Show simple item record

dc.contributor.authorDuong, Quang-Huy
dc.contributor.authorRamampiaro, Heri
dc.contributor.authorNørvåg, Kjetil
dc.date.accessioned2019-03-04T14:58:37Z
dc.date.available2019-03-04T14:58:37Z
dc.date.created2018-07-25T19:24:40Z
dc.date.issued2018
dc.identifier.citationApplied intelligence (Boston). 2018, 48 (12), 4805-4823.nb_NO
dc.identifier.issn0924-669X
dc.identifier.urihttp://hdl.handle.net/11250/2588570
dc.description.abstractDetection of changes in streaming data is an important mining task, with a wide range of real-life ap- plications. Numerous algorithms have been proposed to efficiently detect changes in streaming data. However, the limitation of existing algorithms is that they as- sume that data are generated independently. In partic- ular, temporal dependencies of data in a stream are still not thoroughly studied. Motivated by this, in this work we propose a new efficient method to detect changes in streaming data by exploring the temporal dependencies of data in the stream. As part of this, we introduce a new statistical model called the candidate change point (CCP) model, with which the main idea is to compute the probabilities of finding change points in the stream. The computed probabilities are used to generate a dis- tribution, which is, in turn, used in statistical hypoth- esis tests to determine the candidate changes. We use the CCP model to develop a new algorithm called Can- didate Change Point Detector (CCPD), which detects change points in linear time, and is thus applicable for real-time applications. Our extensive experimental eval- uation demonstrates the efficiency and the feasibility of our approach.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.relation.urihttp://www.idi.ntnu.no/~heri/papers/Quang-APIN2018.pdf
dc.titleApplying temporal dependence to detect changes in streaming datanb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber4805-4823nb_NO
dc.source.volume48nb_NO
dc.source.journalApplied intelligence (Boston)nb_NO
dc.source.issue12nb_NO
dc.identifier.doi10.1007/s10489-018-1254-7
dc.identifier.cristin1598696
dc.relation.projectAndre: 548172nb_NO
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Applied intelligence] Locked until 31.7.2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/s10489-018-1254-7nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record