SlideShare une entreprise Scribd logo
1  sur  15
SEMANTiCS 2017, Amsterdam, The Netherlands, September 11-14, 2017
Towards a Semantic Outlier Detection
Framework in Wireless Sensor Networks
Iker Esnaola-Gonzalez, Jesús Bermúdez, Izaskun
Fernandez, Santiago Fernandez, Aitor Arnaiz
© IK4-TEKNIKER 2017
Agenda
• Introduction
• Role of Semantics in Outlier
Detection
• The SemOD Framework
• Temperature Sensor use case
• Results
• Conclusions
© IK4-TEKNIKER 2017
Introduction
• Current datasets suffer from:
• Noisy data
• Missing data
• Outliers
• …
• Consequences:
• Complicate knowledge extraction
• Low quality mining results
• Inaccurate conclusions
• Solution: Preprocessing techniques
© IK4-TEKNIKER 2017
Introduction
• Outlier Detection:
• Spotting data that stand out
among other and do not have
the expected behaviour.
• What to do with them?
• Isolate and act on them (Fraud
Detection)
• Filter them out (Data Analytics)
• …
© IK4-TEKNIKER 2017
Role of Semantics in Outlier Detection
• Underlying semantics of data can
be exploited to detect outliers
• Is a 44ºC measurement an outlier?
It depends on the context:
• Location
• Time
• Season
• …
© IK4-TEKNIKER 2017
The SemOD Framework
• The Semantic Outlier Detection
(SemOD) Framework for WSNs
• Assists the data scientist in:
• Outlier Detection
• Outlier Classification
© IK4-TEKNIKER 2017
The SemOD Framework
• 3 main components
• The EEPSA Ontology
• The SemOD Method
• The SemOD Query
© IK4-TEKNIKER 2017
The SemOD Framework
• Use case: 3 Temperature sensors
located in IK4-Tekniker building
(Eibar, Spain)
• EEPSA Ontology for Semantic
Annotation
© IK4-TEKNIKER 2017
The SemOD Framework
• Infers sensors vulnerabilities
• For each vulnerability, a
SemOD Method is proposed
• SemOD Method: guide to
identify outliers caused by that
vulnerability
© IK4-TEKNIKER 2017
• 1st step: Sensor’s sun exposure
• Determines periods when sensor
may be exposed to sun
• The EEPSA Ontology infers them
• Depends on sensor location and
orientation
Temperature Sensor use case
© IK4-TEKNIKER 2017
Temperature Sensor use case
• 2nd step: Sunshine constraint
• Determines if sensor receives
sunshine when enough sun
• Derived from nearby sensor’s
solar irradiance and illuminance
© IK4-TEKNIKER 2017
Temperature Sensor use case
• 3rd step: SemOD Query generation
• Fills SemOD Query pattern with
information of previous steps
• Classifies measurements as
outliers caused due to sensor’s
sun exposure
CONSTRUCT {?obs1 rdf:type
eepsa:OutlierCausedBySolarRadiation }
FROM <myGRAPH >
WHERE {
?sensor1 sosa:observedProperty
m3-lite:Temperature .
?sensor2 sosa:observedProperty
m3-lite:Illuminance ;
eepsa:hasUnitOfMeasure m3-lite:Lux .
?obs1 sosa:isObservedBy ?sensor1 ;
eepsa:obsTime ?time ;
eepsa:obsDate ?date .
?obs2 sosa:isObservedBy ?sensor2 ;
eepsa:obsTime ?time ;
eepsa:obsDate ?date ;
sosa:hasSimpleResult ?illu
…
© IK4-TEKNIKER 2017
Results
SENSOR T17
*Classic method: Rapidminer’s Detect Outlier (Densities) operator
© IK4-TEKNIKER 2017
Conclusions
• SemOD Framework: Assistance in
Outlier Detection and Classification
• Exploit underlying semantics of
data, not just values.
• Not exclusive and complementary
to other outlier detection methods
• Applicable to multiple domains
© IK4-TEKNIKER 2017
Thank you for your attention
Iker Esnaola-Gonzalez
iker.esnaola@tekniker.es

Contenu connexe

En vedette

Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
PavithraRShettigar
 

En vedette (16)

Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 

Similaire à Session 5.6 towards a semantic outlier detection framework in wireless sensor networks

From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
CSIRO
 

Similaire à Session 5.6 towards a semantic outlier detection framework in wireless sensor networks (20)

Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping SampleConsumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
 
COSMOS Data Analytics Architecture
COSMOS Data Analytics ArchitectureCOSMOS Data Analytics Architecture
COSMOS Data Analytics Architecture
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
 
UNIT 3.ppt
UNIT 3.pptUNIT 3.ppt
UNIT 3.ppt
 
Anomalies and events keep us on our toes
Anomalies and events keep us on our toesAnomalies and events keep us on our toes
Anomalies and events keep us on our toes
 
mems tech
mems techmems tech
mems tech
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
Micro_Electro_mechanical_system
Micro_Electro_mechanical_systemMicro_Electro_mechanical_system
Micro_Electro_mechanical_system
 
Presentation xenics
Presentation xenicsPresentation xenics
Presentation xenics
 
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
 
Introduction to Smart Sensors
Introduction to Smart SensorsIntroduction to Smart Sensors
Introduction to Smart Sensors
 
Infrared Thermography Services
Infrared Thermography ServicesInfrared Thermography Services
Infrared Thermography Services
 
Semantics and Sensors
Semantics and SensorsSemantics and Sensors
Semantics and Sensors
 
Mems for freshers
Mems for freshersMems for freshers
Mems for freshers
 
Module 3.pptx
Module 3.pptxModule 3.pptx
Module 3.pptx
 
ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
 
Scope of Electronics and Communication Engineering in Nepal
Scope of Electronics and Communication Engineering in Nepal Scope of Electronics and Communication Engineering in Nepal
Scope of Electronics and Communication Engineering in Nepal
 
EvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSSEvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSS
 
International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...
 

Plus de semanticsconference

Plus de semanticsconference (20)

Session 1.2 high-precision, context-free entity linking exploiting unambigu...
Session 1.2   high-precision, context-free entity linking exploiting unambigu...Session 1.2   high-precision, context-free entity linking exploiting unambigu...
Session 1.2 high-precision, context-free entity linking exploiting unambigu...
 
Session 4.3 semantic annotation for enhancing collaborative ideation
Session 4.3   semantic annotation for enhancing collaborative ideationSession 4.3   semantic annotation for enhancing collaborative ideation
Session 4.3 semantic annotation for enhancing collaborative ideation
 
Session 1.1 dalicc - data licenses clearance center
Session 1.1   dalicc - data licenses clearance centerSession 1.1   dalicc - data licenses clearance center
Session 1.1 dalicc - data licenses clearance center
 
Session 1.3 context information management across smart city knowledge domains
Session 1.3   context information management across smart city knowledge domainsSession 1.3   context information management across smart city knowledge domains
Session 1.3 context information management across smart city knowledge domains
 
Session 0.0 aussenac semanticsnl-pwebsem2017-v4
Session 0.0   aussenac semanticsnl-pwebsem2017-v4Session 0.0   aussenac semanticsnl-pwebsem2017-v4
Session 0.0 aussenac semanticsnl-pwebsem2017-v4
 
Session 0.0 keynote sandeep sacheti - final hi res
Session 0.0   keynote sandeep sacheti - final hi resSession 0.0   keynote sandeep sacheti - final hi res
Session 0.0 keynote sandeep sacheti - final hi res
 
Session 1.1 linked data applied: a field report from the netherlands
Session 1.1   linked data applied: a field report from the netherlandsSession 1.1   linked data applied: a field report from the netherlands
Session 1.1 linked data applied: a field report from the netherlands
 
Session 1.2 enrich your knowledge graphs: linked data integration with pool...
Session 1.2   enrich your knowledge graphs: linked data integration with pool...Session 1.2   enrich your knowledge graphs: linked data integration with pool...
Session 1.2 enrich your knowledge graphs: linked data integration with pool...
 
Session 1.4 connecting information from legislation and datasets using a ca...
Session 1.4   connecting information from legislation and datasets using a ca...Session 1.4   connecting information from legislation and datasets using a ca...
Session 1.4 connecting information from legislation and datasets using a ca...
 
Session 1.4 a distributed network of heritage information
Session 1.4   a distributed network of heritage informationSession 1.4   a distributed network of heritage information
Session 1.4 a distributed network of heritage information
 
Session 0.0 media panel - matthias priem - gtuo - semantics 2017
Session 0.0   media panel - matthias priem - gtuo - semantics 2017Session 0.0   media panel - matthias priem - gtuo - semantics 2017
Session 0.0 media panel - matthias priem - gtuo - semantics 2017
 
Session 1.3 semantic asset management in the dutch rail engineering and con...
Session 1.3   semantic asset management in the dutch rail engineering and con...Session 1.3   semantic asset management in the dutch rail engineering and con...
Session 1.3 semantic asset management in the dutch rail engineering and con...
 
Session 1.3 energy, smart homes &amp; smart grids: towards interoperability...
Session 1.3   energy, smart homes &amp; smart grids: towards interoperability...Session 1.3   energy, smart homes &amp; smart grids: towards interoperability...
Session 1.3 energy, smart homes &amp; smart grids: towards interoperability...
 
Session 1.2 improving access to digital content by semantic enrichment
Session 1.2   improving access to digital content by semantic enrichmentSession 1.2   improving access to digital content by semantic enrichment
Session 1.2 improving access to digital content by semantic enrichment
 
Session 2.3 semantics for safeguarding &amp; security – a police story
Session 2.3   semantics for safeguarding &amp; security – a police storySession 2.3   semantics for safeguarding &amp; security – a police story
Session 2.3 semantics for safeguarding &amp; security – a police story
 
Session 2.5 semantic similarity based clustering of license excerpts for im...
Session 2.5   semantic similarity based clustering of license excerpts for im...Session 2.5   semantic similarity based clustering of license excerpts for im...
Session 2.5 semantic similarity based clustering of license excerpts for im...
 
Session 4.2 unleash the triple: leveraging a corporate discovery interface....
Session 4.2   unleash the triple: leveraging a corporate discovery interface....Session 4.2   unleash the triple: leveraging a corporate discovery interface....
Session 4.2 unleash the triple: leveraging a corporate discovery interface....
 
Session 1.6 slovak public metadata governance and management based on linke...
Session 1.6   slovak public metadata governance and management based on linke...Session 1.6   slovak public metadata governance and management based on linke...
Session 1.6 slovak public metadata governance and management based on linke...
 
Session 2.2 ontology-guided job market demand analysis: a cross-sectional s...
Session 2.2   ontology-guided job market demand analysis: a cross-sectional s...Session 2.2   ontology-guided job market demand analysis: a cross-sectional s...
Session 2.2 ontology-guided job market demand analysis: a cross-sectional s...
 
Session 0.0 poster minutes madness
Session 0.0   poster minutes madnessSession 0.0   poster minutes madness
Session 0.0 poster minutes madness
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Session 5.6 towards a semantic outlier detection framework in wireless sensor networks

  • 1. SEMANTiCS 2017, Amsterdam, The Netherlands, September 11-14, 2017 Towards a Semantic Outlier Detection Framework in Wireless Sensor Networks Iker Esnaola-Gonzalez, Jesús Bermúdez, Izaskun Fernandez, Santiago Fernandez, Aitor Arnaiz
  • 2. © IK4-TEKNIKER 2017 Agenda • Introduction • Role of Semantics in Outlier Detection • The SemOD Framework • Temperature Sensor use case • Results • Conclusions
  • 3. © IK4-TEKNIKER 2017 Introduction • Current datasets suffer from: • Noisy data • Missing data • Outliers • … • Consequences: • Complicate knowledge extraction • Low quality mining results • Inaccurate conclusions • Solution: Preprocessing techniques
  • 4. © IK4-TEKNIKER 2017 Introduction • Outlier Detection: • Spotting data that stand out among other and do not have the expected behaviour. • What to do with them? • Isolate and act on them (Fraud Detection) • Filter them out (Data Analytics) • …
  • 5. © IK4-TEKNIKER 2017 Role of Semantics in Outlier Detection • Underlying semantics of data can be exploited to detect outliers • Is a 44ºC measurement an outlier? It depends on the context: • Location • Time • Season • …
  • 6. © IK4-TEKNIKER 2017 The SemOD Framework • The Semantic Outlier Detection (SemOD) Framework for WSNs • Assists the data scientist in: • Outlier Detection • Outlier Classification
  • 7. © IK4-TEKNIKER 2017 The SemOD Framework • 3 main components • The EEPSA Ontology • The SemOD Method • The SemOD Query
  • 8. © IK4-TEKNIKER 2017 The SemOD Framework • Use case: 3 Temperature sensors located in IK4-Tekniker building (Eibar, Spain) • EEPSA Ontology for Semantic Annotation
  • 9. © IK4-TEKNIKER 2017 The SemOD Framework • Infers sensors vulnerabilities • For each vulnerability, a SemOD Method is proposed • SemOD Method: guide to identify outliers caused by that vulnerability
  • 10. © IK4-TEKNIKER 2017 • 1st step: Sensor’s sun exposure • Determines periods when sensor may be exposed to sun • The EEPSA Ontology infers them • Depends on sensor location and orientation Temperature Sensor use case
  • 11. © IK4-TEKNIKER 2017 Temperature Sensor use case • 2nd step: Sunshine constraint • Determines if sensor receives sunshine when enough sun • Derived from nearby sensor’s solar irradiance and illuminance
  • 12. © IK4-TEKNIKER 2017 Temperature Sensor use case • 3rd step: SemOD Query generation • Fills SemOD Query pattern with information of previous steps • Classifies measurements as outliers caused due to sensor’s sun exposure CONSTRUCT {?obs1 rdf:type eepsa:OutlierCausedBySolarRadiation } FROM <myGRAPH > WHERE { ?sensor1 sosa:observedProperty m3-lite:Temperature . ?sensor2 sosa:observedProperty m3-lite:Illuminance ; eepsa:hasUnitOfMeasure m3-lite:Lux . ?obs1 sosa:isObservedBy ?sensor1 ; eepsa:obsTime ?time ; eepsa:obsDate ?date . ?obs2 sosa:isObservedBy ?sensor2 ; eepsa:obsTime ?time ; eepsa:obsDate ?date ; sosa:hasSimpleResult ?illu …
  • 13. © IK4-TEKNIKER 2017 Results SENSOR T17 *Classic method: Rapidminer’s Detect Outlier (Densities) operator
  • 14. © IK4-TEKNIKER 2017 Conclusions • SemOD Framework: Assistance in Outlier Detection and Classification • Exploit underlying semantics of data, not just values. • Not exclusive and complementary to other outlier detection methods • Applicable to multiple domains
  • 15. © IK4-TEKNIKER 2017 Thank you for your attention Iker Esnaola-Gonzalez iker.esnaola@tekniker.es