Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Ensemble Prediction Algorithm of Anomaly Monitoring Based on Big Data Analysis Platform of Open-Pit Mine Slope

Published: 01 January 2018 Publication History

Abstract

With the diversification of pit mine slope monitoring and the development of new technologies such as multisource data flow monitoring, normal alert log processing system cannot fulfil the log analysis expectation at the scale of big data. In order to make up this disadvantage, this research will provide an ensemble prediction algorithm of anomalous system data based on time series and an evaluation system for the algorithm. This algorithm integrates multiple classifier prediction algorithms and proceeds classified forecast for data collected, which can optimize the accuracy in predicting the anomaly data in the system. The algorithm and evaluation system is tested by using the microseismic monitoring data of an open-pit mine slope over 6 months. Testing results illustrate prediction algorithm provided by this research can successfully integrate the advantage of multiple algorithms to increase the accuracy of prediction. In addition, the evaluation system greatly supports the algorithm, which enhances the stability of log analysis platform.

References

[1]
V. Grechka, “Tilted TI models in surface microseismic monitoring,” Geophysics, vol. 80, no. 6, pp. WC11–WC23, 2015.
[2]
J. S. Yoon, A. Zang, and O. Stephansson, “Numerical investigation on optimized stimulation of intact and naturally fractured deep geothermal reservoirs using hydro-mechanical coupled discrete particles joints model,” Geothermics, vol. 52, pp. 165–184, 2014.
[3]
J. Rutqvist, P. Jeanne, P. F. Dobson, J. Garcia, C. Hartline, L. Hutchings, A. Singh, D. W. Vasco, and M. Walters, “The Northwest Geysers EGS Demonstration Project, California – part 2: modeling and interpretation,” Geothermics, vol. 63, pp. 120–138, 2016.
[4]
G. B. White, E. A. Fisch, and U. W. Pooch, “Cooperating security managers: a peer-based intrusion detection system,” IEEE Network, vol. 10, no. 1, pp. 20–23, 1996.
[5]
O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, “An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks,” Expert Systems with Applications, vol. 29, no. 4, pp. 713–722, 2005.
[6]
H. S. Teng, K. Chen, and S. C. Lu, “Adaptive real-time anomaly detection using inductively generated sequential patterns,” in Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 278–284, Oakland, CA, USA, 1990, IEEE.
[7]
M. Y. Huang, R. J. Jasper, and T. M. Wicks, “A large scale distributed intrusion detection framework based on attack strategy analysis,” Computer Networks, vol. 31, no. 23-24, pp. 2465–2475, 1999.
[8]
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, “A sense of self for Unix processes,” in Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 120–128, Oakland, CA, USA, 1996.
[9]
T. A. Syed, R. Ismail, S. Musa, M. Nauman, and S. Khan, “A sense of others: behavioral attestation of UNIX processes on remote platforms,” in Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication - ICUIMC '12, p. 51, Kuala Lumpur, Malaysia, 2012, ACM.
[10]
E. Nohra, S. Buckman, K. Bochicchio, J. Chamieh, S. Reese, C. Merrill, D. Schuerer, and G. V. Bochicchio, “Results of a near continuous glucose monitoring technology in surgical intensive care and trauma,” Contemporary Clinical Trials, vol. 50, pp. 1–4, 2016.
[11]
S. Vinoth, L. Ajay Kumar, and E. Kumar, “Slope stability monitoring by quantification and behavior of microseismic events in an opencast coal mine,” Journal of the Geological Society of India, vol. 85, no. 4, pp. 450–456, 2015.
[12]
A. J. Choobbasti, F. Farrokhzad, and A. Barari, “Prediction of slope stability using artificial neural network (case study: Noabad, Mazandaran, Iran),” Arabian Journal of Geosciences, vol. 2, no. 4, pp. 311–319, 2009.
[13]
Z. Liu, K. Cheng, H. Li, G. Cao, D. Wu, and Y. Shi, “Exploring the potential relationship between indoor air quality and the concentration of airborne culturable fungi: a combined experimental and neural network modeling study,” Environmental Science and Pollution Research, vol. 25, no. 4, pp. 3510–3517, 2018.
[14]
P. Samui and D. P. Kothari, “Utilization of a least square support vector machine (LSSVM) for slope stability analysis,” Scientia Iranica, vol. 18, no. 1, pp. 53–58, 2011.
[15]
A. Garg, A. Garg, K. Tai, and S. Sreedeep, “Estimation of factor of safety of rooted slope using an evolutionary approach,” Ecological Engineering, vol. 64, no. 64, pp. 314–324, 2014.
[16]
P. Lu and M. S. Rosenbaum, “Artificial neural networks and grey systems for the prediction of slope stability,” Natural Hazards, vol. 30, no. 3, pp. 383–398, 2003.
[17]
L. I. Jialiang, M. A. Donghui, and W. Wei, “Assessment of potential seismic landslide hazard based on evidence theory and entropy weight grey incidence,” Journal of Central South University, vol. 47, no. 5, pp. 1730–1736, 2016.
[18]
Y. Alimohammadlou, A. Najafi, and C. Gokceoglu, “Estimation of rainfall-induced landslides using ANN and fuzzy clustering methods: a case study in Saeen Slope, Azerbaijan province, Iran,” Catena, vol. 120, pp. 149–162, 2014.
[19]
L. V. Bui, K. Stahr, and G. Clemens, “A fuzzy logic slope-form system for predictive soil mapping of a landscape-scale area with strong relief conditions,” Catena, vol. 155, pp. 135–146, 2017.
[20]
Z. Liu, D. Wu, H. Yu, W. Ma, and G. Jin, “Field measurement and numerical simulation of combined solar heating operation modes for domestic buildings based on the Qinghai-Tibetan plateau case,” Energy and Buildings, vol. 167, pp. 312–321, 2018.
[21]
A. Yang, Y. Han, Y. Pan, H. Xing, and J. Li, “Optimum surface roughness prediction for titanium alloy by adopting response surface methodology,” Results in Physics, vol. 7, pp. 1046–1050, 2017.
[22]
K. Sarkar, T. N. Singh, and A. K. Verma, “A numerical simulation of landslide-prone slope in Himalayan region—a case study,” Arabian Journal of Geosciences, vol. 5, no. 1, pp. 73–81, 2012.
[23]
K. P. N. Jayasena, L. Li, and Q. Xie, “Multi-modal multimedia big data analyzing architecture and resource allocation on cloud platform,” Neurocomputing, vol. 253, pp. 135–143, 2017.
[24]
F. Pop, C. Dobre, and A. Costan, “AutoCompBD: autonomic computing and big data platforms,” Soft Computing, vol. 21, no. 16, pp. 4497–4499, 2017.
[25]
A. Goscinski, M. Hobbs, and J. Silcock, “GENESIS: an efficient, transparent and easy to use cluster operating system,” Parallel Computing, vol. 28, no. 4, pp. 557–606, 2002.
[26]
S. U. Ahn, I. Y. Yeo, and S. O. Park, “Secure and efficient high-performance PROOF-based cluster system for high-energy physics,” The Journal of Supercomputing, vol. 70, no. 1, pp. 166–176, 2014.
[27]
R. I. Taniguchi and T. Wada, “Real-time multi-view image processing system on PC-cluster -real-time motion capture and 3D volume reconstruction systems,” Journal of the Robotics Society of Japan, vol. 19, no. 4, pp. 427–432, 2001.
[28]
A. S. Rawat, D. S. Papailiopoulos, A. G. Dimakis, and S. Vishwanath, “Locality and availability in distributed storage,” IEEE Transactions on Information Theory, vol. 62, no. 8, pp. 4481–4493, 2016.
[29]
A. Duminuco, E. Biersack, and T. En-Najjary, “Proactive replication in distributed storage systems using machine availability estimation,” in Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, p. 27, New York, NY, USA, 2016.
[30]
S. Kumar, E. Rosnes, and A. Graell i Amat, “Private information retrieval in distributed storage systems using an arbitrary linear code,” in 2017 IEEE International Symposium on Information Theory (ISIT), pp. 1421–1425, Aachen, Germany, 2017, IEEE.
[31]
S. M. Vahidipour, A. Mirzaei, and M. Rahmati, “Comparing weighted combination of hierarchical clustering based on cophenetic measure,” Intelligent Data Analysis, vol. 18, no. 4, pp. 547–559, 2014.
[32]
Y. Song, Y. Sun, and W. Shi, “A two-tiered on-demand resource allocation mechanism for VM-based data centers,” IEEE Transactions on Services Computing, vol. 6, no. 1, pp. 116–129, 2013.
[33]
D. Ryu, J. I. Jang, and J. Baik, “A transfer cost-sensitive boosting approach for cross-project defect prediction,” Software Quality Journal, vol. 25, no. 1, pp. 235–272, 2017.
[34]
H. Sobreira, C. M. Costa, I. Sousa, L. Rocha, J. Lima, P. C. M. A. Farias, P. Costa, and A. P. Moreira, “Map-matching algorithms for robot self-localization: a comparison between perfect match, iterative closest point and normal distributions transform,” Journal of Intelligent & Robotic Systems, vol. 90, no. 2, pp. 1–14, 2018.
[35]
Q. He, F. Zhuang, L. Zeng, W. Zhao, and Q. Tan, “PDMiner: a cloud computing based parallel and distributed data mining toolkit platform,” Scientia Sinica Informationis, vol. 44, no. 7, p. 871, 2014.
[36]
K. Liu, H. Fu, and H. Chen, “Research on the influencing mechanism of traditional cultural values on citizens’ behavior regarding the reuse of recycled water,” Sustainability, vol. 10, no. 2, p. 165, 2018.
[37]
H. Fu and X. Liu, “Research on the phenomenon of Chinese residents’ spiritual contagion for the reuse of recycled water based on SC-IAT,” Water, vol. 9, no. 11, p. 846, 2017.
[38]
H. Fu and X. Liu, “A study on the impact of environmental education on individuals’ behaviors concerning recycled water reuse,” Eurasia Journal of Mathematics, Science and Technology Education, vol. 13, no. 10, pp. 6715–6724, 2017.
[39]
D. Coyle, G. Prasad, and T. McGinnity, “Extracting features for a brain-computer Interface by self-organising fuzzy neural network-based time series prediction,” in The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4371–4374, San Francisco, CA, USA, 2004, IEEE.
[40]
G. Deodatis and M. Shinozuka, “Auto-regressive model for nonstationary stochastic processes,” Journal of Engineering Mechanics, vol. 114, no. 11, pp. 1995–2012, 1988.
[41]
M. Khashei, M. Bijari, and G. A. Raissi Ardali, “Improvement of auto-regressive integrated moving average models using fuzzy logic and artificial neural networks (ANNs),” Neurocomputing, vol. 72, no. 4-6, pp. 956–967, 2009.
[42]
B. Doucoure, K. Agbossou, and A. Cardenas, “Time series prediction using artificial wavelet neural network and multi-resolution analysis: application to wind speed data,” Renewable Energy, vol. 92, pp. 202–211, 2016.
[43]
P. Bangalore and L. B. Tjernberg, “An artificial neural network approach for early fault detection of gearbox bearings,” IEEE Transactions on Smart Grid, vol. 6, no. 2, pp. 980–987, 2015.
[44]
T. Van Gestel, J. A. K. Suykens, B. Baesens, S. Viaene, J. Vanthienen, G. Dedene, B. De Moor, and J. Vandewalle, “Benchmarking least squares support vector machine classifiers,” Neural Processing Letters, vol. 9, no. 3, pp. 293–300, 1999.
[45]
C. Zhou, W. Xiao, T. M. Tirpak, and P. C. Nelson, “Evolving accurate and compact classification rules with gene expression programming,” IEEE Transactions on Evolutionary Computation, vol. 7, no. 6, pp. 519–531, 2003.
[46]
M. Salvoni and P. M. Dight, “Rock damage assessment in a large unstable slope from microseismic monitoring - MMG Century mine (Queensland, Australia) case study,” Engineering Geology, vol. 210, pp. 45–56, 2016.
[47]
M. Fiorucci, R. Iannucci, L. Lenti, S. Martino, A. Paciello, A. Prestininzi, and S. Rivellino, “Nanoseismic monitoring of gravity-induced slope instabilities for the risk management of an aqueduct infrastructure in Central Apennines (Italy),” Natural Hazards, vol. 86, no. S2, pp. 345–362, 2017.
[48]
F. Torfi, R. Z. Farahani, and S. Rezapour, “Fuzzy AHP to determine the relative weights of evaluation criteria and fuzzy TOPSIS to rank the alternatives,” Applied Soft Computing, vol. 10, no. 2, pp. 520–528, 2010.
[49]
M. Franceschet, A. Montanari, A. Peron, and G. Sciavicco, “Definability and decidability of binary predicates for time granularity,” Journal of Applied Logic, vol. 4, no. 2, pp. 168–191, 2006.

Cited By

View all
  • (2022)Big Data-Driven Hierarchical Local Area Network Security Risk Event Prediction AlgorithmScientific Programming10.1155/2022/49603602022Online publication date: 1-Jan-2022
  • (2020)A Big Data Analytics Approach for Dynamic Feedback Warning for Complex SystemsComplexity10.1155/2020/76524962020Online publication date: 1-Jan-2020
  • (2020)Intelligent decision-making of online shopping behavior based on internet of thingsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2019.03.01050:C(515-525)Online publication date: 1-Feb-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Complexity
Complexity  Volume 2018, Issue
2018
9469 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 January 2018

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Big Data-Driven Hierarchical Local Area Network Security Risk Event Prediction AlgorithmScientific Programming10.1155/2022/49603602022Online publication date: 1-Jan-2022
  • (2020)A Big Data Analytics Approach for Dynamic Feedback Warning for Complex SystemsComplexity10.1155/2020/76524962020Online publication date: 1-Jan-2020
  • (2020)Intelligent decision-making of online shopping behavior based on internet of thingsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2019.03.01050:C(515-525)Online publication date: 1-Feb-2020

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media