Real-Time Anomaly Detection with LSTM-Autoencoder Network on Microcontrollers for Industrial Applications
Abstract
1 Introduction
2 Literature Survey
3 Data Collection
3.1 Execution of Data Collection
3.2 Real-Time Anomaly Logging with Delay Compensation
4 Methodology
4.1 Preprocessing
4.2 Synthetic Data Generation
4.3 Model Architecture
4.3.1 Convolutional Autoencoder (CAE).
4.3.2 Integration of BiLSTM for Anomaly Classification.
4.4 Deployment on Arduino
4.4.1 Quantization Process.
4.4.2 Model Conversion Tools.
4.4.3 Memory Allocation.
4.4.4 Real-Time Inference and Anomaly Detection.
5 Discussion
6 Conclusion
References
Index Terms
- Real-Time Anomaly Detection with LSTM-Autoencoder Network on Microcontrollers for Industrial Applications
Recommendations
Real-time anomaly detection on time series of industrial furnaces: A comparison of autoencoder architectures
AbstractAnomaly detection in industrial environments aims at detecting anomalies in the monitoring data of industrial machinery or equipment, as soon as possible, preferably presenting real-time alarms, to alert the monitoring staff and start maintenance ...
Graphical abstractDisplay Omitted
Highlights- Definition and implementation of an online Anomaly Detection approach.
- Comparison of different architectures of the autoencoder-based models.
- Correct recognition of normal signal and detection of synthetic anomalies.
- ...
Fusing anomaly detection with false positive mitigation methodology for predictive maintenance under multivariate time series
AbstractAnomaly detection aims to identify observations that differ significantly from the majority of the data. Time series, which are data with a temporal component, is often used for anomaly detection. Identifying anomalies is not perfect and may ...
Highlights- Proposed methodology decreases impact from FPs in anomaly detection.
- A thorough comparison with latest SOA methods is performed.
- We also provide a series of hints for applying the methodology.
- High sensitivity methods are more ...
ADWICE – anomaly detection with real-time incremental clustering
ICISC'04: Proceedings of the 7th international conference on Information Security and CryptologyAnomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in real-time places hard requirements on the algorithms used, making many proposed ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 49Total Downloads
- Downloads (Last 12 months)49
- Downloads (Last 6 weeks)49
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in