SlideShare a Scribd company logo
1 of 33
Download to read offline
Anomaly Detection for
Preventive Maintenance
Founder & CEO
Shanti Subramanyam
Orzota, Inc.
1
Agenda
§Preventive	Maintenance
§Anomaly	Detection
§Definition	and	Types
§Complexities
§Algorithms
2
Preventive	Maintenance	Definition
• Preventive	Maintenance is	Maintenance	performed	
specifically	to	prevent	faults	from	occurring
• Parts	Adjustments
• Parts	Cleaning
• Parts	Replacement
• Can	be	achieved	through
• Planned	Maintenance
• Recognizing	Anomalous	Behaviors
Anomaly	Detection	Definition
Anomaly	Detection	is	the	identification	of	events	that	do	not	
conform	to	the	expected	pattern
Domain Example	Use	Case
IT	Operations Detect	heavy	load	to	keep	systems	running	smoothly
Security
Detect	network	breach attempts,	fraudulent	
transactions
Health	Care Detect	anomalies	in	heart beats
Industrial Detect	imminent	machine	and	part	failures
Anomaly	Detection	Uses	Cases
Anomaly	Types
Types	of	Anomalies
§Point	Anomalies
§Contextual	Anomalies
§Collective	Anomalies
§Local	and	Global	Anomalies
7
Point	Anomaly
If	an	individual	data	instance	can	be	considered	as	anomalous	with	
respect	to	the	rest	of	the	data,	the	instance	is	a point	anomaly
8
Contextual	Anomaly
If	an	individual	data	instance	is	anomalous	in	a	specific	context	
then	it	is	a contextual	or temporal	anomaly
9
Collective	Anomaly
If	an	collection	of	related	data	instances	is	anomalous	with	respect	
to	the	rest	of	the	data,	it	is	termed	a	collective	anomaly
10
Local	and	Global	Anomaly
11
Local	and	Global	Anomaly
If	an	anomaly	occurs	within	a	seasonal	pattern	is	termed	a	
local	anomaly
12
Anomaly	Detection:	Challenges
Anomaly	Detection	Challenges
§Concept	Drift
§ Behavior	change	- Requires	continuous	learning
14
Anomaly	Detection	Challenges
§Early	Detection	
§ Can’t	wait	for	metric	
to	go	out	of	bounds
§ Requires	detection	of	
subtle	variations
15
Anomaly	Detection	Modes
§Batch	Mode
§ Suitable	where	degradation	is	graceful	and/or	takes	time
§Real-time	/	Streaming	Mode
§ Required	for	use	cases	where	anomaly	is	very	close	to	failure	point
§ Must	learn	continuously		without	need	to	store	the	data
§ Determine	if	xt is	anomalous	before	processing	xt+1
16
Anomaly	Detection	Requirements
§Adapt	to	Concept	Drift
§Detect	Anomalies	as	early	as	possible
§Requires	little	or	no	Parameter	Tuning
§Minimizes
§False	Positives	– Can	cause	disruption	and	degradation	in	
productivity
§False	Negatives	– Will	lead	to	failures	and	expensive	repairs
17
Anomaly	Detection:	Techniques
Supervised	AD
19
Semi-supervised	AD
§ Training	Data	contains	only	“normal”	events	without	anomalies
§ Model	“learns”	what	is	“normal”	so	it	can	detect	anomalies
§ One-class	SVMs,	Auto-Encoders
§ LSTM	and	Density	Estimation	Models	- beware	the	Gaussian!
20
Unsupervised	AD
21
Source:	http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0152173#sec008
Unsupervised	Techniques
§ Outlier	Detection
§ Exponential	Smoothing,	ARIMA,	Generalized	ESD
§ Local	Anomaly	Detection
§ LOF,	COF,	INFLO,	LoOP - Nearest	Neighbor	based	algorithms
§ Global	Anomaly	Detection
§ kNNs – most	perform	well	even	on	local	anomalies	
§ Hybrid	Algorithms
§ Example:	Twitter’s	S-H-ESD		(Seasonal	Hybrid	ESD)	handles	anomalies	in	local/global	on	TS	data	that	has	both	
seasonality	and	trends
22
AD	Implementations
§ Forecast package	in	R
§ ARIMA,	Tsoutliers – outlier	detection	and	correction
§ DMwR package	in	R:	lofactor (LOF)
§ AnomalyDetection	in	R	– Twitter’s	AD
§ Anomalize package	in	R	- Scalable	version	of	Twitter’s	AD
§ RapidMiner Anomaly	Detection	Extension
§ LOF,	COF,	INFLO,	LoOP,	CBLOF,	HBOS
§ NAB	– implementations	of	several	algorithms
23
Algorithm	Evaluation
§Choose	algorithm	based	on	requirements
§Local/Global,	batch/streaming,	performance
§Benchmark,	Tune,	Rinse,	Repeat
§NAB	For	Streaming	AD	Evaluation
§Benchmark	lets	you	plug	in	different	algorithms	and	data	
24
Anomaly	Detection:	Results
Test	Data
26
Knn-CAD	
27
Numenta HTM
28
Relative	Entropy
29
Twitter	AdVec
31
Detecting	Concept	Drift
32
Detecting	Temporal	Anomalies
33
Conclusion
• Preventive	Maintenance	can	reduce	cost	of	maintenance	
significantly
• Anomaly	Detection	is	key	to	Preventive	Maintenance
• Choose	AD	technique	based	on:
• Use	Case
• Typical	Time	Series	Pattern
• Performance	Requirement

More Related Content

Similar to Anomaly Detection for Preventive Maintenance

Anomaly Detection in big data
Anomaly Detection in big dataAnomaly Detection in big data
Anomaly Detection in big dataaNumak & Company
 
An Introduction to Anomaly Detection
An Introduction to Anomaly DetectionAn Introduction to Anomaly Detection
An Introduction to Anomaly DetectionKenneth Graham
 
Data Exposure And Misconfigurations OWASP
Data Exposure And Misconfigurations OWASPData Exposure And Misconfigurations OWASP
Data Exposure And Misconfigurations OWASPsparelabs
 
Rule based expert system
Rule based expert systemRule based expert system
Rule based expert systemAbhishek Kori
 
8 Quick Tips for Penetration Testing
8 Quick Tips for Penetration Testing8 Quick Tips for Penetration Testing
8 Quick Tips for Penetration TestingCore Security
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectiveTGA Australia
 
My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?Marlon Dumas
 
Icsm2008 jiang
Icsm2008 jiangIcsm2008 jiang
Icsm2008 jiangSAIL_QU
 
Monitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafaMonitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafaLama K Banna
 

Similar to Anomaly Detection for Preventive Maintenance (15)

nishendra ppt.pptx
nishendra ppt.pptxnishendra ppt.pptx
nishendra ppt.pptx
 
Anomaly Detection in big data
Anomaly Detection in big dataAnomaly Detection in big data
Anomaly Detection in big data
 
An Introduction to Anomaly Detection
An Introduction to Anomaly DetectionAn Introduction to Anomaly Detection
An Introduction to Anomaly Detection
 
Data Exposure And Misconfigurations OWASP
Data Exposure And Misconfigurations OWASPData Exposure And Misconfigurations OWASP
Data Exposure And Misconfigurations OWASP
 
Anomaly Detection
Anomaly DetectionAnomaly Detection
Anomaly Detection
 
Rule based expert system
Rule based expert systemRule based expert system
Rule based expert system
 
8 Quick Tips for Penetration Testing
8 Quick Tips for Penetration Testing8 Quick Tips for Penetration Testing
8 Quick Tips for Penetration Testing
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspective
 
My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
 
Ch20
Ch20Ch20
Ch20
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
Icsm2008 jiang
Icsm2008 jiangIcsm2008 jiang
Icsm2008 jiang
 
Monitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafaMonitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafa
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Anomaly Detection for Preventive Maintenance