Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Explore–Exploit Workload-Bounded Strategy for Rare Event Detection in Massive Energy Sensor Time Series

Published: 28 June 2024 Publication History

Abstract

With the rise of Internet-of-Things devices, the analysis of sensor-generated energy time series data has become increasingly important. This is especially crucial for detecting rare events like unusual electricity usage or water leakages in residential and commercial buildings, which is essential for optimizing energy efficiency and reducing costs. However, existing detection methods on large-scale data may fail to correctly detect rare events when they do not behave significantly differently from standard events or when their attributes are non-stationary. Additionally, the capacity of computational resources to analyze all time series data generated by an increasing number of sensors becomes a challenge. This situation creates an emergent demand for a workload-bounded strategy. To ensure both effectiveness and efficiency in detecting rare events in massive energy time series, we propose a heuristic-based framework called HALE. This framework utilizes an explore–exploit selection process that is specifically designed to recognize potential features of rare events in energy time series. HALE involves constructing an attribute-aware graph to preserve the attribute information of rare events. A heuristic-based random walk is then derived based on partial labels received at each time period to discover the non-stationarity of rare events. Potential rare event data are selected from the attribute-aware graph, and existing detection models are applied for final confirmation. Our study, which was conducted on three actual energy datasets, demonstrates that the HALE framework is both effective and efficient in its detection capabilities. This underscores its practicality in delivering cost-effective energy monitoring services.

References

[1]
Mohamed Abdel-Basset, Hossam Hawash, Ripon Kumar Chakrabortty, Michael J. Ryan, Mohamed Elhoseny, and Houbing Song. 2021. ST-DeepHAR: Deep learning model for human activity recognition in IoHT applications. IEEE Internet of Things Journal 8 (2021), 4969–4979.
[2]
Ahmed Abdulaal, Zhuanghua Liu, and Tomer Lancewicki. 2021. Practical approach to asynchronous multivariate time series anomaly detection and localization. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 2485–2494.
[3]
Paul Boniol, Michele Linardi, Federico Roncallo, Themis Palpanas, Mohammed Meftah, and Emmanuel Remy. 2021. Unsupervised and scalable subsequence anomaly detection in large data series. The VLDB Journal 30, 6 (2021), 909–931.
[4]
Paul Boniol, John Paparrizos, Themis Palpanas, and Michael J. Franklin. 2021. SAND: Streaming subsequence anomaly detection. Proceedings of the VLDB Endowment 14 (2021), 1717–1729. Retrieved from https://api.semanticscholar.org/CorpusID:235677365
[5]
Fabrizio Ciancetta, Giovanni Bucci, Edoardo Fiorucci, Simone Mari, and Andrea Fioravanti. 2021. A new convolutional neural network-based system for NILM applications. IEEE Transactions on Instrumentation and Measurement 70, 1–12 (2021), 1501112.
[6]
Zeki M. Cinar, Abubakar A. Nuhu, Qasim Zeeshan, Orhan Korhan, Mohammed Asmael, and Babak Safaei. 2020. Machine learning in predictive maintenance towards sustainable smart manufacturing in industry 4.0. Sustainability 12, 19 (2020), 8211. Retrieved from https://api.semanticscholar.org/CorpusID:225160331
[7]
Moshe Eliasof, Eldad Haber, and Eran Treister. 2022. pathGCN: Learning general graph spatial operators from paths. In Proceedings of the International Conference on Machine Learning (ICML ’22). 5878–5878. Retrieved from https://api.semanticscholar.org/CorpusID:250341039
[8]
Martin Ester, Hans-Peter Kriegel, Jörg Sander, and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD ’96). 226–231.
[9]
Aditya Grover and Jure Leskovec. 2016. node2cec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’16). 855–865.
[10]
Manoj Gulati and Pandarasamy Arjunan. 2022. LEAD1.0: A large-scale annotated dataset for energy anomaly detection in commercial buildings. In Proceedings of the 13th ACM International Conference on Future Energy Systems (e-Energy ’22). 485–488. https://api.semanticscholar.org/CorpusID:247839323
[11]
Siho Han and Simon S. Woo. 2022. Learning sparse latent graph representations for anomaly detection in multivariate time series. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ’22). 2977–2986.
[12]
George W. Hart. 1992. Nonintrusive appliance load monitoring. Proceedings of the IEEE 80, 12 (1992), 1870–1891.
[13]
Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, and Abbes Amira. 2020. Effective non-intrusive load monitoring of buildings based on a novel multi-descriptor fusion with dimensionality reduction. Applied Energy 279 (2020), 115872.
[14]
Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, and Abbes Amira. 2020. Robust event-based non-intrusive appliance recognition using multi-scale wavelet packet tree and ensemble bagging tree. Applied Energy 267 (2020), 114877.
[15]
Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, and Abbes Amira. 2021. Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier. Sustainable Cities and Society 67 (2021), 102764.
[16]
Bingnan Hou, Changsheng Hou, Tongqing Zhou, Zhiping Cai, and Fang Liu. 2021. Detection and characterization of network anomalies in large-scale RTT time series. IEEE Transactions on Network and Service Management 18, 1 (2021), 793–806.
[17]
Hafiz M. Hussain, Nadeem Javaid, Sohail Iqbal, Qadeer U. Hasan, Khursheed Aurangzeb, and Musaed A. Alhussein. 2018. An efficient demand side management system with a new optimized home energy management controller in smart grid. Energies 11 (2018), 190. Retrieved from https://api.semanticscholar.org/CorpusID:116236677
[18]
Hervé Jégou, Matthijs Douze, and Cordelia Schmid. 2011. Product quantization for nearest neighbor search. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 1 (2011), 117–128.
[19]
Di Jin, Rui Wang, Meng Ge, Dongxiao He, Xiang Li, Wei Lin, and Weixiong Zhang. 2022. RAW-GNN: RAndom walk aggregation based graph neural network. In Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI ’22). 2108–2114. Retrieved from https://api.semanticscholar.org/CorpusID:250089356
[20]
Lei Jin, Xiaojuan Wang, Jiaming Chu, and Mingshu He. 2022. Human activity recognition machine with an anchor-based loss function. IEEE Sensors Journal 22 (2022), 741–756.
[21]
Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from
[22]
Yifan Li, Xiao-Juan Peng, Jia Zhang, Zhiyong Li, and Ming Wen. 2023. DCT-GAN: Dilated convolutional transformer-based GAN for time series anomaly detection. IEEE Transactions on Knowledge and Data Engineering 35 (2023), 3632–3644.
[23]
Fang Liu, Yanwei Yu, Peng Song, Yangyang Fan, and Xiangrong Tong. 2020. Scalable KDE-based top-n local outlier detection over large-scale data streams. Knowledge-Based Systems 204 (2020), 106186.
[24]
Sedigheh Mahdavi, Shima Khoshraftar, and Aijun An. 2018. dynnode2vec: Scalable dynamic network embedding. In Proceedings of the IEEE International Conference on Big Data (Big Data ’18). 3762–3765.
[25]
Alessandro Massaro, Antonio Panarese, and Angelo Maurizio Galiano. 2021. Technological platform for hydrogeological risk computation and water leakage detection based on a convolutional neural network. In Proceedings of the IEEE International Workshop on MetroInd 4.0 & IoT (MetroInd4.0&IoT ’21). 225–230.
[26]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. In Proceedings of the Workshop at International Conference on Learning Representations (ICLR ’13).
[27]
Mohsin Munir, Shoaib A. Siddiqui, Andreas R. Dengel, and Sheraz Ahmed. 2019. DeepAnT: A deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7 (2019), 1991–2005.
[28]
Sebastian Münzner, Philip Schmidt, Attila Reiss, Michael Hanselmann, Rainer Stiefelhagen, and Robert Dürichen. 2017. CNN-based sensor fusion techniques for multimodal human activity recognition. In Proceedings of the ACM International Symposium on Wearable Computers (ISWC ’17). 158–165.
[29]
Gyoung S. Na, Dong H. Kim, and Hwanjo Yu. 2018. DILOF: Effective and memory efficient local outlier detection in data streams. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD ’18). 1993–2002.
[30]
Raghavendra Chalapathy and Sanjay Chawla 2019. Deep learning for anomaly detection: A survey. arXiv:1901.03407. Retrieved from
[31]
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. DeepWalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining (KDD ’14). 701–710.
[32]
Andrian Putina and Dario Rossi. 2021. Online anomaly detection leveraging stream-based clustering and real-time telemetry. IEEE Transactions on Network and Service Management 18, 1 (2021), 839–854.
[33]
Marco Schreyer, Timur Sattarov, Damian Borth, Andreas R. Dengel, and Bernd Reimer. 2017. Detection of anomalies in large scale accounting data using deep autoencoder networks. arXiv:1709.05254. Retrieved from
[34]
William Stallings. 2010. Computer Organization and Architecture: Designing for Performance. Prentice Hall.
[35]
Shreshth Tuli, Giuliano Casale, and Nicholas R. Jennings. 2022. TranAD: Deep transformer networks for anomaly detection in multivariate time series data. Proceedings of the VLDB Endowment 15 (February 2022), 1201–1214. DOI:
[36]
Wibisono, S., Anwar, M. T., Supriyanto, A., & Amin, I. H. A. (2021, April). Multivariate weather anomaly detection using DBSCAN clustering algorithm. In Journal of Physics: Conference Series 1869, 1 (April 2021), 012077.
[37]
Yuxin Zhang, Yiqiang Chen, Jindong Wang, and Zhiwen Pan. 2021. Unsupervised deep anomaly detection for multi-sensor time-series signals. IEEE Transactions on Knowledge and Data Engineering 35 (2021), 2118–2132.
[38]
Jiehui Xu, Haixu Wu, Jianmin Wang, and Mingsheng Long. 2022. Anomaly transformer: Time series anomaly detection with association discrepancy. In Proceedings of the International Conference on Learning Representations (ICLR ’22). Retrieved from https://openreview.net/forum?id=LzQQ89U1qm_
[39]
Sook-Chin Yip, Wooi-Nee Tan, ChiaKwang Tan, Ming-Tao Gan, and Koksheik Wong. 2018. An anomaly detection framework for identifying energy theft and defective meters in smart grids. International Journal of Electrical Power & Energy Systems 101 (2018), 189–203. Retrieved from https://api.semanticscholar.org/CorpusID:116787882
[40]
Mingzhi Zeng, Haoxiang Gao, Tong Yu, Ole J. Mengshoel, Helge Langseth, Ian R. Lane, and Xiaobing Liu. 2018. Understanding and improving recurrent networks for human activity recognition by continuous attention. In Proceedings of the ACM International Symposium on Wearable Computers (ISWC ’18). 56–63.
[41]
Haowen Zhang, Yabo Dong, Jing Li, and Duanqing Xu. 2022. Dynamic time warping under product quantization, with applications to time-series data similarity search. IEEE Internet of Things Journal 9, 14 (2022), 11814–11826.
[42]
Wei Zhang and Chris Challis. 2021. Virtual-SRE for monitoring large scale time-series data. In Proceedings of the IEEE International Conference on Big Data (Big Data ’21). 2009–2018.
[43]
Yong Zhang, Zhao Zhang, Yu Zhang, Jie Bao, Yifan Zhang, and Haiqin Deng. 2019. Human activity recognition based on motion sensor using U-net. IEEE Access 7 (2019), 75213–75226.
[44]
Ge Zheng. 2021. A novel attention-based convolution neural network for human activity recognition. IEEE Sensors Journal 21 (2021), 27015–27025.
[45]
Xiaokang Zhou, Wei Liang, Kevin I.-K. Wang, Hao Wang, Laurence T. Yang, and Qun Jin. 2020. Deep-learning-enhanced human activity recognition for internet of healthcare things. IEEE Internet of Things Journal 7, 7 (2020), 6429–6438.

Index Terms

  1. An Explore–Exploit Workload-Bounded Strategy for Rare Event Detection in Massive Energy Sensor Time Series

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Intelligent Systems and Technology
      ACM Transactions on Intelligent Systems and Technology  Volume 15, Issue 4
      August 2024
      563 pages
      EISSN:2157-6912
      DOI:10.1145/3613644
      • Editor:
      • Huan Liu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2024
      Online AM: 17 April 2024
      Accepted: 15 March 2024
      Revised: 22 December 2023
      Received: 04 June 2023
      Published in TIST Volume 15, Issue 4

      Check for updates

      Author Tags

      1. Heuristic learning
      2. graph embedding
      3. time series analysis
      4. rare event detection
      5. large-scale data analysis
      6. energy data analysis

      Qualifiers

      • Research-article

      Funding Sources

      • National Science and Technology Council (NSTC)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 133
        Total Downloads
      • Downloads (Last 12 months)133
      • Downloads (Last 6 weeks)21
      Reflects downloads up to 01 Nov 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media