skip to main content
10.1145/3358331.3358371acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiamConference Proceedingsconference-collections
research-article

Study on Precursor Anomaly Data Recognition and Prediction of L-IAZPSO-SVM Algorithm

Authors Info & Claims
Published:17 October 2019Publication History

ABSTRACT

The traditional seismic data anomaly identification method usually adopts a simple threshold method to determine the data collected by the device outside the set normal monitoring threshold as abnormal data, and the abnormal data cannot be accurately identified. This paper adopts a method to improve the traditional anomaly recognition L-IAZPSO-SVM method to improve the accuracy of abnormal data recognition.In this paper, the earthquake precursor data [1] provided by China Seismic Network is used as the input index, and the improved PSO (Particle Swarm Optimization) [2] is used to optimize the SVM(support vector machine) [3] training to realize the identification and prediction of abnormal data. First Using Cluster analysis and PCA(Principal Component Analysis) [4] make the data preprocessed, and then Itô Lemma [5] is used to optimize the PSO initialization process to improve the particle variability and make the initial particles diverse. The adaptive speed update method is used to improve the problem that the algorithm is easy to fall into the local optimal solution in the later stage of the algorithm. The Ziggurat algorithm [6] is used to increase the number of particles and solve the problem of imbalance between the global search capability and the local search capability of the system. The improved algorithm solves the problem that the traditional SVM method cannot determine the number of support vectors, the system fitting fuzzy problem and improves the algorithm's abnormal recognition rate and prediction rate. Compared with the traditional PSO-SVM method, other improved PSO-SVM methods, and other anomaly data detection algorithms, the system's running speed, global search capability, operational stability, and abnormal data recognition rate prediction rate are improved.

References

  1. Wang Keying, Zou Lizhen, Liang Jianhong, Ren Kexin, Qiu Haijiang, Ding Qiuqin, Liu Jingguang. Seismic catalog database and seismic phase database of China Seismological Network and Global Seismic Network. Seismological and Geomagnetic Observation and Research, 2003, (03): 37--43.Google ScholarGoogle Scholar
  2. Sierra M R, Carlos A. Coello Coello. Improving PSO-Based Multi-objective Optimization Using Crowding, Mutation and &epsis;-Dominance. Lecture Notes in Computer Science, 2005, 3410: 505--519.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Drosou K, Koukouvinos C. A new variable selection method based on SVM for analyzing supersaturated designs. 2019, 51(1): 21--36.Google ScholarGoogle Scholar
  4. Liu C. Gabor-based kernel PCA with fractional power polynomial models for face recognition. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2004, 26(5): 572--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rathnayaka R M K T, Jianguo W, Seneviratna D M K N. Geometric Brownian Motion with Ito's lemma approach to evaluate market fluctuations: A case study on Colombo Stock Exchange// International Conference on Behavior. IEEE, 2015.Google ScholarGoogle Scholar
  6. Mcfarland C D. A modified ziggurat algorithm for generating exponentially- and normally-distributed pseudorandom numbers. Journal of Statistical Computation & Simulation, 2016, 86(7): 1281--1294.Google ScholarGoogle ScholarCross RefCross Ref
  7. Rotondi R, Varini E. Failure models driven by a self-correcting point process in earthquake occurrence modeling. Stochastic Environmental Research and Risk Assessment, 2019, 33(1--4): 709--724.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mao L F, Yao J G, Jin Y S, et al. Abnormal Data Identification and Missing Data Filling in Medium-and Long-Term Load Forecasting. Power System Technology, 2010, 34(7): 148--153.Google ScholarGoogle Scholar
  9. Guan Ziqi, Zhu Yulong, Liu Xiaoguang, Liu Dan, Chang Yunlong. Modeling of weld pool illuminance based on GA optimized BP neural network. Thermal Processing Technology, 2019, (07): 216--220.Google ScholarGoogle Scholar
  10. Zhang Y, Wu L. Stock market prediction of S&P 500 via combination of improved BCO approach and BP neural network. Expert Systems with Applications, 2009, 36(5): 8849--8854.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xiong Yi, Liang Yiwen, Tan Chengyu, Zhou Wen. Anomaly Detection of Earthquake Precursor Observation Data Based on Reverse Selection. Computer Engineering and Applications, 1--7.Google ScholarGoogle Scholar
  12. Qian Xiaoyu, Ge Hongwei, Cai Ming. Multi-objective particle swarm optimization algorithm based on target space decomposition and continuous mutation. Journal of Intelligent Systems, 2019, (03): 1--7.Google ScholarGoogle Scholar
  13. Zhang Xiaoli, Wang Qinfei, Yan Wenli. An Improved Particle Swarm Optimization Algorithm with Adaptive Inertia Weight. Microelectronics & Computer, 2019, 36(03): 66--70.Google ScholarGoogle Scholar
  14. Bezdek J C, Ehrlich R, Full W. FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 1984, 10(2): 191--203.Google ScholarGoogle ScholarCross RefCross Ref
  15. Agbehadji I E, Fong S, Millham R. Wolf search algorithm for numeric association rule mining// IEEE International Conference on Cloud Computing & Big Data Analysis. 2016.Google ScholarGoogle Scholar
  16. Duan H, Yu Y, Zhang X, et al. Three-dimension path planning for UCAV using hybrid meta-heuristic ACO-DE algorithm. Simulation Modelling Practice & Theory, 2010, 18(8): 1104--1115.Google ScholarGoogle ScholarCross RefCross Ref
  17. Tang X, Yang Q, Sun Y. Gas flow-rate measurement using a transit-time multi-path ultrasonic flow meter based on PSO-SVM// Instrumentation & Measurement Technology Conference. 2017.Google ScholarGoogle Scholar
  18. Run-Xiu W U, Sun H, Zhu D G, et al. Particle Swarm Optimization Algorithm Based on Optimal Particle Guidance and Gauss Perturbance. Journal of Chinese Computer Systems, 2016.Google ScholarGoogle Scholar

Index Terms

  1. Study on Precursor Anomaly Data Recognition and Prediction of L-IAZPSO-SVM Algorithm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AIAM 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing
      October 2019
      418 pages
      ISBN:9781450372022
      DOI:10.1145/3358331

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate100of285submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader