• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Su Weixing, Zhu Yunlong, Liu Fang, Hu Kunyuan. Outliers and Change-Points Detection Algorithm for Time Series[J]. Journal of Computer Research and Development, 2014, 51(4): 781-788.
Citation: Su Weixing, Zhu Yunlong, Liu Fang, Hu Kunyuan. Outliers and Change-Points Detection Algorithm for Time Series[J]. Journal of Computer Research and Development, 2014, 51(4): 781-788.

Outliers and Change-Points Detection Algorithm for Time Series

More Information
  • Published Date: April 14, 2014
  • Because the conventional change-points detection method exists the shortages on time delay and inapplicability for the time series mingled with outliers in the practical applications, an outlier and change-point detection algorithm for time series, which is based on the wavelet transform of the efficient score vector, is proposed in this paper. The algorithm introduces the efficient score vector to solve the problem of the conventional detection method that statistics often increass infinitely with the number of data added during the process of detection, and proposes a strategy of analyzing the statistics by using wavelet in order to avoid the serious time delay. In order to distinguish the outlier and change-point during the detection process, we propose a detecting framework based on the relationship between Lipschitz exponent and the wavelet coefficients, by which both outlier and change-point can be detected out meanwhile. The advantage of this method is that the detection effect is not subject to the influence of the outlier. It means that the method can deal with the time series containing both outliers and change-points under actual operating conditions and it is more suitable for the real application. Eventually, the effectiveness and practicality of the proposed detection method have been proved through simulation results.
  • Related Articles

    [1]Hou Bingnan, Liu Ning, Li Xionglüe, Zhou Tongqing, Chen Yingwen, Cai Zhiping, Lu Kai. Survey on Target-Generated IPv6 Network Address Scanning[J]. Journal of Computer Research and Development, 2024, 61(9): 2307-2320. DOI: 10.7544/issn1000-1239.202330335
    [2]Chen Xiaofeng, Song Zhaoxiong, Zheng Peiyu, Zhang Jun, Yu Zhi, Sun Yi. A Multichain-Collaborating Governing Chain-Supervising-Chain Supervision Framework[J]. Journal of Computer Research and Development, 2024, 61(9): 2290-2306. DOI: 10.7544/issn1000-1239.202330279
    [3]Duan Tiantian, Guo Yi, Li Bo, Zhang Hanwen, Song Zhaoxiong, Li Zhongcheng, Zhang Jun, Sun Yi. PieBridge:An On-Demand Scalable Cross-Chain Architecture[J]. Journal of Computer Research and Development, 2023, 60(11): 2520-2533. DOI: 10.7544/issn1000-1239.202230284
    [4]Chen Liangyin, Li Zhanghua, Wang Chaolong, Zhang Jingyu, Yan Bingshu, Liu Yan, Yin Feng, Chen Pengpeng. RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance[J]. Journal of Computer Research and Development, 2014, 51(5): 974-983.
    [5]Bao Xiao'an, Yao Lan, Zhang Na, and Song Jinyu. Adaptive Software Testing Based on Controlled Markov Chain[J]. Journal of Computer Research and Development, 2012, 49(6): 1332-1338.
    [6]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [7]Guo Chi, Wang Lina, Guan Yiping, Zhang Xiaoying. A Network Immunization Strategy Based on Dynamic Preference Scan[J]. Journal of Computer Research and Development, 2012, 49(4): 717-724.
    [8]Zhou Yong, Xia Shixiong, Ding Shifei, Zhang Lei, Ao Xin. An Improved APIT Node Self-Localization Algorithm in WSN Based on Triangle-Center Scan[J]. Journal of Computer Research and Development, 2009, 46(4): 566-574.
    [9]Dong Jie, Hu Yu, Han Yinhe, Li Xiaowei. A Multiple-Scan-Chain Test Approach Based on Combinational Decompression Circuits[J]. Journal of Computer Research and Development, 2006, 43(6): 1001-1007.
    [10]Liu Lijun and Huai Jinpeng. Research of a Network Scan Detection Algorithm Based on the FSA Model[J]. Journal of Computer Research and Development, 2006, 43(3): 417-422.

Catalog

    Article views (4889) PDF downloads (4339) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return