当前位置:网站首页>Data-driven anomaly detection and early warning of item C in the May 1st mathematical modeling competition in 2021
Data-driven anomaly detection and early warning of item C in the May 1st mathematical modeling competition in 2021
2022-06-25 09:26:00 【Building block mathematical modeling】
2021 May 1st Mathematical Modeling Contest C topic Data driven anomaly detection and early warning
C topic Data driven anomaly detection and early warning
Original high-quality ideas Identify us The links below

High quality 、 original 、9.9 that will do Official account number 5 Discount sale
link :
https://mianbaoduo.com/o/bread/YZmVlJdw
C topic Data driven anomaly detection and early warning
Data description :100 A sensor 24 Hour time series data ( No data name given )

Data description diagram
Data processing :100 A sensor , Do not know the data name , It is necessary to filter variables . The first calculation is 100 The Euclidean distance between columns is clustered and then filtered . This is the simplest , An effective plan .
to update 1: Data processing 100 Column data to do matlab Of cluster Dimension reduction ,matlab Of cluster The function seems to have failed ( Maybe the dimension is high ) I don't know why , Still use here R Language helps us do well , Directly send the data set with good dimensionality reduction .
to update 2:pdist Function can solve , No correlation coefficient . Be careful , The data dimensionality reduction here should not be standardized 、 normalization , Not much to explain . The results are placed below , Just select a few of each class as the new data set , The code and data results will be sent soon .
We use the code Get the... After data processing 10 Column ( Relatively independent data ) after , Take a brief look at their trends and characteristics :

It can be seen that , The processed data has its own characteristics , It shows that our processing method is basically reliable ( For reference only ).
According to the above time series ( chart ) It can be seen that , It basically conforms to the properties given in the title : Such as the independent point of the picture in the lower right corner , The periodicity of the Chinese pictures on the .
Question 1 : Establish risk abnormal data detection model ( Give an assessment of risk and non risk )
According to the picture above , The above four properties of the time series of detection data are analyzed one by one
The following reference scheme is given :
1. Non risk outliers detection
Be careful ! There are some conceptual distinctions , The abnormal data of this problem has the same name as the abnormal value detection in machine learning , When you search for information, you should pay attention to distinguish , The abnormal data in this article refers to the logical abnormality of the sensor .
programme 1 ) The abnormal value is judged as non risk by a separate column ( It's not very realistic , According to the meaning of the topic , Just for learning )
The title mentioned that there will be independent points in the time series , Is one of the characteristics of non risk . Therefore, the first step in the abnormal data monitoring model is to remove the abnormal points of individual columns , Use simple outlier detection .( Single column outlier elimination )
programme 2*) The global outliers judge that the outliers are non risk
Fluctuations in the sensor - Outliers , There may or may not be risks , Fluctuations caused by changes in the external environment , We think it is risk-free , If at some point ...........................
边栏推荐
- socket编程——poll模型
- flutter 多语言的intl: ^0.17.0导不进去
- 高速缓冲存储器Cache的映射方式
- Emergency administrative suspension order issued Juul can continue to sell electronic cigarette products in the United States for the time being
- Voiceprint Technology (I): the past and present life of voiceprint Technology
- Level 6 easy to mix words
- The first techo day Tencent technology open day, 628 waiting for you!
- 1、 Construction of single neural network
- How to delete a blank page that cannot be deleted in word
- [final review notes] digital logic
猜你喜欢

【OpenCV】—离散傅里叶变换
![[zufe expense reimbursement] zhecai invoice reimbursement specification (taking Xinmiao reimbursement as an example), which can be passed in one trip at most](/img/28/c5c6b6d03b459745dc3735f8b39ea9.jpg)
[zufe expense reimbursement] zhecai invoice reimbursement specification (taking Xinmiao reimbursement as an example), which can be passed in one trip at most
![[IOU] intersection over union](/img/17/a3e2144dfbd9248034cae285ee85bd.jpg)
[IOU] intersection over union

Cassava tree disease recognition based on vgg16 image classification

《JVM》对象内存分配的TLAB机制与G1中的TLAB流程

SQL高级

某次比赛wp
![[final review notes] digital logic](/img/57/4431208b1c8b653f5c3f4ff4212cc3.png)
[final review notes] digital logic
![[opencv] - input and output XML and yaml files](/img/4e/7944e205c71246d0b0e3747eefca37.png)
[opencv] - input and output XML and yaml files

How to download the school logo, school name and corporate logo on a transparent background without matting
随机推荐
Format analysis and explanation of wav file
cazy長安戰役八卦迷宮
【OpenCV】—离散傅里叶变换
C#启动程序传递参数丢失双引号,如何解决?
浅谈Mysql底层索引原理
Compile time annotations for custom annotations (retentionpolicy.class)
Flitter gets the height of the top status bar
[competition - Rural Revitalization] experience sharing of Zhejiang Rural Revitalization creative competition
sklearn PolynomialFeatures的具体用法
C language: bubble sort
C language: count the number of words in a paragraph
Summary of hardfault problem in RTOS multithreading
[learn C from me and master the key to programming] insertion sort of eight sorts
四、卷积神经网络(Convolution Neural Networks)
通过客户经理的开户二维码开股票账户安全吗?
5、 Project practice --- identifying man and horse
CSV parameterization in JMeter
备战2022年金九银十必问的1000道Android面试题及答案整理,彻底解决面试的烦恼
Voiceprint Technology (VII): the future of voiceprint Technology
行业春寒回暖,持续承压的酒店企业于何处破局?