{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:37:52Z","timestamp":1760240272881,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T00:00:00Z","timestamp":1555632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802129"],"award-info":[{"award-number":["61802129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Science Foundation of China","award":["2015M571931"],"award-info":[{"award-number":["2015M571931"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2017MS121"],"award-info":[{"award-number":["2017MS121"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation Guangdong Province, China","award":["2018A030310381"],"award-info":[{"award-number":["2018A030310381"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Key performance indicators (KPIs) are time series with the format of (timestamp, value). The accuracy of KPIs anomaly detection is far beyond our initial expectations sometimes. The reasons include the unbalanced distribution between the normal data and the anomalies as well as the existence of many different types of the KPIs data curves. In this paper, we propose a new anomaly detection model based on mining six local data features as the input of back-propagation (BP) neural network. By means of vectorization description on a normalized dataset innovatively, the local geometric characteristics of one time series curve could be well described in a precise mathematical way. Differing from some traditional statistics data characteristics describing the entire variation situation of one sequence, the six mined local data features give a subtle insight of local dynamics by describing the local monotonicity, the local convexity\/concavity, the local inflection property and peaks distribution of one KPI time series. In order to demonstrate the validity of the proposed model, we applied our method on 14 classical KPIs time series datasets. Numerical results show that the new given scheme achieves an average F1-score over 90%. Comparison results show that the proposed model detects the anomaly more precisely.<\/jats:p>","DOI":"10.3390\/sym11040571","type":"journal-article","created":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T03:15:53Z","timestamp":1555902953000},"page":"571","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Anomaly Detection Based on Mining Six Local Data Features and BP Neural Network"],"prefix":"10.3390","volume":"11","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mechanical &amp; Automotive Engineering, South China University of Technology, Guangzhou 510641, China"}]},{"given":"Yuanpeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou 510641, China"}]},{"given":"Xuqiao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou 510641, China"}]},{"given":"Xiaole","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou 510641, China"}]},{"given":"Xutong","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou 510641, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.compind.2018.08.001","article-title":"Tactical Business-Process-Decision Support based on KPIs Monitoring and Validation","volume":"102","author":"Trujillob","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TKDE.2003.1198394","article-title":"Mining Asynchronous Periodic Patterns in Time Series Data","volume":"15","author":"Yang","year":"2003","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/j.physa.2016.11.037","article-title":"The modified Yule-Walker method for \u03b1-stable time series models","volume":"469","author":"Kruczek","year":"2017","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/S0169-2070(98)00039-9","article-title":"Forecasting unstable and nonstationary time series","volume":"14","author":"Grillenzoni","year":"1998","journal-title":"Int. J. Forecast."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1142\/S0219477510000150","article-title":"Fluctuation analysis of monthly rainfall time series","volume":"20","author":"Pierini","year":"2010","journal-title":"Fluct. Noise Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","article-title":"A survey of anomaly detection techniques in financial domain","volume":"55","author":"Ahmed","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","article-title":"Integrated Anomaly Detection for Cyber Security of the Substations","volume":"5","author":"Hong","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_8","unstructured":"Hu, W.J., Liao, Y., and Vemuri, V.R. (2003, January 23\u201324). Robust support vector machines for anomaly detection in computer security. Proceedings of the International Conference Machine Learning & Applications-ICMLA, Los Angeles, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.future.2017.01.029","article-title":"A novel statistical technique for intrusion detection systems","volume":"79","author":"Kabir","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_10","unstructured":"Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. (2003, January 8\u201312). Bayesian event classification for intrusion detection. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA."},{"key":"ref_11","first-page":"170","article-title":"Outlier detection using replicator neural networks","volume":"Volume 2454","author":"Kambayashi","year":"2002","journal-title":"Data Warehousing and Knowledge Discovery, Proceedings of the International Conference on Data Warehousing and Knowledge Discovery, Aix-en-Provence, France, 4\u20136 September 2002"},{"key":"ref_12","unstructured":"Shyu, M.L., Chen, S.C., Kanoksri, S., and Chang, L.W. (2003). A novel anomaly detection scheme based on principal component classifier. IEEE Foundations and New Directions of Data Mining Workshop, Miami Univ Coral Gables Fl Dept of Electrical and Computer Engineering."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1016\/j.camwa.2008.10.083","article-title":"Adaptive correlation analysis in stream time series with sliding windows","volume":"57","author":"Zhang","year":"2008","journal-title":"Comput. Math. Appl."},{"key":"ref_14","first-page":"12","article-title":"An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window","volume":"46","author":"Ding","year":"2013","journal-title":"IFAC Proc."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ins.2017.05.021","article-title":"Anomaly detection based on a dynamic Markov model","volume":"411","author":"Ren","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.apenergy.2016.05.074","article-title":"Time series analytics using sliding window metaheuristic optimization-based machine learning system for identifying building energy consumption patterns","volume":"177","author":"Chou","year":"2016","journal-title":"Appl. Energy"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"27760","DOI":"10.1109\/ACCESS.2018.2840086","article-title":"Detecting Anomalies in Time Series Data via a Meta-Feature Based Approach","volume":"6","author":"Hu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Liu, D., Zhao, Y., Xu, H., Sun, Y., Pei, D., Luo, J., Jing, X., and Feng, M. (2015, January 28\u201330). Opprentice: Towards practical and automatic anomaly detection through machine learning. Proceedings of the Internet Measurement Conference AMC, Tokyo, Japan.","DOI":"10.1145\/2815675.2815679"},{"key":"ref_19","unstructured":"Kumar, P.H., Patil, S.B., and Sandya, H.B. (2013, January 27\u201328). Feature extraction, classification and forecasting of time series signal using fuzzy and garch techniques. Proceedings of the National Conference on Challenges in Research & Technology in the Coming Decades National Conference on Challenges in Research & Technology in the Coming Decades (CRT 2013) IET, Ujire, India."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1007\/s11760-018-1267-z","article-title":"Abnormal event detection in crowded scenes using one-class SVM","volume":"12","author":"Amraee","year":"2018","journal-title":"Signal Image Video Proc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1769","DOI":"10.1007\/BF02831871","article-title":"Anomaly detection system based on principal component analysis and support vector machine","volume":"11","author":"Li","year":"2006","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.ins.2017.09.067","article-title":"Small and multi-peak nonlinear time series forecasting using a hybrid back propagation neural network","volume":"424","author":"Dong","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_23","unstructured":"Maren, A.J., Harston, C.T., and Pap, R.M. (1990). Handbook of Neural Computing Applications, Academic Press."},{"key":"ref_24","unstructured":"Hagan, M.T., Beale, M.H., and Demuth, H.B. (1996). Neural Network Design, PWS Pub."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Livieris, I. (2018). Improving the Classification Efficiency of an ANN Utilizing a New Training Methodology. Informatics, 6.","DOI":"10.3390\/informatics6010001"},{"key":"ref_26","unstructured":"Livieris, I., and Pintelas, P.E. (2008). A Survey on Algorithms for Training Artificial Neural Networks, Department of Math, University of Patras. Technical Report TR08-01."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Livieris, I., Kiriakidou, N., Kanavos, A., Tampakas, V., and Pintelas, P. (2018). On Ensemble SSL Algorithms for Credit Scoring Problem. Informatics, 5.","DOI":"10.3390\/informatics5040040"},{"key":"ref_28","first-page":"37","article-title":"Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation","volume":"2","author":"Powers","year":"2011","journal-title":"J. Mach. Learn. Technol."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/4\/571\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:46:49Z","timestamp":1760186809000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/4\/571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,19]]},"references-count":28,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["sym11040571"],"URL":"https:\/\/doi.org\/10.3390\/sym11040571","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2019,4,19]]}}}