{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T05:09:39Z","timestamp":1736140179515,"version":"3.32.0"},"reference-count":31,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T00:00:00Z","timestamp":1530748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61473266","61673404","61673404"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Research Award Fund for Outstanding Young Teachers in Henan Provincial Institutions of Higher Education of China","award":["2014GGJS-004"]},{"name":"the Program for Science & Technology Innovation Talents in Universities of Henan Province in China","award":["16HASTIT041"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"The effect of the application of machine learning on data streams is influenced by concept drift, drift deviation, and noise interference. This paper proposes a data stream anomaly detection algorithm combined with control chart and sliding window methods. This algorithm is named DCUSUM-DS (Double CUSUM Based on Data Stream), because it uses a dual mean value cumulative sum. The DCUSUM-DS algorithm based on nested sliding windows is proposed to satisfy the concept drift problem; it calculates the average value of the data within the window twice, extracts new features, and then calculates accumulated and controlled graphs to avoid misleading by interference points. The new algorithm is simulated using drilling engineering industrial data. Compared with automatic outlier detection for data streams (A-ODDS) and with sliding nest window chart anomaly detection based on data streams (SNWCAD-DS), the DCUSUM-DS can account for concept drift and shield a small amount of interference deviating from the overall data. Although the algorithm complexity increased from 0.1 second to 0.19 second, the classification accuracy receiver operating characteristic (ROC) increased from 0.89 to 0.95. This meets the needs of the oil drilling industry data stream with a sampling frequency of 1 Hz, and it improves the classification accuracy.<\/jats:p>","DOI":"10.3390\/sym10070264","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T14:52:44Z","timestamp":1530802364000},"page":"264","source":"Crossref","is-referenced-by-count":6,"title":["The Application of a Double CUSUM Algorithm in Industrial Data Stream Anomaly Detection"],"prefix":"10.3390","volume":"10","author":[{"given":"Guang","family":"Li","sequence":"first","affiliation":[{"name":"School of Electrical Engineering, Zhengzhou University, Zhengzhou 450001, China"},{"name":"The 22th Research Institute of China Electronics Technology Group Corporation, Xinxiang 453003, China"}]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Zhengzhou University, Zhengzhou 450001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0811-0223","authenticated-orcid":false,"given":"Jing","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Zhengzhou University, Zhengzhou 450001, China"}]},{"given":"Caitong","family":"Yue","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Zhengzhou University, Zhengzhou 450001, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"ref_1","first-page":"70","article-title":"A review: Pre-warning system of oil-drilling engineering","volume":"38","author":"Li","year":"2017","journal-title":"J. Zhengzhou Univ. (Eng. Sci.)"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, G., Wang, J., Liang, J., and Yue, C. (2018). Application of sliding nest window control chart in data stream anomaly detection. Symmetry, 10.","DOI":"10.3390\/sym10040113"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Siddique, K., Akhtar, Z., Lee, H.G., Kim, W., and Kim, Y. (2017). Toward Bulk Synchronous Parallel-Based Machine Learning Techniques for Anomaly Detection in High-Speed Big Data Networks. Symmetry, 9.","DOI":"10.3390\/sym9090197"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Zabihi, M., Rad, A.B., Kiranyaz, S., Gabbouj, M., and Katsaggelos, A.K. (2016, January 11\u201314). Heart Sound Anomaly and Quality Detection using Ensemble of Neural Networks without Segmentation. Proceedings of the 2016 Computing in Cardiology Conference (CinC), Vancouver, BC, Canada.","DOI":"10.22489\/CinC.2016.180-213"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Li, F., Wang, H., Zhou, G., Yu, D., Li, J., and Gao, H. (2017). Anomaly Detection in Gas Turbine Fuel Systems Using a Sequential Symbolic Method. Energies, 10.","DOI":"10.20944\/preprints201704.0071.v1"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lan, K., Fong, S., Song, W., Vasilakos, A.V., and Millham, R.C. (2017). Self-Adaptive Pre-Processing Methodology for Big Data Stream Mining in Internet of Things Environmental Sensor Monitoring. Symmetry, 9.","DOI":"10.3390\/sym9100244"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gil, A., Sanz-Bobi, M.A., and Rodr\u00edguez-L\u00f3pez, M.A. (2018). Behavior Anomaly Indicators Based on Reference Patterns\u2014Application to the Gearbox and Electrical Generator of a Wind Turbine. Energies, 11.","DOI":"10.3390\/en11010087"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.eswa.2017.06.005","article-title":"Multidimensional Surrogate stability to Detect Data Stream Concept Drift","volume":"87","author":"Costa","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.neucom.2017.01.078","article-title":"A Survey on Data Preprocessing for Data Stream Mining: Current Status and Future Directions","volume":"239","author":"Krawczyk","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Jankov, D., Sikdar, S., Mukherjee, R., Teymourian, K., and Jermaine, C. (2017, January 19\u201323). Real-time High Performance Anomaly Detection over Data Streams: Grand Challenge. Proceedings of the 11th ACM International Conference on Distributed and Event-Based Systems, Barcelona, Spain.","DOI":"10.1145\/3093742.3095102"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/TII.2016.2613683","article-title":"Unsupervised Gesture Segmentation by Motion Detection of a Real-Time Data Stream","volume":"13","author":"Neto","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_12","first-page":"289","article-title":"Sliding Window-based Fault Detection from High-dimensional Data Streams","volume":"47","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s00362-016-0769-4","article-title":"Monitoring the Ratio of Population Means of a Bivariate Normal Distribution Using CUSUM type Control Charts","volume":"59","author":"Tran","year":"2018","journal-title":"Stat. Pap."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1097\/IOP.0000000000001046","article-title":"Anomalous Sphenoid Diploe Vein: Case Report Highlighting the Value of Careful CT Evaluation Prior to Decompression Surgery","volume":"34","author":"Rafaelof","year":"2018","journal-title":"Ophthalmic Plast. Reconstr. Surg."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1080\/0951192X.2017.1363410","article-title":"Transfer Learning for Aluminium Extrusion Electricity Consumption Anomaly Detection Via Deep Neural Networks","volume":"31","author":"Liang","year":"2018","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Aytekin, C., Ni, X., Cricri, F., and Aksu, E. (arXiv, 2018). Clustering and Unsupervised Anomaly Detection with L2 Normalized Deep Auto-Encoder Representations, arXiv.","DOI":"10.1109\/IJCNN.2018.8489068"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s13369-017-2634-8","article-title":"Feature selection of Denial-of-Service attacks using entropy and granular computing","volume":"43","author":"Khan","year":"2018","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"193","DOI":"10.12677\/JOGT.2017.394055","article-title":"Study on drilling engineering prewarning based on random forests","volume":"39","author":"Li","year":"2017","journal-title":"J. Oil Gas Technol."},{"key":"ref_19","first-page":"444","article-title":"Anomaly event Detection for sit-to-stand Transition Recognition to improve Mariner Physical activity Classification during a Sea Voyage","volume":"29","author":"Youn","year":"2018","journal-title":"Biomed. Res."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/TKDE.2016.2526675","article-title":"Online Ensemble Learning of Data Streams with Gradually Evolved classes","volume":"28","author":"Sun","year":"2016","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.aei.2015.10.002","article-title":"Exploration and evaluation of AR, MPCA and KL anomaly detection techniques to embankment dam piezometer data","volume":"29","author":"Jung","year":"2015","journal-title":"Adv. Eng. Inf."},{"key":"ref_22","first-page":"26","article-title":"A Low-Complexity Model-Free Approach for Real-Time Cardiac Anomaly Detection Based on Singular Spectrum Analysis and Nonparametric Control Charts","volume":"15","author":"Lang","year":"2017","journal-title":"Technologies"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF00116900","article-title":"Learning in the presence of concept drift and hidden contexts","volume":"23","author":"Widmer","year":"1996","journal-title":"Mach. Learn."},{"key":"ref_24","unstructured":"Ahn, K., Cormode, G., Guha, S., McGregor, A., and Wirth, A. (2015, January 6\u201311). Correlation Clustering in Data Streams. Proceedings of the International Conference on Machine Learning, Lille, France."},{"key":"ref_25","unstructured":"Chen, Q., Chen, L., Lian, X., Liu, Y., and Yu, J.X. (2007, January 23\u201327). Indexable PLA for Efficient Similarity Search. Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.camwa.2008.10.060","article-title":"Mining frequent closed itemsets from a landmark window over online data streams","volume":"57","author":"Liu","year":"2009","journal-title":"Comput. Math. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., and Widom, J. (2002, January 3\u20135). Models and issues in data stream systems. Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madison, WI, USA.","DOI":"10.1145\/543613.543615"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/JSYST.2014.2323266","article-title":"Real-time Detection of False Data Injection in smart Grid Networks: An adaptive CUSUM Method and Analysis","volume":"10","author":"Huang","year":"2016","journal-title":"IEEE Syst. J."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Cordeschi, N., Shojafar, M., Amendola, D., and Baccarelli, E. (2016). Energy-saving QoS resource management of virtualized networked data centers for Big Data Stream Computing. Big Data: Concepts, Methodologies, Tools, and Applications, IGI Global.","DOI":"10.4018\/978-1-4666-9840-6.ch040"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MNET.2016.7437025","article-title":"Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: Review, challenges, and a case study","volume":"30","author":"Baccarelli","year":"2016","journal-title":"IEEE Netw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sadik, S., and Le, G. (2011, January 20\u201322). An adaptive Outlier Detection Technique for Data Streams. Proceedings of the International Conference on Scientific and Statistical Database Management, Portland, OR, USA.","DOI":"10.1007\/978-3-642-22351-8_52"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/264\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:35:20Z","timestamp":1736112920000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":31,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["sym10070264"],"URL":"https:\/\/doi.org\/10.3390\/sym10070264","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2018,7,5]]}}}