This is the published version :
نویسنده
چکیده
This paper addresses a major challenge in data mining applications where the full information about the underlying processes, such as sensor networks or large online database, cannot be practically obtained due to physical limitations such as low bandwidth or memory, storage, or computing power. Motivated by the recent theory on direct information sampling called compressed sensing (CS), we propose a framework for detecting anomalies from these largescale data mining applications where the full information is not practically possible to obtain. Exploiting the fact that the intrinsic dimension of the data in these applications are typically small relative to the raw dimension and the fact that compressed sensing is capable of capturing most information with few measurements, our work show that spectral methods that used for volume anomaly detection can be directly applied to the CS data with guarantee on performance. Our theoretical contributions are supported by extensive experimental results on large datasets which show satisfactory performance. Keywords-stream data processing, anomaly detection, spectral methods, residual analysis, compressed sensing
منابع مشابه
A short remark on the result of Jozsef Sandor
It is pointed out that, one of the results in the recently published article, ’On the Iyengar-Madhava Rao-Nanjundiah inequality and it’s hyperbolic version’ [3] by J´ozsef S´andor is logically incorrect and new corrected result with it’s proof is presented.
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملتحلیل محتوایی و استنادی مجله علمی-پژوهشی یافته دانشگاه علوم پزشکی لرستان طی سال های 1390 تا 1394
Background: Considering the importance of content and citation analysis in understanding the needs and improving journals’ scientific quality, the objective of the present study was to content and citation analysis of published articles in Lorestan University of Medical Sciences Journal (Yafte) during 2011 to 2015. Materials and Methods: This study is a prospective longitudinal study con...
متن کاملInvestigating EFL learnersâ perception of narrative task difficulty
As this paper was a very close version of âInvestigating task difficulty: learnersâ and teachersâ perceptionsâ by Dr. Parvaneh Tavakoli (published in âInternational Journal of Applied Linguisticsâ, Vol. 19, No. 1) in terms of content, research design, analytic framework and research findings without appropriately referencing resources used or obtaining author's consent, the paper wa...
متن کاملA Combined Metaheuristic Algorithm for the Vehicle Routing Problem and its Open Version
Abstract: The Open Vehicle Routing Problem (OVRP) is one of the most important extensions of the vehicle routing problem (VRP) that has many applications in industrial and service. In the VRP, a set of customers with a specified demand of goods are given and a depot where a fleet of identical capacitated vehicles is located. We are also given the ‘‘traveling costs’’ between the depot and all th...
متن کاملتحلیل استنادی نشریه دین و سلامت دانشگاه علوم پزشکی مازندران 96-1392
Background and Purpose: Citation analysis of the articles in a journal is a method for the investigation of the validity and authenticity of the scientific articles of a journal. The present research was conducted to analyze the citations of the articles published in the Journal of Religion and Health during 2013-2017 to present the first evaluation of the scientific production of this journal....
متن کامل