期刊文献+

Hybrid Approach to Document Anomaly Detection:An Application to Facilitate RPA in Title Insurance

原文传递
导出
摘要 Anomaly detection(AD)is an important aspect of various domains and title insurance(TI)is no exception.Robotic process automation(RPA)is taking over manual tasks in TI business processes,but it has its limitations without the support of artificial intelligence(AI)and machine learning(ML).With increasing data dimensionality and in composite population scenarios,the complexity of detecting anomalies increases and AD in automated document management systems(ADMS)is the least explored domain.Deep learning,being the fastest maturing technology can be combined along with traditional anomaly detectors to facilitate and improve the RPAs in TI.We present a hybrid model for AD,using autoencoders(AE)and a one-class support vector machine(OSVM).In the present study,OSVM receives input features representing real-time documents from the TI business,orchestrated and with dimensions reduced by AE.The results obtained from multiple experiments are comparable with traditional methods and within a business acceptable range,regarding accuracy and performance.
出处 《International Journal of Automation and computing》 EI CSCD 2021年第1期55-72,共18页 国际自动化与计算杂志(英文版)
  • 相关文献

参考文献2

二级参考文献11

  • 1I.F. Akyildiz,W. Su,Y. Sankarasubramaniam,E. Cayirci.Wireless sensor networks: a survey[J]. Computer Networks . 2002 (4)
  • 2Y. Zhang,N.A.S. Hamm,N. Meratnia,A. Stein,M. van de Voort,P.J.M. Havinga.Statistics-based outlier detection for wireless sensor networks[J]. International Journal of Geographical Information Science . 2012 (8)
  • 3Fei Tony Liu,Kai Ming Ting,Zhi-Hua Zhou.Isolation-Based Anomaly Detection[J]. ACM Transactions on Knowledge Discovery from Data (TKDD) . 2012 (1)
  • 4Miao Xie,Song Han,Biming Tian,Sazia Parvin.Anomaly detection in wireless sensor networks: A survey[J]. Journal of Network and Computer Applications . 2011 (4)
  • 5Jen-Yan Huang,I-En Liao,Yu-Fang Chung,Kuen-Tzung Chen.Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining[J]. Information Sciences . 2011
  • 6Varun Chandola,Arindam Banerjee,Vipin Kumar.Anomaly detection[J]. ACM Computing Surveys (CSUR) . 2009 (3)
  • 7Victoria J. Hodge,Jim Austin.A Survey of Outlier Detection Methodologies[J]. Artificial Intelligence Review . 2004 (2)
  • 8Markus M. Breunig,Hans-Peter Kriegel,Raymond T. Ng,J?rg Sander.LOF[J]. ACM SIGMOD Record . 2000 (2)
  • 9Li-Jie Zhao 1,2 Tian-You Chai 2 De-Cheng Yuan 1 1 College of Information Engineering,Shenyang University of Chemical Technology,Shenyang 110042,China 2 State Key Laboratory of Synthetical Automation for Process Industries,Northeastern University,Shenyang 110189,China.Selective Ensemble Extreme Learning Machine Modeling of Effluent Quality in Wastewater Treatment Plants[J].International Journal of Automation and computing,2012,9(6):627-633. 被引量:8
  • 10Wei-Guo Yi,Jing Duan,Ming-Yu Lu.Double-layer Bayesian Classifier Ensembles Based on Frequent Itemsets[J].International Journal of Automation and computing,2012,9(2):215-220. 被引量:3

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部