5.1.1 Objective and Scope: Jyenis 2020
5.1.1 Objective and Scope: Jyenis 2020
5.1 Introduction
The production enterprise is taken into consideration, They have a tendency to make use
of numerous heavy equipment along with massive motors, pumps, pipes, furnaces, con-
veyor belts, haul trucks, dozers, graded electric powered shovels, etc. These are regularly
taken into consideration the maximum vital belongings for their operations. Therefore,
the integrity and reliability of this equipment are regularly the core consciousness in
their Asset Management programs.
Therefore, the ability to detect anomalies earlier and mitigate dangers is a valuable
capability that similarly permits stopping unplanned downtime, needless maintenance
(condition-based vs. mandatory maintenance) and also will allow an extra powerful
manner of handling vital additives for these assets. .
Anomaly detection or outlier detection identifies rare items, observations, patterns, out-
liers, or anomalies that substantially range from the ordinary items or patterns. Anomalies
are occasionally known as outliers, novelties, noise, deviations, or exceptions.(Jyenis
(2020))
There are diverse domain names that enforce this method which includes fault detection,
intrusion, fraud detection, fitness care monitoring, detecting environment disturbances,
and plenty of more. Typically, the anomalous gadgets will translate to a few type of
trouble which includes::
• Bank fraud,
• Structural defect,
• Medical problem,
• Error, etc.
Objective:
Our objective is to find anomalies in the time series data with unsupervised machine
learning algorithms.
5.3.1 WorkFlow:
2.Train the ten available anomaly detection models with the preprocessed data.
26
5.3.2 Modules Used:
5.3.4 Methodology:
1.We first preprocess the given time series data and train it with each of the 10 models.
2.Each model will train with this data and will assign every datapoint a value of either 0
or 1.
3.If an outlier is detected, that data point will be given a value of 1 otherwise a value of
0 will be given.
4.We then plot the anomalies for the data given by the model to visualize
27
more than 4 models, then it is considered as an anomaly.
6.We also predicted the anomalies in new data using these pre-trained models.
The above figure(5.1) shows the results of all the models compiled together for anomaly
detection in a given dataset.Here a 0́’ is assigned for non anomaly datapoint and 1́ for an
anomaly datapoint.
28
Figure 5.2: Plot of Anomalies using Isolation Forest Model
Figure 5.3: 3D TSNE Plot for Anomalies Using Isolation Forest Model
Anomaly detection alone or coupled with the prediction capability can efficiently capture
the fraud and find out bizarre activity in huge and complicated datasets. It can be vital
for banking security, medicine, marketing, herbal sciences, and production industries
depending on clean and secure operations. With Artificial Intelligence, organizations can
grow the effectiveness and safety in their virtual operations, preferably with our help.
We developed a scoring system for determining whether a given data point is an anomaly
or not. We used various models available for this system, and we can also predict
29
anomalies in new data using this system. In future, various other models and scoring
systems can be developed for detecting anomalies in unlabeled data.
We can also forecast new data using previous data and check the anomalies in that future
data so that we can predict any errors as well.
30
REFERENCES
1. M. Ali (2020). Time Series Anomaly Detection with
PyCaret. https : / / towardsdatascience . com /
time-series-anomaly-detection-with-pycaret-706a6e2b2427.
6. J. Dias, P. Godinho, and P. Torres, Machine learning for customer churn prediction in
retail banking. In International Conference on Computational Science and Its Applica-
tions. Springer, 2020.
10. N. Gopee (). Classifying cifar-10 images using unsupervised feature & ensemble
learning.
12. N. Laptev, S. Amizadeh, and I. Flint, Generic and scalable framework for automated
time-series anomaly detection. In Proceedings of the 21th ACM SIGKDD international
conference on knowledge discovery and data mining. 2015.
13. Y. Li and B. Wang, A study on customer churn of commercial banks based on learn-
ing from label proportions. In 2018 IEEE International Conference on Data Mining
Workshops (ICDMW). IEEE, 2018.
37
15. M. Munir, S. A. Siddiqui, A. Dengel, and S. Ahmed (2018). Deepant: A deep learning
approach for unsupervised anomaly detection in time series. IEEE Access, 7, 1991–2005.
19. E. Real, C. Liang, D. So, and Q. Le, Automl-zero: evolving machine learning algo-
rithms from scratch. In International Conference on Machine Learning. PMLR, 2020.
21. S. Sharma, A. Aggarwal, and T. Choudhury, Breast cancer detection using machine
learning algorithms. In 2018 International Conference on Computational Techniques,
Electronics and Mechanical Systems (CTEMS). IEEE, 2018.
24. M. Teng, Anomaly detection on time series. In 2010 IEEE International Conference on
Progress in Informatics and Computing, volume 1. IEEE, 2010.
27. J. Zhao and X.-H. Dang, Bank customer churn prediction based on support vector
machine: Taking a commercial bank’s vip customer churn as the example. In 2008
4th International Conference on Wireless Communications, Networking and Mobile
Computing. IEEE, 2008.
38