{"id":"https://openalex.org/W3004709556","doi":"https://doi.org/10.3906/elk-1906-55","title":"Sensor anomaly detection in the industrial internet of things based on edge computing","display_name":"Sensor anomaly detection in the industrial internet of things based on edge computing","publication_year":2019,"publication_date":"2019-08-26","ids":{"openalex":"https://openalex.org/W3004709556","doi":"https://doi.org/10.3906/elk-1906-55","mag":"3004709556"},"language":"en","primary_location":{"id":"doi:10.3906/elk-1906-55","is_oa":false,"landing_page_url":"https://doi.org/10.3906/elk-1906-55","pdf_url":null,"source":{"id":"https://openalex.org/S32837994","display_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES","issn_l":"1300-0632","issn":["1300-0632","1303-6203"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318422","host_organization_name":"Scientific and Technological Research Council of Turkey (TUBITAK)","host_organization_lineage":["https://openalex.org/P4310318422"],"host_organization_lineage_names":["Scientific and Technological Research Council of Turkey (TUBITAK)"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING &amp; COMPUTER SCIENCES","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003880843","display_name":"Dequan Kong","orcid":"https://orcid.org/0000-0001-9994-3946"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dequan KONG","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100627727","display_name":"Desheng Liu","orcid":"https://orcid.org/0000-0002-8340-0100"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Desheng LIU","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433899","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0002-2078-4215"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei ZHANG","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107936194","display_name":"Lili He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lili HE","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048192527","display_name":"Qingwu Shi","orcid":"https://orcid.org/0009-0004-4491-4995"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qingwu SHI","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5052953923","display_name":"Xiaojun Ma","orcid":"https://orcid.org/0000-0001-6757-3055"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaojun MA","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003880843"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76278932,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"28","issue":"1","first_page":"331","last_page":"346"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.930899977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7973835468292236},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7289478778839111},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7048546075820923},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5804930329322815},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.563889741897583},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5410934090614319},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5131867527961731},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5021572113037109},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46797090768814087},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4328128695487976},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4189074635505676},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3495611548423767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17107373476028442}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7973835468292236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7289478778839111},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7048546075820923},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5804930329322815},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.563889741897583},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5410934090614319},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5131867527961731},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5021572113037109},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46797090768814087},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4328128695487976},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4189074635505676},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3495611548423767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17107373476028442},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3906/elk-1906-55","is_oa":false,"landing_page_url":"https://doi.org/10.3906/elk-1906-55","pdf_url":null,"source":{"id":"https://openalex.org/S32837994","display_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES","issn_l":"1300-0632","issn":["1300-0632","1303-6203"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318422","host_organization_name":"Scientific and Technological Research Council of Turkey (TUBITAK)","host_organization_lineage":["https://openalex.org/P4310318422"],"host_organization_lineage_names":["Scientific and Technological Research Council of Turkey (TUBITAK)"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TURKISH JOURNAL OF ELECTRICAL ENGINEERING &amp; COMPUTER SCIENCES","raw_type":"journal-article"},{"id":"pmh:oai:dergipark.org.tr:article/725178","is_oa":false,"landing_page_url":"https://dergipark.org.tr/tr/pub/tbtkelektrik/issue/53852/725178","pdf_url":null,"source":{"id":"https://openalex.org/S4306401840","display_name":"DergiPark (Istanbul University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67581229","host_organization_name":"Istanbul University","host_organization_lineage":["https://openalex.org/I67581229"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"\\n                                                                    Volume: 28, Issue: 1\\n                                                                                                    331-346\\n                                                                \\n                            ","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2804364458","https://openalex.org/W4298130764","https://openalex.org/W2132641928","https://openalex.org/W2979760315","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W2942586735","https://openalex.org/W2184115898"],"abstract_inverted_index":{"In":[0,110],"the":[1,19,23,29,33,37,44,75,84,108,127,130,139,141,152,172,178,182,186,194,204],"industrial":[2,165],"internet":[3],"of":[4,9,11,32,43,52,78,87,129,133,138,145,154,177,206],"things":[5],"(IIoT),":[6],"because":[7],"thousands":[8],"pieces":[10],"hardware,":[12],"instruments,":[13],"and":[14,40,82,98,157,175,193,199],"various":[15],"controllers":[16],"are":[17,59,160,191,201],"involved,":[18],"core":[20],"problem":[21,128],"is":[22,28,122,148,210],"sensors.":[24],"Detection":[25],"using":[26,181],"sensors":[27],"bottom":[30],"line":[31],"IIoT,":[34,140],"directly":[35,94],"affecting":[36],"detection":[38,116,197],"accuracy":[39],"control":[41,220],"indicators":[42],"IIoT":[45,57],"system.":[46,221],"However,":[47],"when":[48],"a":[49,113,213,218],"large":[50,131],"number":[51],"real-time":[53,173],"data":[54,66,90,102,134,146,189],"generated":[55],"by":[56],"devices":[58],"transferred":[60],"to":[61,96,150,163,170],"cloud":[62,79,88],"computing":[63,70,76,80,85,89],"centers,":[64],"large-scale":[65],"will":[67,73],"inevitably":[68],"bring":[69],"load,":[71],"which":[72],"affect":[74],"speed":[77],"centers":[81],"increase":[83],"load":[86],"centers.":[91],"These":[92],"factors":[93],"lead":[95],"instability":[97],"delay":[99],"in":[100,104,107,135],"sensor":[101,114,155,196],"collected":[103],"real":[105],"time":[106],"IIoT.":[109],"this":[111],"paper,":[112],"outlier":[115],"algorithm":[117],"based":[118],"on":[119,126],"edge":[120,142],"calculation":[121],"proposed.":[123],"Firstly,":[124],"focusing":[125],"amount":[132],"terminal":[136],"equipment":[137],"technology":[143],"method":[144],"compression":[147,153],"used":[149],"optimize":[151],"data,":[156],"different":[158,164],"thresholds":[159],"set":[161],"according":[162],"process":[166],"requirements,":[167],"so":[168],"as":[169],"ensure":[171],"aspect":[174],"authenticity":[176],"data.":[179],"Then,":[180],"K-means":[183],"clustering":[184],"algorithm,":[185],"compressed":[187],"test":[188],"sets":[190],"analyzed":[192],"abnormal":[195],"values":[198],"labels":[200],"obtained.":[202],"Finally,":[203],"effectiveness":[205],"such":[207],"an":[208],"approach":[209],"evaluated":[211],"through":[212],"sample":[214],"case":[215],"study":[216],"involving":[217],"temperature":[219]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
