Synthesis of Monitoring Rules via Data Mining

2019-08-29
Ketenci, Ahmet
Aydın Göl, Ebru
In online monitoring of critical systems, it is important to detect an abnormal behavior as early as possible. Signal temporal logic (STL) formulas are used to specify these undesired behaviors due to the expressivity and interpretability of the logic and the existence of efficient online monitoring algorithms. In this paper, we present a new method to synthesize formulas that belong to past time fragment of STL from a labeled dataset. In particular, we consider a dataset that includes signals and their labels marking the moment of occurrence of undesired behaviors, and propose a formula synthesis algorithm based on data mining algorithms. We first transform the dataset into a new dataset with attributes encoding basic temporal formulas, then learn a classifier from the transformed dataset and finally generate a ptSTL formula from the classifier. The proposed method requires much less computational time compared to similar algorithms and achieves competitive detection performance as shown in the case studies. © 2019 American Automatic Control Council.
American Control Conference, ACC 2019

Suggestions

Efficient Online Monitoring and Formula Synthesis with Past STL
Aydın Göl, Ebru (2018-06-25)
In online monitoring, it is crucial to detect a deviation from normal behavior as soon as it occurs. During online monitoring, the system traces are checked against monitoring rules in real-time to detect such deviations. In general, the rules are defined as boundary conditions by the experts of the monitored system. In this work, we study the problem of synthesizing online monitoring rules in the form of temporal logic formulas in an automated way. We describe the monitoring rules as past time signal tempo...
Exploration of user experience of personal informatics systems
Kuru, Armağan; Erbuğ, Çiğdem; Department of Industrial Design (2013)
Many people use personal informatics systems to gather personal behavioral data, make better decisions, and make changes to their behavior. While the proliferation of new products on the market makes collecting personal data easier, how to help people engage with these systems over a long period of time remains an open question. To uncover which features of personal informatics systems lead to engaging experience and long-term use, two user studies were conducted with people who use personal informatics sys...
Optimal data compression for lifetime maximization in wireless sensor networks operating in stealth mode
Incebacak, Davut; Zilan, Ruken; TAVLI, BÜLENT; Barcelo-Ordinas, Jose M.; Garcia-Vidal, Jorge (2015-01-01)
Contextual privacy in Wireless Sensor Networks (WSNs) is concerned with protecting contextual information such as whether, when, and where the data is collected. In this context, hiding the existence of a WSN from adversaries is a desirable feature. One way to mitigate the sensor nodes' detectability is by limiting the transmission power of the nodes (Le., the network is operating in the stealth mode) so that adversaries cannot detect the existence of the WSN unless they are within the sensing range of the ...
Evaluation of deep learning based multiple object trackers
Moured, Omar; Akar, Gözde; Department of Electrical and Electronics Engineering (2020-9)
Multiple object tracking (MOT) is a significant problem in the computer vision community due to its applications, including but not limited to, surveillance and emerging autonomous vehicles. The difficulties of this problem lie in several challenges, such as frequent occlusion, interaction, intra-class variations, in-and-out objects, etc. Recently, deep learning MOT methods confront these challenges effectively. State-of-the-art deep learning (DL) trackers pipeline consists of two stages, i.e., appearance h...
Anomaly detection using sparse features and spatio-temporal hidden markov model for pedestrian zone video surveillance
Gündüz, Ayşe Elvan; Taşkaya Temizel, Tuğba; Temizel, Alptekin; Department of Information Systems (2014)
Automated analysis of crowd behavior for anomaly detection has become an important issue to ensure the safety and security of the public spaces. Public spaces have varying people density and as such, algorithms are required to work robustly in low to high density crowds. Mainly, there are two different approaches for analyzing the crowd behavior: methods based on object tracking where individuals in a crowd are tracked and holistic methods where the crowd is analyzed as a whole. In this work, the aim is to ...
Citation Formats
A. Ketenci and E. Aydın Göl, “Synthesis of Monitoring Rules via Data Mining,” Philadelphia; United States, 2019, p. 1684, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/86418.