A Machine Learning Approach to Protect Electronic Devices from Damage Using the Concept of Outlier

Most of the appliances that we used in our everyday life are electronic devices, i.e. TV, Air Conditioner, Refrigerator, etc. Excessive voltage, current, temperature, etc. can harm the devices and in extreme cases, the devices can be completely damaged. We proposed a system to monitor the electrical behaviors of the devices in real-time. The system is trained with an unlabeled dataset and capable of identifying outliers. We have used a clustering technique, i.e. Density-Based Spatial Clustering of Applications with Noise (DBSCAN) to learn the label of a dataset and then apply machine learning algorithms, i.e. Support Vector Machine (SVM) and Decision Tree to predict the label of the new data. From the prediction, the system determines whether the device is operating in safe mode or not. In this work, we have achieved the accuracy of 98.61% in detecting outliers using SVM with ‘rbf’ kernel. Hence, if the device operates beyond safe mode, we can shut down the device.

[1]  Prabhakar Raghavan,et al.  A Linear Method for Deviation Detection in Large Databases , 1996, KDD.

[2]  Jörg Lässig,et al.  DenGraph-HO: Density-based Hierarchical Community Detection for Explorative Visual Network Analysis , 2011, SGAI Conf..

[3]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[4]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[5]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[6]  M.M. Deris,et al.  A Comparative Study for Outlier Detection Techniques in Data Mining , 2006, 2006 IEEE Conference on Cybernetics and Intelligent Systems.

[7]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[8]  Kyoung-jae Kim,et al.  Financial time series forecasting using support vector machines , 2003, Neurocomputing.

[9]  Christopher Leckie,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[10]  Jerzy W. Grzymala-Busse,et al.  Global discretization of continuous attributes as preprocessing for machine learning , 1996, Int. J. Approx. Reason..

[11]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[12]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[13]  Shian-Shyong Tseng,et al.  Two-phase clustering process for outliers detection , 2001, Pattern Recognit. Lett..

[14]  David A. Landgrebe,et al.  A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..

[15]  Hongxing He,et al.  Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.

[16]  Fabrizio Angiulli,et al.  Outlier Detection Techniques for Data Mining , 2009, Encyclopedia of Data Warehousing and Mining.

[17]  Pavel Berkhin,et al.  A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.