Liao, Wei-Hao Luo, Guan-Po Chiu, Kai-Jie Hou, Ruo-Yu Wang, Glenn Franco Gacal, Pin-An Lin, Sittinat Denduonghatai, Tsai-Ru Yu, Jann-Yenq Liu, Amal Chandran, Kashyapa Bramha Naren Athreyas, Priyadarshan Hari, Joji John Varghese and Mustapha MeftahaddShow full author listremoveHide full author list    
Given the pervasive use of satellite and over the horizon wireless communication technology in modern society, ionospheric disturbances that can disrupt such services are a crucial consideration. Ionospheric irregularities, plasma bubbles and other pheno... ver más
Revista: Aerospace

 
Chiman Kwan    
The Curiosity rover has landed on Mars since 2012. One of the instruments onboard the rover is a pair of multispectral cameras known as Mastcams, which act as eyes of the rover. In this paper, we summarize our recent studies on some interesting image pro... ver más
Revista: Computers

 
Luis Basora, Xavier Olive and Thomas Dubot    
Anomaly detection is an active area of research with numerous methods and applications. This survey reviews the state-of-the-art of data-driven anomaly detection techniques and their application to the aviation domain. After a brief introduction to the m... ver más
Revista: Aerospace