Anomaly Detection for Analysis of Annual Inventory Data: A Quality Control Approach
نویسندگان
چکیده
0 (assuming an unbiased model), as exploited thoroughly by Deming (1964). The remainder of this article is arranged as follows. First, we describe an annual forest inventory sample design and the construction of a control chart for this design. Next, we present an example of the use of the chart for consideration of the next measurement, and finally we give some recommendations for analysts of data arising from similar designs. An Annual Forest Inventory Design For illustrative purposes, we will use the US Forest Service’s FIA units’ temporally rotating, panelized forest inventory sampling design as an example. Here we give a brief explanation of the design, which is well documented in Reams et al. (2005). In this design, the sample plots are located in proximity to a systematic triangular grid consisting of g mutually exclusive interpenetrating panels. The panels are spatially balanced and contain an approximately equal number of sample plots. That is, if the total sample size is n, then each panel consists of approximately n/g plots. The sequence of panels is measured in order, with one panel measured each year, after which the panel measurement sequence reinitiates. Therefore, if panel 1 was measured in 2001, it will also be measured in 2001 g, 2001 2g, and so on. Panel 2 would then be measured in 2002, 2002 g, 2002 2g, etc. Scott et al. (2005) describe the estimation methods that FIA uses for within-panel estimates for this design. Patterson and Reams (2005) gives an introduction to methods of combining FIA panels for the establishment of time series. Since the initiation of the rotating panel design for FIA, there have been quite a few papers focusing on using trend models for the purpose of improving annual estimates, such as Van Deusen (1996, 1999), Roesch et al. (2003), Roesch (2007), Johnson et al. (2003), and Czaplewski and Thompson (2009). Without loss of generality, we will restrict this discussion to the case of five annual panels (g 5) sampling a defined area through time. One panel will be measured each year, and starting with year 6, 20% of the plots (i.e., one panel) will be remeasured each year. Roesch (2008) gives a useful explanation of this sample frame for the interested reader. Estimates of In-Control Variance Assume that a process that has not been determined to be out of control prior to time t is in control at time t. We can then estimate the in-control process variance using the g prior panels measured from time t g through time t 1:
منابع مشابه
Detection of Mo geochemical anomaly in depth using a new scenario based on spectrum–area fractal analysis
Detection of deep and hidden mineralization using the surface geochemical data is a challenging subject in the mineral exploration. In this work, a novel scenario based on the spectrum–area fractal analysis (SAFA) and the principal component analysis (PCA) has been applied to distinguish and delineate the blind and deep Mo anomaly in the Dalli Cu–Au porphyry mineralization area. The Dalli miner...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Novel Ensemble Approach for Anomaly Detection in Wireless Sensor Networks Using Time-overlapped Sliding Windows
One of the most important issues concerning the sensor data in the Wireless Sensor Networks (WSNs) is the unexpected data which are acquired from the sensors. Today, there are numerous approaches for detecting anomalies in the WSNs, most of which are based on machine learning methods. In this research, we present a heuristic method based on the concept of “ensemble of classifiers” of data minin...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملBehavior-Based Online Anomaly Detection for a Nationwide Short Message Service
As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010