SlideShare a Scribd company logo
1 of 10
Download to read offline
Abnormal Patterns Detection in Control Charts using Classification
Techniques
Zalinda Othman and Huda Fathi Eshames
School of Information Technology, Faculty of Information Science and Technology
Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia.
E-mail: zalinda@ftsm.ukm.my
Abstract
Any abnormal patterns show in Statistical Process Control charts imply the presence of possible
assignable causes and variances that may lead to the process performance deterioration. Therefore,
timely detection and recognizer of patterns in control charts are very important in the SPC
implementation. This paper presents the performance of five classification methods on a set of large
data for anomaly patterns detection in control charts. The control chart dataset has its specific
features that need specific data preprocessing procedures. It is crucial and involves a number of stages
of data preparation procedures. Firstly, the Principle Component Analysis is employed for similarity
measure. Secondly, the Piecewise Aggregate Approximation and Symbolic Aggregate Approximation
are used as data representation. The preprocessed data are fitted to the classification algorithms to
extract important knowledge. The algorithms are support vector machine, decision tree, MLP networks,
RIDOR algorithm and JRip algorithm. Numerical results showed that the JRip algorithm has the best
performance compared to the others. It achieved highest detection accuracy about 99.66 % and the
lowest error rate is 2.987.
Keywords: Control Chart Patterns Recognition, Statistical Process Control (SPC), Time Series
Data Mining.
1. Introduction
Control charts are useful statistical tools for controlling and monitoring the quality characteristics of
industrial processes. They are useful in determining whether a process is behaving as intended or if
there are some unnatural causes of variation. Shewhart developed a control chart in 1931 [1]. Control
chart provides a graphical representation of the process behavior that is used to monitor the system’s
condition and for identifying instability conditions. The advantages of control charts can be further
increased by adopting a control strategy that is, first, based on detecting patterns behavior (e.g. cyclic,
trend, systematic changes) that can appear on the chart and second, lends itself to adaptive automation
[2]. The main problem of most multivariate control charts is that they can detect an unusual event but
do not directly provide the information required by a practitioner to determine which one of the
variables or which subset of them causes the out-of-control signal. This raises the issue of identification
in relation to multivariate control procedures. During diagnosis of the process behavior, the variations
that may appear on the chart can be classified to various categories (e.g. patterns) based on the sources
that cause them. Accurate classification of these patterns is vital for a production system to effectively
monitor and reduce process variations. Chance/random variations are due to common causes (natural
cause), and other variations are due to special causes (assignable cause). Common cause occurs
naturally in the manufacturing process such as poor product design, inappropriate material, poor
instruction and old machines. Western Electric [3] described in the handbook of natural process
behaviour that most data points appear on the control charts near the centre line and have no points or
actually very few (not exceeding control limits). Unnatural behaviour shows the points on a chart
fluctuating widely (or not widely enough), or fails equilibrium about the centre line of the chart. Most
commonly encountered patterns are shift, trend, normal, cycle, stratification, systematic and mixture
that may appear on the control chart as defined in the Handbook by Western [3].
Control charts data are the time series data due to the large amount of data with the time stamp. The
computing time is very complex. In order to reduce this computation time, the time series data need to
be represented in high dimensional order. Most of the time series data are real valued data that require
the data to be discredited [4]. A time series is a series of observations, xi t
 : i 1,฀ ,n;t 1฀ ,m
 
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
International Journal of Advancements in Computing Technology(IJACT)
Volume4,Number10,June2012
doi:10.4156/ijact.vol4.issue10.8
61
made sequentially through time where, the measurements indexes made at each time point, t. The
resulting time series is univariate or multivariate respectively. It is called a univariate time series when
n is equal to 1, and a multivariate time series (MTS) when n is equal to, or greater than 2. Control
charts dataset that involves time is the MTS dataset [5]. The process behavior that appears on the charts
indicates whether the quality of the manufacturing process is in control or not. Therefore, a good
control chart monitoring should be able to detect the out of control situations and know when to stop
the process.
This paper is organized as follows: the next section reviews the related research done on anomaly
detection. Section 3 presents the methodology of our approach. Section 4 discusses the experiments
performed and results obtained and finally, the last section concludes this study.
2. Related works
Anomaly detection can detect unknown variations, under a basic assumption that variations deviate
from normal behavior. Patterns recognition can be defined as a classification of input data into
identifiable pattern classes through the extraction of representative features of the data. There are
several reported research papers on summarization and categorization of all possible patterns that are
commonly appeared in SPC charts.
Over the years, rapid developments in computer technology motivate researchers to explore new
methods based on CCP recognizer such as artificial neural network (ANN). Example work shown in
Guh [6] that have used neural network (NN) and genetic algorithm (GA), where the GA was proposed
for optimizing the NN recognizer. Later he [7] suggested ANN-based model for recognition of both
mean and variance SSPs. He employed direct data and selected statitical features as input vector to
ANNs. Another recent work that using ANN is by Ebrahimzadeh & Ranaee [8]. They designed an
accurate, automatic system for recognition of CCPs that hybridized RBF wavelet methods and PSO
approach. Literature reviews show NNs have shown capability as a suitable tool for detecting unnatural
patterns in CCP. It is because the learning capability, speed and ease of implementation and can be
used to deal with incomplete or noisy data.
Support vector machine (SVM) also has attracted researchers in CCPs recognition ([9] and [10]).
Wang [11] proposed SVM to detect unnatural patterns in control charts such as, cyclic, shift and trend
patterns. In the research work reported by Das & Banerjee [12], SVM with self-organized maps was
used to build a CCP detector for online implementation. Zhiqiang and Yizhong [13] and Cheng et al.
[14] suggested a model named least squares SVM to detect behaviour of variance shifts in bivariate
processes.
Decision tree (DT) is well-recognised approach for its capability in detecting known attacks [15]. In
CCPs pattern detection problem, several researchers have used DT. For example, Guh [16] proposed a
hybrid learning-based model for recognition of CCPs. Guh's work used NN and DT to detect and
identify eight types of control chart patterns. Guh & Shiue [17] developed an automatic system for
CCP identification based on DT learning and back propagation networks (BPNs). Wang et al. [18]
proposed independent component analysis with DT to identify various types of CCPs. Six types of
concurrent control chart patterns were used to validate the proposed approach.
Different from the above approaches, this paper presents the time series preprocessing approaches
(Principal Component Analysis (PCA) and Symbolic Aggregate Approximation (SAX) with Piecewise
Aggregate Approximation (PAA)) to represent control charts data prior to detecting for anomaly
patterns by using a number of approaches such as SVM, MLP networks, DT, Ridor algorithm and JRip
algorithm.
3. Methodology
In this section, the control chart data preprocessing stages are discussed. It involves two main steps:
the measure of similarity using the Principal Component Analysis (PCA) method and the
transformation of these data using Symbolic Aggregate Approximation (SAX) with Piecewise
Aggregate Approximation (PAA).
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
62
3.1 Similarity measure
The first step is to compute the similarity by using PCA. PCA is one of the mathematical techniques
commonly used in the data mining community and the statistics for analysis of time series data. It is
described by Dash et al. [19] as;
“It is an unsupervised linear feature reduction method, for projecting high dimensional data into a
low dimensional space with minimum reconstruction errors”.
This approach produces a reduced set of features that specify the maximal variances in the data as
well as the discriminative features most adequate for classification, with minimum loss of information.
In this section, the application of PCA in representing time series ( T ) of length n as a matrix Xnp will
be explained, where n represents number of time instances (length of time series); whereas p is the
number of time series data (number of variables being measured). The derivation of the new axes
(components) is based on the computation of covariance matrix of the data X as following equation
(Tanaka et al. [20]):
A 
x1t x1t
t
 x1t x2t
t
 ฀ x1t xmt
t

x2t x1t
t
 x2t x2t
t
 ฀ x2t xmt
t

   
xmt x1t
t
 xmt x2t
t
 ฀ xmt xmt
t

















(1)
The calculation of the eigenvalues i of this matrix is ordered as 1  2  m . The M
eigenvectors corresponding to the M largest eigenvalues of the covariance matrix is represented
as e1i, e2i,฀ , emi . Then the ith
principal component pct,i
is computed by using means of
x1, x2,฀ , xm .
pct,i
 e1i x1  x1
 e2i x2  x2
 emi xm  xm
  (2)
Then, the principal component is used to effectively transform the time series data from n-
dimensional to m-dimensional space. Finally, the m-dimensional time series data ( T ) is illustrated as
below:
T  x1,฀ , xt ฀ , xn (3)
xt  e11 x1t  x1
  e21 x2t  x2
 em1 xmt  xm
  (4)
PCA can detect the important coordinates that include characteristics of the original data T , because
the importance of each coordinate is represented in each coefficient e11 . PCA can improve the
performance of a detector as mentioned by Fengbin Zhang et al. [21] in their work on anomaly
detection problem.
3.2 The combination of SAX and PAA
In this study, PAA with SAX is used for data representations. Firstly, the time series data are
discretized by obtaining a PAA approximation. The idea of PAA representation is that it represents the
time series data as a vector expression. This is obtained by dividing time series data into frames and
calculating the mean value in each frame. It represents the time series data as a sequence of rectangle
basis functions and then converts it into the discrete symbolic sequences, as refer in Eq. (5). In this
equation, a time series data T  x1,฀ , xn of length n can be represented as w, i.e. the number of PAA
segments/frames representing time series (m < n), and X j
is the average value of the ith
segment and
a vector X i is calculated as follows:
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
63
Xi 
w
n
Xj
j
n
w
i1
 1
n
w
i
 (5)
Secondly, after PAA represented of each time series data by vector of w-dimension, whereupon,
“breakpoints” can be determined to mapping the vector into a sequence of SAX symbols. Lin et al.
[4] define breakpoint as; “Breakpoints are a sorted list of numbers B  1,฀ ,a1 such that the area
under a N (0,1) Gaussian curve from i to i1  1
a
( 0 and a are defined as -∞ and ∞, respectively)”.
These breakpoints may be determined by looking them up in a statistical table as shown in Table 1.
The data is normalized into fixed number of states according to the predetermined breakpoints. This
produces an equal-sized area under Gaussian distribution curve to map PAA to SAX symbols. By
referring to the SAX Gaussian Distribution Table, as in Table 1, the corresponding β and related values
of a (from 3 to 10) for the breakpoints can be determined. Once the breakpoints have been obtained we
can discretize a time series in the following manner. All coefficients of PAA that are below the
smallest breakpoints are mapped to the symbol “a” and all PAA coefficients greater than or equal to
the smallest breakpoint and less than the second smallest breakpoint are transformed to the symbol “b”
and so on. This idea is shown as in Figure 1. It is noted in this figure that two breakpoints have been
obtained, therefore 3 symbols a, b, and c are used. In this example, the time series of length n = 128 are
discretized by first obtaining a PAA approximation for reduction to w = 8. Then, by using the
predetermined breakpoints PAA coefficients are map into SAX symbols. In the figure, by using a = 3,
the time series is map to the word baabccbc.
Table 1. The SAX Gaussian Distributions
a 3 4 5 6 7 8 9 10
1 -0.43 -0.67 -0.84 -0.97 -1.07 -1.15 -1.22 -1.22
2 0.43 0 -0.25 -0.43 -0.57 -0.67 -0.76 -0.84
3 0.67 0.25 0 -0.18 -0.32 -0.43 -0.52
4 0.84 0.43 0.18 0 -0.14 -0.25
5 0.97 0.57 0.32 0.14 0
6 1.07 0.67 0.43 0.25
7 1.15 0.76 0.52
8 1.22 0.84
9 1.28
Figure 1. PAA transformation to SAX symbols
SAX symbol
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
64
4. Classifier
The proposed classification algorithms in this study are described in this section:
A. Decisions Tree
Decision Tree (DT) is one of the popular and powerful learning techniques. It is due to its various
characteristics that include simplicity, comprehensibility, less parameters, and its ability to handle
mixed-type data. A DT is induced from a set of labeled training instances represented by a couple of
attribute values and class labels. Its learning process is typically a greedy, top-down and recursive
process starting with the entire training data and an empty tree. An attribute that best partitions the
training data is chosen as the splitting attribute for the root. The training data are then partitioned into
disjointed subsets satisfying the values of the splitting attributes [22].
B. Support Vector Machine
Support Vector Machine (SVM) is considered one of the successful learning algorithms proposed in
the application of classification, regression and detection tasks. Referring to Chang & Chang [23],
SVM is a powerful machine-learning tool. It has the capacity to represent non-linear relationships and
producing models that generalize well to unseen data. The main goal of applying SVM for solving
classification problems is to transform the input space to a higher dimensional feature space through a
non-linear mapping function.
C. Multilayer Perceptron Neural Networks
Multilayer Perceptron (MLP) Neural Networks have been used over the years as a powerful learning
algorithm for solving a wide variety of problems. Much progress has been made in improving
performance and in understanding how these neural networks operate. MLP neural networks consist of
units arranged in layers. Each layer is composed of nodes and in the fully connected networks. Each
node connects to every node in subsequent layers. Each MLP is composed of a minimum of three
layers consisting of an input layer, one or more hidden layer(s) and an output layer. The input layer
distributes the inputs to subsequent layers. Input nodes have linear activation functions and no
thresholds. Each hidden unit node and each output node have thresholds associated with them in
addition to the weights [24].
D. JRip algorithm
Extended Repeated Incremental Pruning (JRip) approach was proposed by Cohen [25] as an
optimized version of IREP. RIPPER extracts the rules directly from the data. It implements a
propositional rule learner, “Repeated Incremental Pruning to Produce Error Reduction” (RIPPER).
Before building a rule, the current set of training examples are partitioned into two subsets, a growing
set (usually 2/3) and a pruning set (usually 1/3). RIPPER builds a rule set by repeatedly adding rules to
an empty rule set until all positive examples are covered. Rules are formed by greedily adding
condition to the antecedent of a rule (starting with empty antecendent) until no negative examples are
covered. After growing a rule from the growing set, condition is deleted from the rule in order to
improve the performance of the rule set on the pruning examples. To prune a rule, RIPPER considers
only a final sequence of conditions from the rule, and selects the deletion that maximizes the function.
As in Eq. (6):
v Rule, prpos, prNeg
  
p  n
p n
(6)
Where Rule is the set of rules, prpos is the total number of examples in the considered cluster,
prNeg is the total number of examples in the cluster not considered and p, n are the number of (prpos,
prNeg) examples covered by Rule.
E. Ridor algorithm
Ridor algorithm is the implementation of a RIpple-DOwn Rule learner proposed by Gaines and
Compton [26]. It generates a default rule first and then the exceptions for the default rule with the least
(weighted) error rate. Then it generates the “best” exceptions for each exception and iterates until pure.
Thus it performs a tree-like expansion of exceptions. The exceptions are a set of rules that predict
classes other than the default. IREP is used to generate the exceptions.
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
65
5. Simulation results
Synthetic Control Chart Time Series (SCCTS) datasets are taken from the UCI Machine Learning
Repository website [27]. The datasets consist of 600 examples of control charts. These examples are
divided into six different classes (patterns). Each class consists of 100 time series and the length of
each time series is equal to 60 (60 numerical attributes). These classes are cyclic, normal,
increasing/decreasing trend, upward/downward shift and generated according to the six equations as
given in Pham and Oztemel [28] and Pham and Chan [29].
In this paper, the raw collected data are cleaned according to time series pre-processing procedures.
Initially, PCA is applied to obtain reduced uncorrelated attributes by specifying maximal variances in
the data with minimum less of information, and it implies the process of data compress. This approach
transformed the data from high- dimensional data to low-dimensional data. The results obtained shown
that the PCA has achieved optimization efficiency in dimensions reduction. It is reduced number of
dimensions/ attributes dataset from 60 attributes to 40. The values of PCA are then being transformed
to symbols by using PAA and SAX. Based on Gaussian distribution curve, five symbols are chosen. In
this study, the symbols are represented in numbers. In this paper, four breakpoints are obtained. The
control chart data are mapped to numbers using a = 5. The data are transformed into number 1 to 5. By
using the above steps, a program is developed for data preprocessing by using Visual Basic for
Applications (VBA). These procedures achieved the effective properties in pattern representation and
reached for building a good classification model. The preprocessed data are mined using five
classification techniques as discussed in previous section. The performance is measured by the
anomaly detection accuracy and error average with time taken in building the model. The mining
process uses 10 folds cross validation procedure with various allocations of training and testing set. In
this study, the WEKA and ROSETTA are used as a mining and modeling tool.
Table 2. Simulation results for each technique
Table 3. Simulation Errors
Algorithm Detection
Accuracy %
Error Rate Time (sec)
DT 99.44 3.305 0.04
SVM 96.66 9.708 1.84
JRip 99.66 2.987 0.12
Ridor 99.44 3.061 0.17
MLP 98.33 5.584 16.16
Algorithm Mean
Absolute
Error
Root
Mean
Squared
Error
Relative
Absolute
Error (%)
Root
Relative
Squared
Error (%)
SVM 0.233 0.311 80.067 83.230
Jrip 0.006 0.036 2.189 9.717
MLP 0.012 0.067 4.226 17.890
DT 0.004 0.043 1.528 11.645
Ridor 0.002 0.043 0.666 83.230
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
66
Figure 2. Detection accuracy obtained by classification techniques
Figure 3. Average error rate and time taken to build the model
The experimental results indicated that the proposed techniques have produced the model with high
accuracy and lower error rate with lower total time taken to build model. Based on Figure 2, 3, Table 2,
and 3, it is noted that each proposed algorithms achieved high detection accuracy. The highest accuracy
is 99.66%, produced by JRip and followed by DT and Ridor are about 99.44%, then MLP networks is
98.33% detection accuracy and SVM is about 96.66%. The time requires to build the model is also a
parameter for comparing the classification techniques. It can be observed from Figure 3 that a DT has
taken the shortest building time that is around 0.04 seconds compared to the others. JRip requires
around 0.12 seconds, Ridor 0.17 seconds and SVM is 1.84 seconds for building the model. MLP
networks take the longest time to build the model that is around 16.16 seconds. From Table 2, it is
discovered that the highest error is found in SVM with an average errors of 9.708, while the rest of the
techniques ranging from 2.987 to 5.584. The technique with lower error rate has a powerful
classification capability. In addition, more potential in terms of control chart patterns recognizer.
Besides the classification capability, the anomaly in CCPs can be detected by observing the generated
rules from the classification model. Table 4 provides an overview of the rules generated from the
selected JRip classification model. Rule induction algorithms generate a model as set of rules. The
rules are in the standard form of If-Then rules. The number of rules obtained varies from one
fold/model to another. The rules generated in the best model cover all instances and features. These
rules might lead to a good decision and conclusion. These rules have an intuitive interpretation. For
example, the first rules states: (T1>= 3) => class = 1 (50.0/0.0), if the T1 (the first attribute in the data,
it represents a period of time) occurs is the larger than or is equal to 3 (a point representing quality
characteristics of sample taken from the manufacturing process at a period of time, then class is equal 1
(type of pattern/class is normal). This means that process is in control. The number in parenthesis
indicates how many on the training examples were covered successfully by this rule. For example, for
the first rule, 50 examples were covered by this rule correctly (covers instances with total weights of
50.0), out of which there are instances with weights of 0.0 are misclassified.
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
67
Table 4. Rules generated from the best classification model based on JRip Algorithm
Class/Pattern Related rules
Normal => Class = 1
(T1 >= 3) => Class = 1 (50.0/0.0)
Cyclic => Class = 2
(T4 <= 2) => Class = 2 (47.0 / 1.0)
(T2 <= 1) => Class = 2 (4.0 / 0.0)
Increasing trend => Class = 3 (56.0/3.0)
Decreasing trend => Class = 4
(T1 >= 5) => Class = 4 (48.0/0.0)
Upward Shift => Class = 5
(T1 <= 2) and (T7 >= 5) => Class = 5 (31.0/0.0)
(T5 <= 1) and (T1 <= 2) => Class = 5 (14.0/0.0)
Downward shift => Class = 6
(T1 >= 4) and (T7 <= 2) => Class = 6 (39.0/1.0)
(T5 >= 5) and (T1 >= 2) => Class = 6 (11.0/0.0)
6. Conclusions
As a conclusion, the experimental results show that data mining and machine learning can be
extremely beneficial in generates quality knowledge and may benefit the manufacturers. This work has
achieved its proposed goals in implementing suitable approaches to preprocess control chart data prior
to the classification task. In addition, to investigate and evaluate five selected classification techniques.
The performances of these techniques are measured based on recognition accuracy, error rate and the
time taken to build model. The preprocessing tasks proposed have shown that with proper preparation
of control chart data, the classification techniques are suitable for solving this problem. Through the
results obtained, it can be clearly seen that all the values of recognition accuracy and average errors
indicate that the best classification model is obtained by using JRip algorithm. It has proved effective
and fast to use even with large and noisy datasets. Therefore, it gave the highest accuracy, and lowest
error rate with shortest time to build the model.
Future work can be carried out in several areas, including using real time data, since it provides a
genuine test for verifying the classification methods in SPC implementation. Studying the statistical
characteristics of the different features of data may provide important guidelines developing and
improving pattern recognition applications in SPC. In this study, only six types of abnormal patterns
were studied. Therefore, the future work can be extended to add more patterns in the control scheme,
such as stratification or mixture. In addition, several efforts have focused on the development of
methodologies for the mining process of the control chart data in the last decade. However, relatively
few methods have been developed to classify the data with an efficient way. Therefore, it is necessary
to conduct further research on developing a classification model for the process control data.
7. Acknowledgment
The authors wish to thank UKM for its financial support under UKM-TT-07-FRGS0158-2010 grant.
8. References
[1] Shewhart, W. A. Economic control quality manufactured products. New York: Van Nostrand,
1931.
[2] Swift, J. A., “Development of a Knowledge based Expert System for Control Chart Pattern
Recognition and Analysis”, unpublished phd dissertation, Oklahoma State University, 1987.
[3] Western Electric Company. (Ed.). Statistical quality control handbook. Indianapolis: Western
Electric. New York, 1985.
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
68
[4] Lin, J., Keogh, E., Lonardi, S. & Chiu, B., “A Symbolic Representation of Time Series, with
Implications for Streaming Algorithms”, in Workshop on research issues in data mining and
knowledge discovery, June 13, San Diego, CA, USA. pp. 2-11, 2003.
[5] Yang, K. & Shahabi, C., “A PCA-Based Similarity Measure for Multivariate Time Series”, In
Proceedings of the Second ACM International Workshop on Multimedia Databases, pp. 65-74,
2004.
[6] Guh, R. S., “Optimizing Feed Forward Neural Networks for Control Chart Pattern Recognition
through Genetic Algorithms”, International Journal of Pattern Recognition and Artificial
Intelligence, vol. 18(2), pp. 75–99, 2004.
[7] Guh, R. S., “Simultaneous Process Mean and Variance Monitoring using Artificial Neural
Networks”, Computers and Industrial Engineering, vol. 58, pp. 739-753, 2010.
[8] Ebrahimzadeh, A. & Ranaee, V., “Control Chart Pattern Recognition using an Optimized Neural
Network and Efficient Features”, ISA Transactions, vol. 49(3), pp. 387-393, 2010.
[9] Sun, R., & Tsung, F., “A Kernel-Based Multivariate Control Chart using Support Vector Methods”,
International Journal of Production Research, vol. 41, pp. 2975–2989, 2003.
[10]Chinnam, R. B., “Support Vector Machines for Recognizing Shifts in Correlated and Other
Manufacturing Processes”, International Journal of Production Research, vol 40, pp. 4449-4466,
2002.
[11]Wang, X., “Hybrid Abnormal Patterns Recognition of Control Chart Using Support Vector
Machining”, In proceedings 2008 Intenational Conference on Computational Intelligence and
Security, CIS 2008 2, art. No. 4724773, pp. 238-241, 2008.
[12]Das, P. & Banerjee, I., “A Hybrid Detection System of Control Chart Patterns using Cascaded
SVM and Neural Network-Based Detector”, Neural Computing and Applications, pp. 1-10, 2010.
[13]Zhiqiang Cheng & Yizhong Ma, “Source(S) Identification of Variance Shifts in Bivariate Process
using LS-SVM based Pattern Recognition Model”, Advanced Materials Research, vol. 129-131,
pp. 891-896, 2010.
[14]Cheng, Z. Q., Ma, Y. Z. & Bu, J., “Variance Shifts Identification Model of Bivariate Process based
on LS-SVM Pattern Recognizer”, Communications in Statistics: Simulation and Computation, vol.
40 (2), pp. 286-296, 2011.
[15]Marjan Bahrololum, Elham Salahi, Mahmoud Khaleghi, “An Improved Intrusion Detection
Technique based on two Strategies using Decision Tree and Neural Network”, JCIT: Journal of
Convergence Information Technology, vol. 4, no. 4, pp. 96-101, 2009.
[16]Guh, R.S., “A Hybrid Learning-Based Model for On-Line Detection and Analysis of Control Chart
Patterns”, Computers & Industrial Engineering, vol. 49, pp, 35–62, 2005.
[17]Guh, R.S., Shiue, Y.R., “On-Line Identification of Control Chart Patterns using Self-Organized
Approaches”, International Journal of Production Research, vol. 43(5), 1225–1254, 2005.
[18]Wang, C.H., Dong, T.P., Kuo, W., “A Hybrid Approach for Identification of Concurrent Control
Chart Patterns”, Journal of Intelligent Manufacturing, vol. 20 (4), pp. 409-419, 2009.
[19]Rajashree Dash, Rasmita Dash and Debahuti Mishra, “A Hybridized Rough-PCA Approach of
Attribute Reduction for High Dimensional Data Set”, European Journal of Scientific Research,
vol.44 (1), pp.29-38, 2010.
[20]Tanaka, Y., Iwamoto, K., & Uehara, K., “Discovery of Time Series Motif from Multi-
Dimensional Data Based on MDL Principle”, Machine Learning, vol. 58, no. 2-3, pp. 269-300,
February 2005.
[21]Fengbin Zhang, Xin Yue, Dawei Wang, Liang Xi, "A Principal Components Weighted Real-
valued Negative Selection Algorithm", JDCTA: International Journal of Digital Content
Technology and its Applications, Vol. 5, No. 6, pp. 313-324, 2011.
[22]Su, J. & Zhang, H., “A Fast Decision Tree Learning Algorithm”, in Proceedings of the 21st
national conference on artificial intelligence, vol (1) pp. 500-505, 2006.
[23]Cheng, H.P. & Cheng, C.S., “A Support Vector Machine for Recognition Control Chart Patterns in
Multivariate Process”, in Proceeding of the 5th Asian Quality Congress, Incheon, Korea, pp. 456-
465, 2007.
[24]Walter, H. Delashmit & Michael, T. Manry, “Recent Developments in Multilayer Perceptron
Neural Networks”, in Proceedings of the 7th Annual Memphis Area Engineering and Science
Conference MAESC, 2005.
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
69
[25]Cohen, W.W., “Fast Effective Rule Induction”, In A. Prieditis and S. Russell (eds.), Proceedings
of the 12th
International Conference on Machine Learning, Lake Tahoe, CA., pp.115-123, 1995.
[26]Gaines, B.R. & Compton, P., “Induction of Ripple-Down Rules Applied to Modelling Large
Database”, Journal of Intelligent Information Systems, vol. 5(3), pp. 211-228, 1995.
[27]Synthetic Control Chart Time Series Data Set.UCI Machine Learning Repository. Available:
http://kdd.ics.uci.edu/databases/synthetic_control/synthetic_control.html
[28]Pham, D.T., & Oztemel, E., “Control Chart Pattern Recognition using Learning Vector
Quantization Networks”, International Journal of Production Research, vol. 32(3), pp. 721–729,
1994.
[29]Pham, D.T., & Chan, A.B., “Control Chart Pattern Recognition using a New Type of Self-
Organization Neural Network”, in Proceedings of the Institution of Mechanical Engineers, Part I:
Journal of Systems and Control Engineering, vol. 212, no. 2, pp. 115-127, 1998.
Abnormal Patterns Detection in Control Charts using Classification Techniques
Zalinda Othman and Huda Fathi Eshames
70

More Related Content

Similar to Detecting Abnormal Patterns in Control Charts using Classification

Quality management system documentation
Quality management system documentationQuality management system documentation
Quality management system documentationselinasimpson1501
 
Quality of service management
Quality of service managementQuality of service management
Quality of service managementselinasimpson2301
 
UNIT III.pptx
UNIT III.pptxUNIT III.pptx
UNIT III.pptxMECHHOD6
 
Information Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationInformation Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationDr. Mirko Kämpf
 
Quality management system objectives
Quality management system objectivesQuality management system objectives
Quality management system objectivesselinasimpson361
 
Quality management system training
Quality management system trainingQuality management system training
Quality management system trainingselinasimpson0701
 
Methods of quality management
Methods of quality managementMethods of quality management
Methods of quality managementselinasimpson2001
 
Quality management system tools
Quality management system toolsQuality management system tools
Quality management system toolsselinasimpson2501
 
Quality management tools and techniques
Quality management tools and techniquesQuality management tools and techniques
Quality management tools and techniquesselinasimpson0501
 
Quality management manual template
Quality management manual templateQuality management manual template
Quality management manual templateselinasimpson331
 
Training quality management system
Training quality management systemTraining quality management system
Training quality management systemselinasimpson2701
 
Healthcare quality management
Healthcare quality managementHealthcare quality management
Healthcare quality managementselinasimpson0601
 
Quality in project management
Quality in project managementQuality in project management
Quality in project managementselinasimpson0401
 
Quality management process model
Quality management process modelQuality management process model
Quality management process modelselinasimpson2701
 
Quality software project management
Quality software project managementQuality software project management
Quality software project managementselinasimpson1601
 
Quality management solutions
Quality management solutionsQuality management solutions
Quality management solutionsselinasimpson0801
 
Applying quality management in healthcare
Applying quality management in healthcareApplying quality management in healthcare
Applying quality management in healthcareselinasimpson1601
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...IJECEIAES
 

Similar to Detecting Abnormal Patterns in Control Charts using Classification (20)

Quality management system documentation
Quality management system documentationQuality management system documentation
Quality management system documentation
 
Quality of service management
Quality of service managementQuality of service management
Quality of service management
 
UNIT III.pptx
UNIT III.pptxUNIT III.pptx
UNIT III.pptx
 
Information Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationInformation Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation Optimization
 
Quality management system objectives
Quality management system objectivesQuality management system objectives
Quality management system objectives
 
C054
C054C054
C054
 
Quality management system training
Quality management system trainingQuality management system training
Quality management system training
 
Methods of quality management
Methods of quality managementMethods of quality management
Methods of quality management
 
Quality management system tools
Quality management system toolsQuality management system tools
Quality management system tools
 
Quality management tools and techniques
Quality management tools and techniquesQuality management tools and techniques
Quality management tools and techniques
 
Quality management manual template
Quality management manual templateQuality management manual template
Quality management manual template
 
Training quality management system
Training quality management systemTraining quality management system
Training quality management system
 
Healthcare quality management
Healthcare quality managementHealthcare quality management
Healthcare quality management
 
Quality in project management
Quality in project managementQuality in project management
Quality in project management
 
Quality management process model
Quality management process modelQuality management process model
Quality management process model
 
Quality software project management
Quality software project managementQuality software project management
Quality software project management
 
Quality management solutions
Quality management solutionsQuality management solutions
Quality management solutions
 
Applying quality management in healthcare
Applying quality management in healthcareApplying quality management in healthcare
Applying quality management in healthcare
 
Quality management metrics
Quality management metricsQuality management metrics
Quality management metrics
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...
 

More from Kate Campbell

Writing Creative Nonfiction By Philip Gerard, Paperbac
Writing Creative Nonfiction By Philip Gerard, PaperbacWriting Creative Nonfiction By Philip Gerard, Paperbac
Writing Creative Nonfiction By Philip Gerard, PaperbacKate Campbell
 
Free Lined Writing Paper Printable - Prin
Free Lined Writing Paper Printable - PrinFree Lined Writing Paper Printable - Prin
Free Lined Writing Paper Printable - PrinKate Campbell
 
How To Cite APA In Text Citation How To Use Apa Format For Citation
How To Cite APA In Text Citation How To Use Apa Format For CitationHow To Cite APA In Text Citation How To Use Apa Format For Citation
How To Cite APA In Text Citation How To Use Apa Format For CitationKate Campbell
 
Sea Turtle Writing Paper
Sea Turtle Writing PaperSea Turtle Writing Paper
Sea Turtle Writing PaperKate Campbell
 
Heart-Shaped Printable Writing Page Valentines
Heart-Shaped Printable Writing Page ValentinesHeart-Shaped Printable Writing Page Valentines
Heart-Shaped Printable Writing Page ValentinesKate Campbell
 
High School Vs College
High School Vs CollegeHigh School Vs College
High School Vs CollegeKate Campbell
 
College Essay On Leadership
College Essay On LeadershipCollege Essay On Leadership
College Essay On LeadershipKate Campbell
 
Writing A Research Paper - A Step-By-Step Approach TeacherS Guide
Writing A Research Paper - A Step-By-Step Approach TeacherS GuideWriting A Research Paper - A Step-By-Step Approach TeacherS Guide
Writing A Research Paper - A Step-By-Step Approach TeacherS GuideKate Campbell
 
How To Write A Poem ChildrenS Book By Cecilia
How To Write A Poem ChildrenS Book By CeciliaHow To Write A Poem ChildrenS Book By Cecilia
How To Write A Poem ChildrenS Book By CeciliaKate Campbell
 
Easy Essay On Global Warming. G
Easy Essay On Global Warming. GEasy Essay On Global Warming. G
Easy Essay On Global Warming. GKate Campbell
 
Sample Conclusion Of A Research Paper What I
Sample Conclusion Of A Research Paper What ISample Conclusion Of A Research Paper What I
Sample Conclusion Of A Research Paper What IKate Campbell
 
Why I Wish To Attend Virginia Commonwealth University
Why I Wish To Attend Virginia Commonwealth UniversityWhy I Wish To Attend Virginia Commonwealth University
Why I Wish To Attend Virginia Commonwealth UniversityKate Campbell
 
Essay On My Teacher Is The
Essay On My Teacher Is TheEssay On My Teacher Is The
Essay On My Teacher Is TheKate Campbell
 
Chinese Character Practice Writing Paper
Chinese Character Practice Writing PaperChinese Character Practice Writing Paper
Chinese Character Practice Writing PaperKate Campbell
 
Hello Kitty Backgrounds, Hello Kitty Wallpaper, Sanr
Hello Kitty Backgrounds, Hello Kitty Wallpaper, SanrHello Kitty Backgrounds, Hello Kitty Wallpaper, Sanr
Hello Kitty Backgrounds, Hello Kitty Wallpaper, SanrKate Campbell
 
The Best IELTS Task 2 Writing Template - Magoos
The Best IELTS Task 2 Writing Template - MagoosThe Best IELTS Task 2 Writing Template - Magoos
The Best IELTS Task 2 Writing Template - MagoosKate Campbell
 
Rhetorical Analysis Essay Conclusion. Rhetorical Anal
Rhetorical Analysis Essay Conclusion. Rhetorical AnalRhetorical Analysis Essay Conclusion. Rhetorical Anal
Rhetorical Analysis Essay Conclusion. Rhetorical AnalKate Campbell
 
Handwriting Without Tears Paper Handwriting Withou
Handwriting Without Tears Paper Handwriting WithouHandwriting Without Tears Paper Handwriting Withou
Handwriting Without Tears Paper Handwriting WithouKate Campbell
 
Sample For Report Writing
Sample For Report WritingSample For Report Writing
Sample For Report WritingKate Campbell
 
Expert MBA Essay Writing Service Essay Writing, Writing Services
Expert MBA Essay Writing Service Essay Writing, Writing ServicesExpert MBA Essay Writing Service Essay Writing, Writing Services
Expert MBA Essay Writing Service Essay Writing, Writing ServicesKate Campbell
 

More from Kate Campbell (20)

Writing Creative Nonfiction By Philip Gerard, Paperbac
Writing Creative Nonfiction By Philip Gerard, PaperbacWriting Creative Nonfiction By Philip Gerard, Paperbac
Writing Creative Nonfiction By Philip Gerard, Paperbac
 
Free Lined Writing Paper Printable - Prin
Free Lined Writing Paper Printable - PrinFree Lined Writing Paper Printable - Prin
Free Lined Writing Paper Printable - Prin
 
How To Cite APA In Text Citation How To Use Apa Format For Citation
How To Cite APA In Text Citation How To Use Apa Format For CitationHow To Cite APA In Text Citation How To Use Apa Format For Citation
How To Cite APA In Text Citation How To Use Apa Format For Citation
 
Sea Turtle Writing Paper
Sea Turtle Writing PaperSea Turtle Writing Paper
Sea Turtle Writing Paper
 
Heart-Shaped Printable Writing Page Valentines
Heart-Shaped Printable Writing Page ValentinesHeart-Shaped Printable Writing Page Valentines
Heart-Shaped Printable Writing Page Valentines
 
High School Vs College
High School Vs CollegeHigh School Vs College
High School Vs College
 
College Essay On Leadership
College Essay On LeadershipCollege Essay On Leadership
College Essay On Leadership
 
Writing A Research Paper - A Step-By-Step Approach TeacherS Guide
Writing A Research Paper - A Step-By-Step Approach TeacherS GuideWriting A Research Paper - A Step-By-Step Approach TeacherS Guide
Writing A Research Paper - A Step-By-Step Approach TeacherS Guide
 
How To Write A Poem ChildrenS Book By Cecilia
How To Write A Poem ChildrenS Book By CeciliaHow To Write A Poem ChildrenS Book By Cecilia
How To Write A Poem ChildrenS Book By Cecilia
 
Easy Essay On Global Warming. G
Easy Essay On Global Warming. GEasy Essay On Global Warming. G
Easy Essay On Global Warming. G
 
Sample Conclusion Of A Research Paper What I
Sample Conclusion Of A Research Paper What ISample Conclusion Of A Research Paper What I
Sample Conclusion Of A Research Paper What I
 
Why I Wish To Attend Virginia Commonwealth University
Why I Wish To Attend Virginia Commonwealth UniversityWhy I Wish To Attend Virginia Commonwealth University
Why I Wish To Attend Virginia Commonwealth University
 
Essay On My Teacher Is The
Essay On My Teacher Is TheEssay On My Teacher Is The
Essay On My Teacher Is The
 
Chinese Character Practice Writing Paper
Chinese Character Practice Writing PaperChinese Character Practice Writing Paper
Chinese Character Practice Writing Paper
 
Hello Kitty Backgrounds, Hello Kitty Wallpaper, Sanr
Hello Kitty Backgrounds, Hello Kitty Wallpaper, SanrHello Kitty Backgrounds, Hello Kitty Wallpaper, Sanr
Hello Kitty Backgrounds, Hello Kitty Wallpaper, Sanr
 
The Best IELTS Task 2 Writing Template - Magoos
The Best IELTS Task 2 Writing Template - MagoosThe Best IELTS Task 2 Writing Template - Magoos
The Best IELTS Task 2 Writing Template - Magoos
 
Rhetorical Analysis Essay Conclusion. Rhetorical Anal
Rhetorical Analysis Essay Conclusion. Rhetorical AnalRhetorical Analysis Essay Conclusion. Rhetorical Anal
Rhetorical Analysis Essay Conclusion. Rhetorical Anal
 
Handwriting Without Tears Paper Handwriting Withou
Handwriting Without Tears Paper Handwriting WithouHandwriting Without Tears Paper Handwriting Withou
Handwriting Without Tears Paper Handwriting Withou
 
Sample For Report Writing
Sample For Report WritingSample For Report Writing
Sample For Report Writing
 
Expert MBA Essay Writing Service Essay Writing, Writing Services
Expert MBA Essay Writing Service Essay Writing, Writing ServicesExpert MBA Essay Writing Service Essay Writing, Writing Services
Expert MBA Essay Writing Service Essay Writing, Writing Services
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Detecting Abnormal Patterns in Control Charts using Classification

  • 1. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames School of Information Technology, Faculty of Information Science and Technology Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia. E-mail: zalinda@ftsm.ukm.my Abstract Any abnormal patterns show in Statistical Process Control charts imply the presence of possible assignable causes and variances that may lead to the process performance deterioration. Therefore, timely detection and recognizer of patterns in control charts are very important in the SPC implementation. This paper presents the performance of five classification methods on a set of large data for anomaly patterns detection in control charts. The control chart dataset has its specific features that need specific data preprocessing procedures. It is crucial and involves a number of stages of data preparation procedures. Firstly, the Principle Component Analysis is employed for similarity measure. Secondly, the Piecewise Aggregate Approximation and Symbolic Aggregate Approximation are used as data representation. The preprocessed data are fitted to the classification algorithms to extract important knowledge. The algorithms are support vector machine, decision tree, MLP networks, RIDOR algorithm and JRip algorithm. Numerical results showed that the JRip algorithm has the best performance compared to the others. It achieved highest detection accuracy about 99.66 % and the lowest error rate is 2.987. Keywords: Control Chart Patterns Recognition, Statistical Process Control (SPC), Time Series Data Mining. 1. Introduction Control charts are useful statistical tools for controlling and monitoring the quality characteristics of industrial processes. They are useful in determining whether a process is behaving as intended or if there are some unnatural causes of variation. Shewhart developed a control chart in 1931 [1]. Control chart provides a graphical representation of the process behavior that is used to monitor the system’s condition and for identifying instability conditions. The advantages of control charts can be further increased by adopting a control strategy that is, first, based on detecting patterns behavior (e.g. cyclic, trend, systematic changes) that can appear on the chart and second, lends itself to adaptive automation [2]. The main problem of most multivariate control charts is that they can detect an unusual event but do not directly provide the information required by a practitioner to determine which one of the variables or which subset of them causes the out-of-control signal. This raises the issue of identification in relation to multivariate control procedures. During diagnosis of the process behavior, the variations that may appear on the chart can be classified to various categories (e.g. patterns) based on the sources that cause them. Accurate classification of these patterns is vital for a production system to effectively monitor and reduce process variations. Chance/random variations are due to common causes (natural cause), and other variations are due to special causes (assignable cause). Common cause occurs naturally in the manufacturing process such as poor product design, inappropriate material, poor instruction and old machines. Western Electric [3] described in the handbook of natural process behaviour that most data points appear on the control charts near the centre line and have no points or actually very few (not exceeding control limits). Unnatural behaviour shows the points on a chart fluctuating widely (or not widely enough), or fails equilibrium about the centre line of the chart. Most commonly encountered patterns are shift, trend, normal, cycle, stratification, systematic and mixture that may appear on the control chart as defined in the Handbook by Western [3]. Control charts data are the time series data due to the large amount of data with the time stamp. The computing time is very complex. In order to reduce this computation time, the time series data need to be represented in high dimensional order. Most of the time series data are real valued data that require the data to be discredited [4]. A time series is a series of observations, xi t  : i 1,฀ ,n;t 1฀ ,m   Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames International Journal of Advancements in Computing Technology(IJACT) Volume4,Number10,June2012 doi:10.4156/ijact.vol4.issue10.8 61
  • 2. made sequentially through time where, the measurements indexes made at each time point, t. The resulting time series is univariate or multivariate respectively. It is called a univariate time series when n is equal to 1, and a multivariate time series (MTS) when n is equal to, or greater than 2. Control charts dataset that involves time is the MTS dataset [5]. The process behavior that appears on the charts indicates whether the quality of the manufacturing process is in control or not. Therefore, a good control chart monitoring should be able to detect the out of control situations and know when to stop the process. This paper is organized as follows: the next section reviews the related research done on anomaly detection. Section 3 presents the methodology of our approach. Section 4 discusses the experiments performed and results obtained and finally, the last section concludes this study. 2. Related works Anomaly detection can detect unknown variations, under a basic assumption that variations deviate from normal behavior. Patterns recognition can be defined as a classification of input data into identifiable pattern classes through the extraction of representative features of the data. There are several reported research papers on summarization and categorization of all possible patterns that are commonly appeared in SPC charts. Over the years, rapid developments in computer technology motivate researchers to explore new methods based on CCP recognizer such as artificial neural network (ANN). Example work shown in Guh [6] that have used neural network (NN) and genetic algorithm (GA), where the GA was proposed for optimizing the NN recognizer. Later he [7] suggested ANN-based model for recognition of both mean and variance SSPs. He employed direct data and selected statitical features as input vector to ANNs. Another recent work that using ANN is by Ebrahimzadeh & Ranaee [8]. They designed an accurate, automatic system for recognition of CCPs that hybridized RBF wavelet methods and PSO approach. Literature reviews show NNs have shown capability as a suitable tool for detecting unnatural patterns in CCP. It is because the learning capability, speed and ease of implementation and can be used to deal with incomplete or noisy data. Support vector machine (SVM) also has attracted researchers in CCPs recognition ([9] and [10]). Wang [11] proposed SVM to detect unnatural patterns in control charts such as, cyclic, shift and trend patterns. In the research work reported by Das & Banerjee [12], SVM with self-organized maps was used to build a CCP detector for online implementation. Zhiqiang and Yizhong [13] and Cheng et al. [14] suggested a model named least squares SVM to detect behaviour of variance shifts in bivariate processes. Decision tree (DT) is well-recognised approach for its capability in detecting known attacks [15]. In CCPs pattern detection problem, several researchers have used DT. For example, Guh [16] proposed a hybrid learning-based model for recognition of CCPs. Guh's work used NN and DT to detect and identify eight types of control chart patterns. Guh & Shiue [17] developed an automatic system for CCP identification based on DT learning and back propagation networks (BPNs). Wang et al. [18] proposed independent component analysis with DT to identify various types of CCPs. Six types of concurrent control chart patterns were used to validate the proposed approach. Different from the above approaches, this paper presents the time series preprocessing approaches (Principal Component Analysis (PCA) and Symbolic Aggregate Approximation (SAX) with Piecewise Aggregate Approximation (PAA)) to represent control charts data prior to detecting for anomaly patterns by using a number of approaches such as SVM, MLP networks, DT, Ridor algorithm and JRip algorithm. 3. Methodology In this section, the control chart data preprocessing stages are discussed. It involves two main steps: the measure of similarity using the Principal Component Analysis (PCA) method and the transformation of these data using Symbolic Aggregate Approximation (SAX) with Piecewise Aggregate Approximation (PAA). Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 62
  • 3. 3.1 Similarity measure The first step is to compute the similarity by using PCA. PCA is one of the mathematical techniques commonly used in the data mining community and the statistics for analysis of time series data. It is described by Dash et al. [19] as; “It is an unsupervised linear feature reduction method, for projecting high dimensional data into a low dimensional space with minimum reconstruction errors”. This approach produces a reduced set of features that specify the maximal variances in the data as well as the discriminative features most adequate for classification, with minimum loss of information. In this section, the application of PCA in representing time series ( T ) of length n as a matrix Xnp will be explained, where n represents number of time instances (length of time series); whereas p is the number of time series data (number of variables being measured). The derivation of the new axes (components) is based on the computation of covariance matrix of the data X as following equation (Tanaka et al. [20]): A  x1t x1t t  x1t x2t t  ฀ x1t xmt t  x2t x1t t  x2t x2t t  ฀ x2t xmt t      xmt x1t t  xmt x2t t  ฀ xmt xmt t                  (1) The calculation of the eigenvalues i of this matrix is ordered as 1  2  m . The M eigenvectors corresponding to the M largest eigenvalues of the covariance matrix is represented as e1i, e2i,฀ , emi . Then the ith principal component pct,i is computed by using means of x1, x2,฀ , xm . pct,i  e1i x1  x1  e2i x2  x2  emi xm  xm   (2) Then, the principal component is used to effectively transform the time series data from n- dimensional to m-dimensional space. Finally, the m-dimensional time series data ( T ) is illustrated as below: T  x1,฀ , xt ฀ , xn (3) xt  e11 x1t  x1   e21 x2t  x2  em1 xmt  xm   (4) PCA can detect the important coordinates that include characteristics of the original data T , because the importance of each coordinate is represented in each coefficient e11 . PCA can improve the performance of a detector as mentioned by Fengbin Zhang et al. [21] in their work on anomaly detection problem. 3.2 The combination of SAX and PAA In this study, PAA with SAX is used for data representations. Firstly, the time series data are discretized by obtaining a PAA approximation. The idea of PAA representation is that it represents the time series data as a vector expression. This is obtained by dividing time series data into frames and calculating the mean value in each frame. It represents the time series data as a sequence of rectangle basis functions and then converts it into the discrete symbolic sequences, as refer in Eq. (5). In this equation, a time series data T  x1,฀ , xn of length n can be represented as w, i.e. the number of PAA segments/frames representing time series (m < n), and X j is the average value of the ith segment and a vector X i is calculated as follows: Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 63
  • 4. Xi  w n Xj j n w i1  1 n w i  (5) Secondly, after PAA represented of each time series data by vector of w-dimension, whereupon, “breakpoints” can be determined to mapping the vector into a sequence of SAX symbols. Lin et al. [4] define breakpoint as; “Breakpoints are a sorted list of numbers B  1,฀ ,a1 such that the area under a N (0,1) Gaussian curve from i to i1  1 a ( 0 and a are defined as -∞ and ∞, respectively)”. These breakpoints may be determined by looking them up in a statistical table as shown in Table 1. The data is normalized into fixed number of states according to the predetermined breakpoints. This produces an equal-sized area under Gaussian distribution curve to map PAA to SAX symbols. By referring to the SAX Gaussian Distribution Table, as in Table 1, the corresponding β and related values of a (from 3 to 10) for the breakpoints can be determined. Once the breakpoints have been obtained we can discretize a time series in the following manner. All coefficients of PAA that are below the smallest breakpoints are mapped to the symbol “a” and all PAA coefficients greater than or equal to the smallest breakpoint and less than the second smallest breakpoint are transformed to the symbol “b” and so on. This idea is shown as in Figure 1. It is noted in this figure that two breakpoints have been obtained, therefore 3 symbols a, b, and c are used. In this example, the time series of length n = 128 are discretized by first obtaining a PAA approximation for reduction to w = 8. Then, by using the predetermined breakpoints PAA coefficients are map into SAX symbols. In the figure, by using a = 3, the time series is map to the word baabccbc. Table 1. The SAX Gaussian Distributions a 3 4 5 6 7 8 9 10 1 -0.43 -0.67 -0.84 -0.97 -1.07 -1.15 -1.22 -1.22 2 0.43 0 -0.25 -0.43 -0.57 -0.67 -0.76 -0.84 3 0.67 0.25 0 -0.18 -0.32 -0.43 -0.52 4 0.84 0.43 0.18 0 -0.14 -0.25 5 0.97 0.57 0.32 0.14 0 6 1.07 0.67 0.43 0.25 7 1.15 0.76 0.52 8 1.22 0.84 9 1.28 Figure 1. PAA transformation to SAX symbols SAX symbol Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 64
  • 5. 4. Classifier The proposed classification algorithms in this study are described in this section: A. Decisions Tree Decision Tree (DT) is one of the popular and powerful learning techniques. It is due to its various characteristics that include simplicity, comprehensibility, less parameters, and its ability to handle mixed-type data. A DT is induced from a set of labeled training instances represented by a couple of attribute values and class labels. Its learning process is typically a greedy, top-down and recursive process starting with the entire training data and an empty tree. An attribute that best partitions the training data is chosen as the splitting attribute for the root. The training data are then partitioned into disjointed subsets satisfying the values of the splitting attributes [22]. B. Support Vector Machine Support Vector Machine (SVM) is considered one of the successful learning algorithms proposed in the application of classification, regression and detection tasks. Referring to Chang & Chang [23], SVM is a powerful machine-learning tool. It has the capacity to represent non-linear relationships and producing models that generalize well to unseen data. The main goal of applying SVM for solving classification problems is to transform the input space to a higher dimensional feature space through a non-linear mapping function. C. Multilayer Perceptron Neural Networks Multilayer Perceptron (MLP) Neural Networks have been used over the years as a powerful learning algorithm for solving a wide variety of problems. Much progress has been made in improving performance and in understanding how these neural networks operate. MLP neural networks consist of units arranged in layers. Each layer is composed of nodes and in the fully connected networks. Each node connects to every node in subsequent layers. Each MLP is composed of a minimum of three layers consisting of an input layer, one or more hidden layer(s) and an output layer. The input layer distributes the inputs to subsequent layers. Input nodes have linear activation functions and no thresholds. Each hidden unit node and each output node have thresholds associated with them in addition to the weights [24]. D. JRip algorithm Extended Repeated Incremental Pruning (JRip) approach was proposed by Cohen [25] as an optimized version of IREP. RIPPER extracts the rules directly from the data. It implements a propositional rule learner, “Repeated Incremental Pruning to Produce Error Reduction” (RIPPER). Before building a rule, the current set of training examples are partitioned into two subsets, a growing set (usually 2/3) and a pruning set (usually 1/3). RIPPER builds a rule set by repeatedly adding rules to an empty rule set until all positive examples are covered. Rules are formed by greedily adding condition to the antecedent of a rule (starting with empty antecendent) until no negative examples are covered. After growing a rule from the growing set, condition is deleted from the rule in order to improve the performance of the rule set on the pruning examples. To prune a rule, RIPPER considers only a final sequence of conditions from the rule, and selects the deletion that maximizes the function. As in Eq. (6): v Rule, prpos, prNeg    p  n p n (6) Where Rule is the set of rules, prpos is the total number of examples in the considered cluster, prNeg is the total number of examples in the cluster not considered and p, n are the number of (prpos, prNeg) examples covered by Rule. E. Ridor algorithm Ridor algorithm is the implementation of a RIpple-DOwn Rule learner proposed by Gaines and Compton [26]. It generates a default rule first and then the exceptions for the default rule with the least (weighted) error rate. Then it generates the “best” exceptions for each exception and iterates until pure. Thus it performs a tree-like expansion of exceptions. The exceptions are a set of rules that predict classes other than the default. IREP is used to generate the exceptions. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 65
  • 6. 5. Simulation results Synthetic Control Chart Time Series (SCCTS) datasets are taken from the UCI Machine Learning Repository website [27]. The datasets consist of 600 examples of control charts. These examples are divided into six different classes (patterns). Each class consists of 100 time series and the length of each time series is equal to 60 (60 numerical attributes). These classes are cyclic, normal, increasing/decreasing trend, upward/downward shift and generated according to the six equations as given in Pham and Oztemel [28] and Pham and Chan [29]. In this paper, the raw collected data are cleaned according to time series pre-processing procedures. Initially, PCA is applied to obtain reduced uncorrelated attributes by specifying maximal variances in the data with minimum less of information, and it implies the process of data compress. This approach transformed the data from high- dimensional data to low-dimensional data. The results obtained shown that the PCA has achieved optimization efficiency in dimensions reduction. It is reduced number of dimensions/ attributes dataset from 60 attributes to 40. The values of PCA are then being transformed to symbols by using PAA and SAX. Based on Gaussian distribution curve, five symbols are chosen. In this study, the symbols are represented in numbers. In this paper, four breakpoints are obtained. The control chart data are mapped to numbers using a = 5. The data are transformed into number 1 to 5. By using the above steps, a program is developed for data preprocessing by using Visual Basic for Applications (VBA). These procedures achieved the effective properties in pattern representation and reached for building a good classification model. The preprocessed data are mined using five classification techniques as discussed in previous section. The performance is measured by the anomaly detection accuracy and error average with time taken in building the model. The mining process uses 10 folds cross validation procedure with various allocations of training and testing set. In this study, the WEKA and ROSETTA are used as a mining and modeling tool. Table 2. Simulation results for each technique Table 3. Simulation Errors Algorithm Detection Accuracy % Error Rate Time (sec) DT 99.44 3.305 0.04 SVM 96.66 9.708 1.84 JRip 99.66 2.987 0.12 Ridor 99.44 3.061 0.17 MLP 98.33 5.584 16.16 Algorithm Mean Absolute Error Root Mean Squared Error Relative Absolute Error (%) Root Relative Squared Error (%) SVM 0.233 0.311 80.067 83.230 Jrip 0.006 0.036 2.189 9.717 MLP 0.012 0.067 4.226 17.890 DT 0.004 0.043 1.528 11.645 Ridor 0.002 0.043 0.666 83.230 Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 66
  • 7. Figure 2. Detection accuracy obtained by classification techniques Figure 3. Average error rate and time taken to build the model The experimental results indicated that the proposed techniques have produced the model with high accuracy and lower error rate with lower total time taken to build model. Based on Figure 2, 3, Table 2, and 3, it is noted that each proposed algorithms achieved high detection accuracy. The highest accuracy is 99.66%, produced by JRip and followed by DT and Ridor are about 99.44%, then MLP networks is 98.33% detection accuracy and SVM is about 96.66%. The time requires to build the model is also a parameter for comparing the classification techniques. It can be observed from Figure 3 that a DT has taken the shortest building time that is around 0.04 seconds compared to the others. JRip requires around 0.12 seconds, Ridor 0.17 seconds and SVM is 1.84 seconds for building the model. MLP networks take the longest time to build the model that is around 16.16 seconds. From Table 2, it is discovered that the highest error is found in SVM with an average errors of 9.708, while the rest of the techniques ranging from 2.987 to 5.584. The technique with lower error rate has a powerful classification capability. In addition, more potential in terms of control chart patterns recognizer. Besides the classification capability, the anomaly in CCPs can be detected by observing the generated rules from the classification model. Table 4 provides an overview of the rules generated from the selected JRip classification model. Rule induction algorithms generate a model as set of rules. The rules are in the standard form of If-Then rules. The number of rules obtained varies from one fold/model to another. The rules generated in the best model cover all instances and features. These rules might lead to a good decision and conclusion. These rules have an intuitive interpretation. For example, the first rules states: (T1>= 3) => class = 1 (50.0/0.0), if the T1 (the first attribute in the data, it represents a period of time) occurs is the larger than or is equal to 3 (a point representing quality characteristics of sample taken from the manufacturing process at a period of time, then class is equal 1 (type of pattern/class is normal). This means that process is in control. The number in parenthesis indicates how many on the training examples were covered successfully by this rule. For example, for the first rule, 50 examples were covered by this rule correctly (covers instances with total weights of 50.0), out of which there are instances with weights of 0.0 are misclassified. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 67
  • 8. Table 4. Rules generated from the best classification model based on JRip Algorithm Class/Pattern Related rules Normal => Class = 1 (T1 >= 3) => Class = 1 (50.0/0.0) Cyclic => Class = 2 (T4 <= 2) => Class = 2 (47.0 / 1.0) (T2 <= 1) => Class = 2 (4.0 / 0.0) Increasing trend => Class = 3 (56.0/3.0) Decreasing trend => Class = 4 (T1 >= 5) => Class = 4 (48.0/0.0) Upward Shift => Class = 5 (T1 <= 2) and (T7 >= 5) => Class = 5 (31.0/0.0) (T5 <= 1) and (T1 <= 2) => Class = 5 (14.0/0.0) Downward shift => Class = 6 (T1 >= 4) and (T7 <= 2) => Class = 6 (39.0/1.0) (T5 >= 5) and (T1 >= 2) => Class = 6 (11.0/0.0) 6. Conclusions As a conclusion, the experimental results show that data mining and machine learning can be extremely beneficial in generates quality knowledge and may benefit the manufacturers. This work has achieved its proposed goals in implementing suitable approaches to preprocess control chart data prior to the classification task. In addition, to investigate and evaluate five selected classification techniques. The performances of these techniques are measured based on recognition accuracy, error rate and the time taken to build model. The preprocessing tasks proposed have shown that with proper preparation of control chart data, the classification techniques are suitable for solving this problem. Through the results obtained, it can be clearly seen that all the values of recognition accuracy and average errors indicate that the best classification model is obtained by using JRip algorithm. It has proved effective and fast to use even with large and noisy datasets. Therefore, it gave the highest accuracy, and lowest error rate with shortest time to build the model. Future work can be carried out in several areas, including using real time data, since it provides a genuine test for verifying the classification methods in SPC implementation. Studying the statistical characteristics of the different features of data may provide important guidelines developing and improving pattern recognition applications in SPC. In this study, only six types of abnormal patterns were studied. Therefore, the future work can be extended to add more patterns in the control scheme, such as stratification or mixture. In addition, several efforts have focused on the development of methodologies for the mining process of the control chart data in the last decade. However, relatively few methods have been developed to classify the data with an efficient way. Therefore, it is necessary to conduct further research on developing a classification model for the process control data. 7. Acknowledgment The authors wish to thank UKM for its financial support under UKM-TT-07-FRGS0158-2010 grant. 8. References [1] Shewhart, W. A. Economic control quality manufactured products. New York: Van Nostrand, 1931. [2] Swift, J. A., “Development of a Knowledge based Expert System for Control Chart Pattern Recognition and Analysis”, unpublished phd dissertation, Oklahoma State University, 1987. [3] Western Electric Company. (Ed.). Statistical quality control handbook. Indianapolis: Western Electric. New York, 1985. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 68
  • 9. [4] Lin, J., Keogh, E., Lonardi, S. & Chiu, B., “A Symbolic Representation of Time Series, with Implications for Streaming Algorithms”, in Workshop on research issues in data mining and knowledge discovery, June 13, San Diego, CA, USA. pp. 2-11, 2003. [5] Yang, K. & Shahabi, C., “A PCA-Based Similarity Measure for Multivariate Time Series”, In Proceedings of the Second ACM International Workshop on Multimedia Databases, pp. 65-74, 2004. [6] Guh, R. S., “Optimizing Feed Forward Neural Networks for Control Chart Pattern Recognition through Genetic Algorithms”, International Journal of Pattern Recognition and Artificial Intelligence, vol. 18(2), pp. 75–99, 2004. [7] Guh, R. S., “Simultaneous Process Mean and Variance Monitoring using Artificial Neural Networks”, Computers and Industrial Engineering, vol. 58, pp. 739-753, 2010. [8] Ebrahimzadeh, A. & Ranaee, V., “Control Chart Pattern Recognition using an Optimized Neural Network and Efficient Features”, ISA Transactions, vol. 49(3), pp. 387-393, 2010. [9] Sun, R., & Tsung, F., “A Kernel-Based Multivariate Control Chart using Support Vector Methods”, International Journal of Production Research, vol. 41, pp. 2975–2989, 2003. [10]Chinnam, R. B., “Support Vector Machines for Recognizing Shifts in Correlated and Other Manufacturing Processes”, International Journal of Production Research, vol 40, pp. 4449-4466, 2002. [11]Wang, X., “Hybrid Abnormal Patterns Recognition of Control Chart Using Support Vector Machining”, In proceedings 2008 Intenational Conference on Computational Intelligence and Security, CIS 2008 2, art. No. 4724773, pp. 238-241, 2008. [12]Das, P. & Banerjee, I., “A Hybrid Detection System of Control Chart Patterns using Cascaded SVM and Neural Network-Based Detector”, Neural Computing and Applications, pp. 1-10, 2010. [13]Zhiqiang Cheng & Yizhong Ma, “Source(S) Identification of Variance Shifts in Bivariate Process using LS-SVM based Pattern Recognition Model”, Advanced Materials Research, vol. 129-131, pp. 891-896, 2010. [14]Cheng, Z. Q., Ma, Y. Z. & Bu, J., “Variance Shifts Identification Model of Bivariate Process based on LS-SVM Pattern Recognizer”, Communications in Statistics: Simulation and Computation, vol. 40 (2), pp. 286-296, 2011. [15]Marjan Bahrololum, Elham Salahi, Mahmoud Khaleghi, “An Improved Intrusion Detection Technique based on two Strategies using Decision Tree and Neural Network”, JCIT: Journal of Convergence Information Technology, vol. 4, no. 4, pp. 96-101, 2009. [16]Guh, R.S., “A Hybrid Learning-Based Model for On-Line Detection and Analysis of Control Chart Patterns”, Computers & Industrial Engineering, vol. 49, pp, 35–62, 2005. [17]Guh, R.S., Shiue, Y.R., “On-Line Identification of Control Chart Patterns using Self-Organized Approaches”, International Journal of Production Research, vol. 43(5), 1225–1254, 2005. [18]Wang, C.H., Dong, T.P., Kuo, W., “A Hybrid Approach for Identification of Concurrent Control Chart Patterns”, Journal of Intelligent Manufacturing, vol. 20 (4), pp. 409-419, 2009. [19]Rajashree Dash, Rasmita Dash and Debahuti Mishra, “A Hybridized Rough-PCA Approach of Attribute Reduction for High Dimensional Data Set”, European Journal of Scientific Research, vol.44 (1), pp.29-38, 2010. [20]Tanaka, Y., Iwamoto, K., & Uehara, K., “Discovery of Time Series Motif from Multi- Dimensional Data Based on MDL Principle”, Machine Learning, vol. 58, no. 2-3, pp. 269-300, February 2005. [21]Fengbin Zhang, Xin Yue, Dawei Wang, Liang Xi, "A Principal Components Weighted Real- valued Negative Selection Algorithm", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 6, pp. 313-324, 2011. [22]Su, J. & Zhang, H., “A Fast Decision Tree Learning Algorithm”, in Proceedings of the 21st national conference on artificial intelligence, vol (1) pp. 500-505, 2006. [23]Cheng, H.P. & Cheng, C.S., “A Support Vector Machine for Recognition Control Chart Patterns in Multivariate Process”, in Proceeding of the 5th Asian Quality Congress, Incheon, Korea, pp. 456- 465, 2007. [24]Walter, H. Delashmit & Michael, T. Manry, “Recent Developments in Multilayer Perceptron Neural Networks”, in Proceedings of the 7th Annual Memphis Area Engineering and Science Conference MAESC, 2005. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 69
  • 10. [25]Cohen, W.W., “Fast Effective Rule Induction”, In A. Prieditis and S. Russell (eds.), Proceedings of the 12th International Conference on Machine Learning, Lake Tahoe, CA., pp.115-123, 1995. [26]Gaines, B.R. & Compton, P., “Induction of Ripple-Down Rules Applied to Modelling Large Database”, Journal of Intelligent Information Systems, vol. 5(3), pp. 211-228, 1995. [27]Synthetic Control Chart Time Series Data Set.UCI Machine Learning Repository. Available: http://kdd.ics.uci.edu/databases/synthetic_control/synthetic_control.html [28]Pham, D.T., & Oztemel, E., “Control Chart Pattern Recognition using Learning Vector Quantization Networks”, International Journal of Production Research, vol. 32(3), pp. 721–729, 1994. [29]Pham, D.T., & Chan, A.B., “Control Chart Pattern Recognition using a New Type of Self- Organization Neural Network”, in Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, vol. 212, no. 2, pp. 115-127, 1998. Abnormal Patterns Detection in Control Charts using Classification Techniques Zalinda Othman and Huda Fathi Eshames 70