skip to main content
10.1145/3372454.3372480acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdrConference Proceedingsconference-collections
research-article

Anomaly detection for machinery by using Big Data Real-Time processing and clustering technique

Authors Info & Claims
Published:21 January 2020Publication History

ABSTRACT

This paper aims to apply techniques of Big Data Analytics including K-Means Clustering to diagnose potential problems for offshore rotating machinery. The innovative methods are attempted in both Batch K-Means and Streaming K-Means. Their performances are compared with the conventional signal analysis method. Both K-Means models have a better performance on detecting significant mechanical faults as anomalies for offshore rotating machinery which can be considered as appropriate method for machine operational maintenance.

References

  1. Shouwei, Z., Xiaojian, J., Hengyi, Z., Yingnian, Z., Jiang, Z., Xuegang, Y., Keqin, C., Gang, B., Hua, G., and Chao, Z. "The facility and equipment of china offshore oil & gas industry," Engineering Sciences 5 (2010), 016.Google ScholarGoogle Scholar
  2. Guo, L. "Study on Risk Based Intelligent Maintenance Decision Making for Petrochemical Rotating Machinery," PhD thesis, Beijing University of Chemical Technology, 2009.Google ScholarGoogle Scholar
  3. Ji, X. "The application of big data in the key mobile equipment field of offshore oil platform," Science and Technology & Innovation, 16 (2017), 149--151.Google ScholarGoogle Scholar
  4. Ranjan, R. "Streaming big data processing in datacentre clouds," IEEE Cloud Computing 1, 1 (2014), 78--83.Google ScholarGoogle ScholarCross RefCross Ref
  5. Elmasri, R. "Fundamentals of database systems," Pearson Education India, 2008.Google ScholarGoogle Scholar
  6. Elahi, M., Li, K., Nisar, W., Lv, X., and Wang, H. "Efficient clustering-based outlier detection algorithm for dynamic data stream," In Fuzzy Systems and Knowledge Discovery, 2008. FSKD'08. Fifth International Conference on, vol. 5, IEEE (2008), 298--304.Google ScholarGoogle Scholar
  7. Kiss, I., Genge, B., Haller, P., and Sebestyen, G. "Data clustering-based anomaly detection in industrial control systems," In Intelligent Computer Communication and Processing (ICCP), 2014 IEEE International Conference on, IEEE (2014), 275--281.Google ScholarGoogle Scholar
  8. Kumari, R., Singh, M., Jha, R., Singh, N., et al. "Anomaly detection in network traffic using k-mean clustering," In Recent Advances in Information Technology (RAIT), 2016 3rd International Conference on, IEEE (2016), 387--393.Google ScholarGoogle Scholar
  9. Munz, G., Li, S., and Carle, G. "Traffic anomaly detection using k-means clustering," In GI/ITG Workshop MMBnet (2007).Google ScholarGoogle Scholar
  10. Kumari, R., Singh, M., Jha, R., Singh, N., et al. "Anomaly detection in network traffic using k-mean clustering," In Recent Advances in Information Technology (RAIT), 2016 3rd International Conference on, IEEE (2016), 387--393.Google ScholarGoogle Scholar
  11. Koupaie, H. M., Ibrahim, S., and Hosseinkhani, J. "Outlier detection in stream data by clustering method," International Journal of Advanced Computer Science and Information Technology 2, 3 (2013), 25--34.Google ScholarGoogle Scholar

Index Terms

  1. Anomaly detection for machinery by using Big Data Real-Time processing and clustering technique

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBDR '19: Proceedings of the 3rd International Conference on Big Data Research
      November 2019
      192 pages
      ISBN:9781450372015
      DOI:10.1145/3372454

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 January 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader