Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Mining Sequential Patterns: Generalizations and Performance Improvements
EDBT '96 Proceedings of the 5th International Conference on Extending Database Technology: Advances in Database Technology
ICDE '95 Proceedings of the Eleventh International Conference on Data Engineering
The PSP Approach for Mining Sequential Patterns
PKDD '98 Proceedings of the Second European Symposium on Principles of Data Mining and Knowledge Discovery
Mining Sequential Alarm Patterns in a Telecommunication Database
DBTel '01 Proceedings of the VLDB 2001 International Workshop on Databases in Telecommunications II
MavHome: An Agent-Based Smart Home
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Using association rules for energy conservation in wireless sensor networks
Proceedings of the 2008 ACM symposium on Applied computing
Efficient mining of sequential patterns with time constraints: Reducing the combinations
Expert Systems with Applications: An International Journal
Real anomaly detection in telecommunication multidimensional data using data mining techniques
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Hi-index | 0.00 |
Today, many industrial companies must face problems raised by maintenance. In particular, the anomaly detection problem is probably one of the most challenging. In this paper we focus on the railway maintenance task and propose to automatically detect anomalies in order to predict in advance potential failures. We first address the problem of characterizing normal behavior. In order to extract interesting patterns, we have developed a method to take into account the contextual criteria associated to railway data (itinerary, weather conditions, etc.). We then measure the compliance of new data, according to extracted knowledge, and provide information about the seriousness and possible causes of a detected anomaly.