An Explore–Exploit Workload-Bounded Strategy for Rare Event Detection in Massive Energy Sensor Time Series

Author:

Ting Lo Pang-Yun1ORCID,Chao Rong1ORCID,Chang Chai-Shi1ORCID,Chuang Kun-Ta1ORCID

Affiliation:

1. National Cheng Kung University, Tainan, Taiwan

Abstract

With the rise of Internet-of-Things devices, the analysis of sensor-generated energy time series data has become increasingly important. This is especially crucial for detecting rare events like unusual electricity usage or water leakages in residential and commercial buildings, which is essential for optimizing energy efficiency and reducing costs. However, existing detection methods on large-scale data may fail to correctly detect rare events when they do not behave significantly differently from standard events or when their attributes are non-stationary. Additionally, the capacity of computational resources to analyze all time series data generated by an increasing number of sensors becomes a challenge. This situation creates an emergent demand for a workload-bounded strategy. To ensure both effectiveness and efficiency in detecting rare events in massive energy time series, we propose a heuristic-based framework called HALE . This framework utilizes an explore–exploit selection process that is specifically designed to recognize potential features of rare events in energy time series. HALE involves constructing an attribute-aware graph to preserve the attribute information of rare events. A heuristic-based random walk is then derived based on partial labels received at each time period to discover the non-stationarity of rare events. Potential rare event data are selected from the attribute-aware graph, and existing detection models are applied for final confirmation. Our study, which was conducted on three actual energy datasets, demonstrates that the HALE framework is both effective and efficient in its detection capabilities. This underscores its practicality in delivering cost-effective energy monitoring services.

Funder

National Science and Technology Council

Publisher

Association for Computing Machinery (ACM)

Reference45 articles.

1. ST-DeepHAR: Deep learning model for human activity recognition in IoHT applications;Abdel-Basset Mohamed;IEEE Internet of Things Journal,2021

2. Ahmed Abdulaal, Zhuanghua Liu, and Tomer Lancewicki. 2021. Practical approach to asynchronous multivariate time series anomaly detection and localization. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 2485–2494.

3. Unsupervised and scalable subsequence anomaly detection in large data series;Boniol Paul;The VLDB Journal,2021

4. Paul Boniol, John Paparrizos, Themis Palpanas, and Michael J. Franklin. 2021. SAND: Streaming subsequence anomaly detection. Proceedings of the VLDB Endowment 14 (2021), 1717–1729. Retrieved from https://api.semanticscholar.org/CorpusID:235677365

5. A new convolutional neural network-based system for NILM applications;Ciancetta Fabrizio;IEEE Transactions on Instrumentation and Measurement,2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3