
Recent studies have actively employed persistent homology (PH), a topological data analysis technique, to analyze the topological information in time series data. Many successful studies have utilized graph representations of time series data for PH calculation. Given the diverse nature of time series data, it is crucial to have mechanisms that can adjust the PH calculations by incorporating domain-specific knowledge. In this context, we introduce a methodology that allows the adjustment of PH calculations by reflecting relevant domain knowledge in specific fields. We introduce the concept of featured time series, which is the pair of a time series augmented with specific features such as domain knowledge, and an influence vector that assigns a value to each feature to fine-tune the results of the PH. We then prove the stability theorem of the proposed method, which states that adjusting the influence vectors grants stability to the PH calculations. The proposed approach enables the tailored analysis of a time series based on the graph representation methodology, which makes it applicable to real-world domains. We consider two examples to verify the proposed method's advantages: anomaly detection of stock data and topological analysis of music data.
Citation: Eunwoo Heo, Jae-Hun Jung. Persistent homology of featured time series data and its applications[J]. AIMS Mathematics, 2024, 9(10): 27028-27057. doi: 10.3934/math.20241315
[1] | Stelios Arvanitis, Michalis Detsis . Mild explocivity, persistent homology and cryptocurrencies' bubbles: An empirical exercise. AIMS Mathematics, 2024, 9(1): 896-917. doi: 10.3934/math.2024045 |
[2] | Zhe Su, Yiying Tong, Guo-Wei Wei . Persistent de Rham-Hodge Laplacians in Eulerian representation for manifold topological learning. AIMS Mathematics, 2024, 9(10): 27438-27470. doi: 10.3934/math.20241333 |
[3] | Li Shen, Jian Liu, Guo-Wei Wei . Evolutionary Khovanov homology. AIMS Mathematics, 2024, 9(9): 26139-26165. doi: 10.3934/math.20241277 |
[4] | Mohamed Said Mohamed, Najwan Alsadat, Oluwafemi Samson Balogun . Continuous Tsallis and Renyi extropy with pharmaceutical market application. AIMS Mathematics, 2023, 8(10): 24176-24195. doi: 10.3934/math.20231233 |
[5] | Yunan He, Jian Liu . Multi-scale Hochschild spectral analysis on graph data. AIMS Mathematics, 2025, 10(1): 1384-1406. doi: 10.3934/math.2025064 |
[6] | Sergio Iglesias-Perez, Alberto Partida, Regino Criado . The advantages of k-visibility: A comparative analysis of several time series clustering algorithms. AIMS Mathematics, 2024, 9(12): 35551-35569. doi: 10.3934/math.20241687 |
[7] | Ana Lazcano de Rojas, Miguel A. Jaramillo-Morán, Julio E. Sandubete . EMDFormer model for time series forecasting. AIMS Mathematics, 2024, 9(4): 9419-9434. doi: 10.3934/math.2024459 |
[8] | Ana Lazcano de Rojas . Data augmentation in economic time series: Behavior and improvements in predictions. AIMS Mathematics, 2023, 8(10): 24528-24544. doi: 10.3934/math.20231251 |
[9] | J. F. Torres, M. Martinez-Ballesteros, A. Troncoso, F. Martinez-Alvarez . Advances in time series forecasting: innovative methods and applications. AIMS Mathematics, 2024, 9(9): 24163-24165. doi: 10.3934/math.20241174 |
[10] | Sunil Kumar, Amit Kumar , Zaid Odibat, Mujahed Aldhaifallah, Kottakkaran Sooppy Nisar . A comparison study of two modified analytical approach for the solution of nonlinear fractional shallow water equations in fluid flow. AIMS Mathematics, 2020, 5(4): 3035-3055. doi: 10.3934/math.2020197 |
Recent studies have actively employed persistent homology (PH), a topological data analysis technique, to analyze the topological information in time series data. Many successful studies have utilized graph representations of time series data for PH calculation. Given the diverse nature of time series data, it is crucial to have mechanisms that can adjust the PH calculations by incorporating domain-specific knowledge. In this context, we introduce a methodology that allows the adjustment of PH calculations by reflecting relevant domain knowledge in specific fields. We introduce the concept of featured time series, which is the pair of a time series augmented with specific features such as domain knowledge, and an influence vector that assigns a value to each feature to fine-tune the results of the PH. We then prove the stability theorem of the proposed method, which states that adjusting the influence vectors grants stability to the PH calculations. The proposed approach enables the tailored analysis of a time series based on the graph representation methodology, which makes it applicable to real-world domains. We consider two examples to verify the proposed method's advantages: anomaly detection of stock data and topological analysis of music data.
Data that can be represented as one-dimensional variables is called time series data; this data format is simple and widely prevalent across various fields. Time series data analysis has been a long-standing field, including anomaly detection [1,2], forecasting [3,4,5,6], classification [7,8,9,10], and clustering [11,12,13]. Despite being extensively researched, time series analysis remains a challenging problem. Recent advancements in topological data analysis (TDA) have led to a surge in research on analyzing time series data using topological information. A prominent method within TDA is persistent homology (PH), wherein the duration for which a p-dimensional homology persists is calculated as the given data undergoes sequential transformations, thereby revealing the underlying topological structure. Research analyzing time series data using PH can be broadly classified into two categories: studies utilizing delay embedding and those utilizing graph representation.
The delay embedding ϕτ for a time series T, as described by Packard et al. [14], is a function into Rm defined by ϕτ(t)=(T(t),T(t−τ),…,T(t−(d−1)τ)), where τ is the delay lag and m is the embedding dimension. This embedding method is employed to transform time series data into point clouds (PCs) in Euclidean space Rm for PH analysis. Takens' embedding theorem [15] ensures that this transformation preserves the topological information of the data sampled from hidden dynamical systems. The initial approach was used to analyze dynamical systems in [16], where the time series sampled from these systems were transformed into PCs for PH analysis. Subsequent research [17,18] expanded this foundation by affirming the effectiveness of PH in identifying the periodicity within a time series and extending its application to quasi-periodic systems. Research on the early detection of critical transitions [19] based on [20] and analysis of the stability of dynamical systems [21] was conducted using PH and delay embedding. Moreover, PH and delay embedding methodologies were adopted for clustering [22] and classification [23] of time series data. The effectiveness of PH in multivariate time series analysis for machine learning tasks such as room occupancy detection was demonstrated in [24]. The versatility of PH has been further highlighted by demonstrating its broad applicability to diverse fields, e.g., identifying wheezes in signals [25], detecting financial crises [26,27], classifying motions using motion-capture data [28], and distinguishing periodic biological signals from nonperiodic synthetic signals [29].
On the other hand, in addition to delay embedding methods, several studies have successfully used graph representation of time series data with PH. The graph representation G=(V,E) of a time series T consists of a vertex set V and an edge set E, which are derived from the data points and their relationships within T. This graph is then analyzed using PH to study the topological features of T. Notably, functional magnetic resonance imaging (fMRI) data of the brain was converted into graph data, called functional networks in [30], which was then analyzed using PH. In [31], the early signs of critical transitions in financial time series were detected by converting the series into graph data, called correlation networks, for PH analysis. In text mining, PH has been applied to graphs representing the main characters in the text time series [32]. A study proposed the construction of graphs, called music networks, for classifying Turkish makam music through PH analysis [33]. These music networks were used in [34] to analyze traditional Korean music using PH and in [35] to study composition by integrating machine learning. In addition, the time series data has been transformed into Tonnetz, proposed by Euler, for music classification through PH analysis [36]. The authors of [37] addressed the classification of music style by creating data called intervallic transition graphs from music time series and applying PH. Graph representation of time series is also crucial in recent artificial intelligence-based time series analysis utilizing graph neural networks (GNNs). The graph representation of time series data was employed for forecasting [38], anomaly detection [39], and classification [40] with GNNs.
Given the extensive and diverse nature of time series data, in addition to delay embedding, various other embedding methods such as derivative embedding [14], integral-differential embedding [41], and global principal value embedding [42] have been used. Recently, selecting appropriate embeddings from these various embeddings using PH was investigated in [43]. Similarly, choosing the appropriate graph representation for each research field is also crucial. However, further research is still needed on how to adjust and select suitable graph representations. In this context, our study makes the following contributions:
(1) We introduce a novel concept of featured time series data created by adding domain knowledge (features) to the time series data and influence vectors that assign a value to each feature. This allows the adjustment of graph representations to ensure suitability to the specific domain.
(2) We prove that adjusting the graph representations via the influence vectors provides stability to the PH calculation, thereby demonstrating the robustness of the proposed method.
The remainder of this paper is organized as follows. Section 2 describes the frequency-based graph representation and methods for calculating the PH of the graphs. We provide an example of potential information loss that can occur during the PH computation process. In Section 3, we introduce the novel concepts of featured time series data and influence vectors to analyze a time series by incorporating domain knowledge. Furthermore, we show that the examples of information loss presented in Section 2 can be addressed by adjusting the influence vectors. In Section 4, we state the theorem that asserts the stability property of the influence vectors when subjected to such adjustments. This theorem underscores the reliability and robustness of the influence vector adjustments in mitigating information loss during the graph representation process. In Section 5, we explore the effect of variations in the influence vectors on the analysis of real-world time series data based on previous research, including anomaly detection of stock data and topological analysis of music data. All codes used in this study are available at https://github.com/AI-hew-math/Feat_time_series. In Section 6, we provide a detailed proof of the main theorem introduced in Section 4. In Section 7, a brief concluding remark is provided.
In this study, we addressed the graph representation of time series data using the frequency of occurrence of observations in the time series data.
Consider a time series T:T→X, where X represents the set of all possible values that the time series data can take, and T is assumed finite. Define the vertex or node set V as
V={{T(t)}∣t∈T}. |
Enumerating T as {t1,t2,…,tn}, the edge set E is defined as
E={{T(ti),T(ti+1)}∣1≤i≤n−1,T(ti)≠T(ti+1)}. |
Let fe represent the frequency of an edge e∈E in T given by
fe=|{ti∈T∣e={T(ti),T(ti+1)}}|. |
Here, fe measures the total number of co-occurrences of the two nodes appearing side by side in T associated with the edge e. Note that when defining the frequency fe as above, we did not consider these two nodes' specific order of appearance. The frequency of the edge e increases whenever the two nodes are positioned adjacent to each other in T. Define a weight function WE on E as WE(e)=fe for any edge e∈E. This weight measures how strongly the associated nodes are connected to each other in e∈E.
To compute the PH over the graph, we define the distance between two nodes in the graph. In this study, we considered the definition of natural distance, which is given below. However, note that the distance definition is not unique but might be the best definition depending on the problem.
Definition 2.1. (Distance) Let G=(V,E,WE) be a connected weighted graph. Define the distance between v and w in V such that d(v,w)=0 if v=w; otherwise,
d(v,w)=minp{∑e∈p(WE(e))−1|p is a path in G connecting v and w}. |
Note that the distance d satisfies the metric conditions. The proof is provided in Proposition 3.1, where a more general case is presented. For d, we utilize the reciprocal of the edge weight function WE. This implies that we consider the vertices v and w connected by the edge e as closer when the frequency fe of the edge is higher. Define a distance matrix A as A=(aij), where aij=d(vi,vj) for every pair of vertices vi,vj∈V.
We now consider computing PH given a metric space (V,d). Suppose we have a metric space (V,d) from graph G=(V,E,WE). The power set P(V) of the vertex set V is an abstract simplicial complex, denoted as X. We define the Vietoris-Rips (Rips) filtration function h:X→R as
h(σ)=max{d(vi,vj)∣τ⊆σ,1-simplex τ={vi,vj}}, |
whenever p≥1 for p-simplex σ∈X. For any 0-simplex v, we define h(v)=0. Denote h−1((−∞,ϵ]) as Xϵ for ϵ∈R. Then, for ϵn≥maxσ(h(σ)) and 0=ϵ0≤ϵ1≤ϵ2≤⋯≤ϵn,
Xϵ0⊆Xϵ1⊆⋯⊆Xϵn=X |
forms the Rips filtration for an abstract simplicial complex X (see [44,45]). A simplicial complex can be associated with a sequence of abelian groups, termed chain groups. For each dimension p, the p-chains Cp(X) are the formal sums of the p-simplices. For each dimension p, there exists a boundary map ∂p:Cp(X)→Cp−1(X) that maps each p-simplex to its boundary. A crucial property is that the boundary of the boundary of the simplices is always null, that is, ∂p−1∘∂p=0. Given the chain groups and boundary maps, the pth homology group is defined as the quotient group
Hp(X)=ker(∂p)Im(∂p+1). |
This quotient captures the p-dimensional holes in a given topological space. As the filtration progresses, these homology groups also change. The PH serves as an effective tool for tracing such changes. For each dimension p and filtration value ϵi, we compute Hp(Xϵi). As ϵi changes, certain homological features (e.g., loops) may emerge or disappear. A persistence diagram [46] (PD) is a multi-set that visualizes the coordinates of these features on a plane. The x-coordinate of a point in the PD indicates the birth of such a homological feature, and the y-coordinate indicates its death. The longer the persistence of the considered feature, the greater the deviation of the corresponding point from the diagonal on the plane of the PD. Note that the computation of PH depends on the filtration choice, but Rips filtration is one of the most popular filtration methods. Open-source libraries used for computing the PH based on Rips filtration include JavaPlex [47] written in Java but easily usable in MATLAB, GUDHI [48] written in C++ but also accessible in Python, and the recently developed Ripser [49], which significantly reduces the computation time and memory usage when compared with the other methods. Rip filtration allows the computation of PH not only on point clouds but also on general abstract simplicial complexes, especially graphs. In [50], the authors demonstrated that Rips filtration could approximate the topological shapes of the data's manifolds, as discussed in [51].
Let us examine a simple example to see how PH computation for time series analysis of a specific field can result in information loss. Here, we discuss a simple case of anomaly detection in a time series. Consider a time series T consisting of 27 timestamps for temperature changes, as shown in Figure 1. We can construct a graph from T, as shown in Figure 2. In the graph, each vertex represents a temperature value, and the value associated with the edge represents the co-occurring frequency of the two adjacent temperature values in T. From the definition of the distance d, the distance matrix is obtained as shown in Figure 2. The matrix's rows and columns correspond to the temperature values associated with the vertices 21,22,23,24, and 25. For example, the element at the position of (2,3) in the matrix represents the distance between the vertices 22 and 23. The complexity of computing the distance matrix depends on the complexity of the pathfinding process O(|E|log|V|), which can be efficiently calculated using the Dijkstra algorithm [52].
We construct the Rips filtration for the distance matrix and compute the persistence barcode. The upper row of Figure 3 illustrates how the Rips complex changes in the Rips filtration as the filtration value ϵ varies. The bottom row shows the corresponding 0-dimensional persistence barcode. The corresponding persistence barcode shown in Figure 3 illustrates the occurrence of information loss during filtration. The time series T in Figure 1 undergoes abnormal temperature changes in the shaded area, where temperatures (nodes) 21 and 25 are connected twice. As shown in Figure 3, the information regarding the frequency between nodes 21 and 25 in the anomaly region and its distance 12 are not reflected in the computation of homology. The birth and death of the 0-dimensional homology occur at 0, 16, and ∞, with no occurrence at 12. Moreover, the 1-dimensional homology is not detected either. This is because the interior of the pentagon is filled in advance at 13 preceding 12. Therefore, if the change in temperature from 21 to 25 is considered an anomaly, then it must be reflected in this loss of information. For example, instead of simply increasing the frequency by 1 at each appearance of 21 and 25 in T, we can assign a larger value. This can generate 1-dimensional homology because if the distance d(21,25) becomes smaller than 13, a 1-cycle is formed before any interior edge of the pentagon is created. In addition, if the distance d(21,25) becomes less than 16, the edge {21,25} will be the first to emerge in the filtration; thus, d(21,25) becomes the death time in the 0-dimensional barcode. This is discussed in detail in Example 3.5 later. These examples underscore the critical need for domain-specific adjustments in analysis to accurately perform PH computations for time series data within particular fields.
We propose the featured time series data below to enable adjustments in the PH calculation that reflect each field's domain knowledge.
Definition 3.1. (Feature set) Let Fp denote finite sets, where p=0,1. The Cartesian product of the power set of Fp is called the feature set, denoted by F. That is, F=P(F0)×P(F1). We call Fp the pth feature set. The elements of Fp are called the pth features.
As demonstrated below, the pth feature is associated with the p-simplex in a graph in our proposed method.
Definition 3.2. (Influence vectors) Consider a nonnegative real value function g:F0∪F1∪{∅0,∅1}→R, where the symbols ∅0 and ∅1 represent the states of the given time series without any feature. This function g is called the influence vector with the size of |F0|+|F1|+2. For any element z in F0∪F1∪{∅0,∅1}, the value g(z) is referred to as the influence of z.
Definition 3.3. (Featured time series) Let T:T→X be a time series, F be a feature set, and g be an influence vector. Consider a function ˆT:T→X×F such that ˆT(t)=(T(t),Tf(t))∈X×F for t∈T, where Tf:T→F represents any function. The pair (ˆT,g) is called a featured time series of T by g. The function Tf is termed the feature component of the ˆT.
For example, let F0={r1,r2,r3} and F1={s1,s2} represent the zeroth and first feature sets, respectively. Consider a time series T:T→X such that T(ti)=xti, where T={ti∣i∈N}. The following sequence illustrates an example of ˆT:
(xt1,{r1,r3},{s1,s2}),(xt2,{r2,r3},∅1),…,(xti,Ati,Bti),…, |
where Ati⊆{r1,r2,r3} and Bti⊆{s1,s2}. For any influence vector g, (ˆT,g) is a featured time series.
Consider a featured time series (ˆT,g) as defined in Definition 3.3. A connected graph G=(V,E,WE) is constructed using T as explained in Section 2.1. The main goal of the proposed method is to generalize the weight function WE in G, yielding a more flexible and adaptive PH analysis by fully utilizing the given information in the time series. For such generalization, we use Tf and g.
Consider two time series T0f:T→P(F0) and T1f:T→P(F1) such that Tf(t)=(T0f(t),T1f(t)) for any t∈T. Write F0={r1,…,rm} and V={v1,v2,…,v|V|} as ordered sets. Define the zeroth count matrix C0=(c0ij) using F0 such that
c0ij:={|{t∈T∣vi=T(t),rj∈T0f(t)}| if j=1,…,m,|{t∈T∣vi=T(t),T0f(t)=∅0}| if j=0, |
where |⋅| denotes the cardinality of the set. The c0ij represents the total number of timestamps t∈T when the vertex vi in V and feature rj in F0 are encountered together in ˆT. The ith element of the first column of C0 represents the total number of timestamps when vi appears without any zeroth features.
Similarly, write F1={s1,…,sl} and E={e1,e2,…,e|E|} as ordered sets and define the first count matrix C1=(c1ij) using F1 such that
c1ij:={|{tk∈T∣ei={T(tk),T(tk+1)},sj∈T1f(tk)}| if j=1,…,l,|{tk∈T∣ei={T(tk),T(tk+1)},T1f(tk)=∅1}| if j=0. |
The c1ij represents the total number of timestamps t∈T when the edge ei and feature sj in F1 are encountered together in ˆT. The ith element of the first column of C1 represents the total number of the timestamps when ei appears without any first features.
Set →g0=(g(∅0),g(r1),g(r2),…,g(rm)) and →g1=(g(∅1),g(s1),g(s2),…,g(sl)) for an influence vector g. Consider two vectors C0⋅→g0 and C1⋅(→g1+→1). Here, ⋅ denotes matrix multiplication, and →1 means the vector whose elements are all 1. The use of →1 in C1⋅(→g1+→1) is to ensure that when →g1=0, the value (C1⋅→1)i aligns with the frequency fe defined in Section 2.1 for edge e in E.
Define a vertex weight function ˆWV:V→R as ˆWV(vi)=(C0⋅→g0)i for vi∈V and an edge weight function ˆWE:E→R as ˆWE(ei)=(C1⋅(→g1+→1))i for ei∈E. Write ˆWE(ei) as ˆfei. The weight ˆfe is called the weighted frequency of an edge e. It is a generalization of the frequency explained in Section 2.1. The weight ˆWV(v) is called the weighted frequency of a vertex v associated with the zeroth features, r1,r2,…,rm. When →g0=→1, the ˆWV(v) is simply the frequency of appearance of vertex v in ˆT.
We then obtain the vertex- and edge-weighted graph ˆGg=(V,E,ˆWV,ˆWE) from the featured time series (ˆT,g). These weight functions are used to define the metric space in the following section.
Suppose that we have a graph ˆGg=(V,E,ˆWV,ˆWE). Let α=mine∈E(ˆWE(e))−1. Take an increasing function ρ:R→(−1,1) into the open interval (−1,1) such that ρ(0)=0. We call ρ an activation function. Define the length function Lg:E→R of the graph ˆGg as
Lg(e)=(ˆWE(e))−1−α(ρ(ˆWV(a)+ˆWV(b))) for any edge e={a,b}∈E. |
Here, α ensures that the length Lg(e)=(ˆWE(e))−1−α(ρ(ˆWV(a)+ˆWV(b))) remains positive for any edge e. The distance ˆd of the graph ˆGg is defined below.
Definition 3.4. (Distance) Let v,w∈V be any vertices. If v=w, define ˆd(v,w)=0. Otherwise, the distance ˆd between v and w is defined as
ˆd(v,w)=min{∑e∈pLg(e)|p is a path in G from v to w}. |
The motivation for defining distance ˆd is as follows. Consider an edge e={a,b} in the graph ˆGg. As discussed in Section 2.2, we fundamentally use the reciprocal of ˆWE for the distance ˆd. The stronger the relevance between a and b, the closer they should be positioned. Compared with WE, in particular, ˆWE is a function that further assigns the sum of the influences on the features, meaning the more frequent the appearance of the first feature, which has a significant influence on the featured time series ˜T, the stronger the connection becomes. Additionally, we used the vertex weight function ˆWV for the distance ˆd. This is designed to reflect the influence of a single node a on the other nodes in the entire network. The greater the vertex weight assigned to a, the shorter the distance from a to all other nodes. For example, consider a social network G in which node a is a famous influencer in the network and node b is connected to a. Even if there is no direct interaction between nodes a and b, it is natural to consider the distance between them to be small if a's influence is strong. To achieve this, in the definition of the length function Lg, we subtract the sum of the influences of nodes a and b from ˆWE(e), resulting in ˆWE(e)−(ˆWV(a)+ˆWV(b)). However, as ˆWV and ˆWE are independent functions, they can be negative. Therefore, we ultimately define the length Lg for any edge e={a,b}∈E as
Lg(e)=(ˆWE(e))−1−α(ρ(ˆWV(a)+ˆWV(b))). |
Figure 4 presents a schematic illustration of how the graph ˆGg=(V,E,ˆWV,ˆWE) changes as we consider more general vertex weights ˆWV and edge weights ˆWE.
The distance ˆd satisfies the metric conditions, making it a more appropriate distance measure that naturally approximates the actual data space more closely than general distance measures without metric conditions.
Proposition 3.1. Let ˆd be the distance as defined in Definition 3.4. Then, ˆd is a metric.
Proof. Let v,w,z∈V be any vertices. If v=w, we have ˆd(v,w)=0 by Definition 3.4. In addition, the length function Lg is positive; therefore, ˆd(v,w)=0 implies v=w. Suppose that v≠w. For any path p from v to w, we can create a path p−1 from w to v by simply reversing the order of the vertices in p. Therefore, the distance ˆd satisfies ˆd(v,w)=ˆd(w,v). Finally, let us prove the condition of the triangle inequality. Denote the path satisfying the minimality in the definition of ˆd(v,z) as p1, and the path in ˆd(z,w) as p2. Consider a path p1∪p2, which is obtained by concatenating p1 and p2. Sum all values Lg(e) according to any edge e in path p1∪p2, then it is ˆd(v,z)+ˆd(z,w). Because p1∪p2 is a path from v to w, by the property of minimality in the definition of ˆd(v,w), we have ˆd(v,w)≤ˆd(v,z)+ˆd(z,w).
Corollary 3.1. (V,ˆd) is a metric space for graph ˆGg=(V,E,ˆWV,ˆWE).
The distance ˆd defined on ˆGg can be considered a generalization of the distance d from Definition 2.1 from the perspective of the following proposition:
Proposition 3.2. If the influence vector g is zero, then the two distances d in Definition 2.1 and ˆd in Definition 3.4 are identical on V.
Proof. Because →g0 is zero, the vertex weight function ˆWV is zero. From ρ(0)=0, we get
∑e∈pLg(e)=∑e={a,b}e∈p((ˆWE(e))−1−αρ(ˆWV(a)+ˆWV(b)))=∑e∈p(ˆWE(e))−1. |
As →g1 is zero, it follows that ˆfei=(C1⋅(→g1+→1))i=(C1⋅→1)i=fe, leading to ˆWE(e)=ˆfe=fe=WE(e). Consequently, by the definition of ˆd, we obtain
ˆd(v,w)=min{∑e∈pLg(e)|p is a path between v and w}=min{∑e∈p(WE(e))−1|p is a path between v and w}=d(v,w). |
The role of ρ is to ensure that the values of the sum of any two vertex weights exist between 0 and 1 in the ascending order. If ρ is not appropriately chosen, all the elements of ρ(ˆWV(a)+ˆWV(b)) in Definition 3.4 may become nearly identical for any edge e=(a,b). It is crucial to select ρ so that the distribution of the elements of ρ(ˆWV(a)+ˆWV(b)) facilitates effective analysis. Although the choice of the activation function can vary depending on the problem, this process can also be efficiently automated. We consider the following activation function:
ρ(z)={1−e−z2if z≥0,0if z<0. |
Let M be the maximum value of {ˆWV(vi)+ˆWV(vj)∣i≠j}, where M≥0. Define the automatic activation function ρ∗(z) as ρ∗(z)=ρ(2zM+1).
Proposition 3.3. The function ρ∗(z) is Lipschitz continuous with a constant that is independent of the influence vector g, although M depends on ˆWV.
Proof. We know that ρ is Lipschitz continuous owing to the boundness of its derivative ρ′. There exists a constant k, independent of ˆWV, such that we have |ρ′(z)|≤k for any z. We can infer that |ρ′∗(z)|=2M+1|ρ′(2zM+1)|≤2k.
In the stability theorem proved in Section 6, the independence of the Lipschitz constant of the activation function from the influence vectors g becomes crucial. Proposition 3.3 means that using the automatic activation function ρ∗ is permissible.
Consider the time series T, as shown in Figure 1. We define the zeroth feature set F0 as {L,H}, representing humidity levels including low (L) and high (H), and the first feature set F1 as {|T(t+1)−T(t)||t∈T}, representing the magnitude of the temperature changes. As shown in Figure 5, T is complemented by a tuple of features (f1,f2)∈F0×F1, providing additional information. This is denoted as ˆT.
To emphasize the sudden changes in temperature, define the influence vector g such that g(4)=5 for 4∈F1 and g(x)=0 for all other features of x. In other words, →g0 and →g1 are expressed as
![]() |
For the featured time series (ˆT,g), the vertex weight function ˆWV is zero, as →g0=→0. The edge weight function ˆWE can be obtained using the first count matrix C1 as follows:
![]() |
Figure 6a illustrates the Rips filtration for the metric space (V,ˆd), which is constructed from the graph ˆGg=(V,E,ˆWV,ˆWE). In the filtration, the edge {21,25} first appears in Xϵ when ϵ=d(21,25)=112. Unlike the example discussed in Section 2.4, by assigning an influence value of 5 to 4∈F1, we emphasize the importance of the edge {21,25}. This not only results in the formation of a point in the 1-dimensional PD, as observed in Figure 6a, but also leads to the emergence of a point in the 0-dimensional PD with a death time of d(21,25)=112. These developments are illustrated in Figures 6a and 6c, which contrast with the scenario in Figures 3 and 6b, where the latter displays a single point representing four 0-dimensional points. This example illustrates that by adjusting the influence vector g, previously unrepresented domain-specific information can now be effectively preserved in the computation of PH.
In this example, the humidity was used as the zeroth feature. Figures 6d and 6e show that the influence on the zeroth features affects the persistence (death time-birth time) of each point rather than the existence of 1-dimensional points. Although not extensively covered in this example, the zeroth feature is considered significant in the stock data, as discussed in Section 5.1. Furthermore, in Section 5.1, the area of the shaded region S in Figure 6c is used for anomaly detection on the stock data.
Feature selection is problem-dependent, and features should be properly categorized for analysis. Suppose that we have a time series T and a collection O of objects, including the various domain knowledge that we want to consider as features. To classify O into the zeroth and first features, it is important to understand that the ith features of the featured time series data determine the weights of i-simplices in graphs. The vertex set of graphs consists of single observations {T(t)}, making it sensible to associate any feature s0∈O closely related to a single observation with the zeroth feature. In addition, because the first features influence the weights of edges {T(t),T(t+1)} for some t∈T, if any feature s1∈O relates to any two observations simultaneously, it would be proper to regard it as the first feature.
In Example 3.5, humidity is considered the zeroth feature because it pertains to the information from a single observation T(t) at each timestamp t∈T. Furthermore, the magnitude of the temperature change is classified as the first feature because it is derived from two consecutive observations T(t) and T(t+1) at each timestamp t∈T.
The stability theorem for persistence diagrams is crucial for ensuring reliable topological inferences.
Lemma 4.1. (Cohen-Steiner et al. [53]) Let X be a finite abstract simplicial complex. For any two functions h1,h2:X→R, the persistence diagrams dgmp(h1) and dgmp(h2) satisfy
DB(dgmp(h1),dgmp(h2))≤||h1−h2||∞ |
for any dimension p, where DB is the bottleneck distance.
If the change in the function h:X→R is small, then the change in the PD is also tiny. We prove that the PD remains stable when adjusting the influence vector g for the featured time series (ˆT,g).
Theorem 4.1. (Stability of the proposed method) Let ˆT be a time series with augmented feature information derived from a times series T. If the activation function ρ, which defines ˆd in Definition 3.4, is Lipschitz continuous, then there exists a constant C=C(ˆT,ρ)>0 such that for any two influence vectors g and g′, the persistence diagrams dgmp(g) and dgmp(g′) satisfy
DB(dgmp(g),dgmp(g′))≤C‖g−g′‖∞ |
for any dimension p, where DB is the bottleneck distance.
The function Φ:g↦dgmp(g) is Lipschitz continuous. For the count matrices C0=(c0ij) and C1=(c1ij), define Cmax0 and Cmin1, respectively, as follows:
Cmax0:=maxv∈V∑jc0ivj and Cmin1:=mine∈E∑jc1iej. |
By the Lipschitz continuity of the activation function ρ, we can find a constant k such that
|ρ(x)−ρ(y)|≤k|x−y| for any x,y. |
The constant C of Theorem 4.1 is
C=(kCmax0+1)2Cmin1(|V|−1). |
This theorem guarantees the robustness of the proposed method. This robustness ensures that small perturbations in the influence vectors, commonly encountered in real-world scenarios, do not lead to significant changes in the resulting persistence diagrams. Consequently, the stability property underscored by this theorem provides a reliable foundation for utilizing featured time series data in various applications, particularly in conditions where data input may be uncertain or noisy.
This section aims to demonstrate the potential applications of adjusting the influence vector in PH analysis of actual time series based on the main theorem introduced in Section 4. In Sections 5.1 and 5.2, we explore the analysis of stock and music data, respectively.
However, these analyses are not the main focus of this study. Instead, we aim to demonstrate that by using our proposed method of adjusting the appropriate influence vector when employing graph representations, it is possible to achieve outcomes comparable to the previous methods for some cases. Moreover, we highlight the possibility of conducting various other analyses that were not attempted in the previous research. The first example aims to improve the time series analysis by adjusting the influence vector and determining its value suitable for analysis. For this purpose, we apply our methodology to the stock data analyzed in previous PH studies. The second example focuses on analyzing the effect of features on the time series data. For this purpose, we apply the proposed method to the music data and observe how the PH results change when the influence assigned to each feature varies.
Recent studies in finance explore a wide range of topics. As [54] examined the interconnectedness between financial assets during the COVID-19 pandemic, similar research has studied the spillover effects between assets. Moreover, predicting financial assets remains a key area of research, where [55] introduces an enhanced artificial electric field algorithm (EOAEFA) that improves higher-order neural networks (HONNs) for more accurate financial time series prediction. Additionally, research utilizing high-frequency data to analyze rapidly evolving key trends is critical, and [56] provides a bibliometric analysis of high-frequency data in cryptocurrency research, identifying key trends and major research streams from 2015 to 2022. Conversely, studying signals of global financial changes over longer periods is also significant. Recently, [57] shows that TDA can detect early warning signals of financial bubbles, focusing on Bitcoin's historical price data using the log-periodic power law singularity (LPPLS) model. In this research, our goal is to enhance the precision through our proposed method for global anomaly detection. Specifically, this section aims to enhance the precision by adjusting the influence vector g based on the stability described in Theorem 4.1, as applied to the global anomaly detection analysis performed in [26]. A previous study [26] employed four time series, specifically the Standard and Poor's 500 (S & P 500), the Dow Jones Industrial Average (DJIA), the National Association of Securities Dealers Automated Quotations (NASDAQ), and Russell 2000, and treated them as the 4-dimensional time series. In [26], the time series was transformed into a point cloud using the sliding window, and the persistence landscape [58] was computed. Calculating the Lp-norm of the persistence landscape yields a real number value for anomaly scores. Curves were created by advancing the sliding window stepwise and repeating the same process. In [26], these curves were used to detect anomalies such as the collapse of the Dotcom bubble on 03/10/2000 and the bankruptcy of Lehman Brothers on 09/15/2008.
For a given date t, define P(t) as the closing price of a stock. Consider a time series X defined as X(t)=logP(t+1)−logP(t) for each date t. Because the closing price P is already aggregated over time t, we further perform an aggregation on the price by partitioning the values of X into 30 equal intervals, denoted as I={I1,I2,…,I30}. This aggregation process enhances the robustness of our analysis, ensuring reliable results even in the presence of noisy data. We obtain an aggregated time series T:T→I defined by T(t)=Ikt such that X(t)∈Ikt for any t∈T. The zeroth feature (T0f) is chosen as the day of the week. For the first feature (T1f), we partition the set {X(t+1)−X(t)∣t∈T} into 4 intervals of equal length, denoted as {J1,J2,J3,J4}. The time series ˆT=(T,Tf) is characterized as
(1) T(t)=Ikt such that X(t)∈Ikt for each date t
(2) The zeroth feature set F0 used in Tf is {∅0,Mon,Tue,Wed,Thu,Fri}
(3) The first feature set F1 used in Tf is {∅1,J1,J2,J3,J4}.
Let ˆTi represent the time series obtained from the index Pi, where Pi represents S & P 500, DJIA, NASDAQ, and Russell 2000, for i=1,2,3,4, respectively. For each influence vector g, we obtain the featured time series (ˆTi,g). For a fixed date t, define ˆTi|wt as the function obtained by slicing ˆTi from t to t+w, where w is the window size. Let dgm1(ˆTi|wt) denote the one-dimensional PD obtained for the sliced time series ˆTi|wt.
We use the persistence landscape [58] as a tool to measure the PD, defined as follows: Let dgmp be a p-dimensional PD consisting of points (b,d) where b and d represent the birth and death times of the homological features, respectively. To begin, transform each point (bm,dm) in dgmp into a tent function, ϕm(x)=[min{x−bm,dm−x}]+, where [z]+=max{z,0} denotes the positive part of z. The persistence landscape of dgmp is defined as the sequence of functions λk, k≥1, where
λk(x)=kth largest value of {ϕm(x)}m≥1. |
If there are fewer than k functions ϕm(x) at a given point x, we set λk(x)=0.
We define the anomaly score curve (ASC) of a single time series Pi as follows: for each date t,
ASC(Pi)(t)=1Mi∞∑k=1‖λk(dgm1(ˆTi|wt))‖∞, |
where Mi is the normalization factor such that the maximum value of ASC(Pi)(t) is 1 and ‖⋅‖∞ denotes the L∞-norm. The norm of the persistence landscape in the definition of the ASC curve is related to the area of the shaded region S mentioned in Figure 6c. If dgm1 contains only one point (b,d), then we have ∑∞k=1‖λk(dgm1(⋅)‖∞=(d−b)/2=√Area(S)/2 because the area of S is given by (d−b)2/2.
The total anomaly score curve (TASC) of four time series Pi is defined as follows: for each date t,
TASC(t)=1M4∏i=1ASC(Pi)(t), |
where M is the normalization factor such that the maximum value of TASC(t) is 1. The rationale behind taking the product of the four ASC(Pi) is to ensure that the total score approaches zero if any of them are close to zero. This is a cautious approach to minimize the error in the anomaly score. In the ASC and TASC curves, values closer to 1 indicate the presence of anomalies. Note that in the computation of TASC, the anomaly scores for each sliced time series ˆTi|wt are computed independently for any t, facilitating parallel processing. This capability enables the efficient analysis of large datasets.
Experiments were conducted to identify the influence vector g that enhances the anomaly detection performance. According to the stability theorem for influence vectors introduced in Section 4, slight variations in the influence vector g cause subtle changes in the ASC and TASC. Therefore, the components of g were altered to 0, 10, and 20 to observe significant changes. Because the zeroth and first features are always present in the stock data for each date t, the influence related to ∅0 and ∅1 was set to 0. In Figure 7, the date 03/10/2000 (denoted as tDot) is marked as the starting point of the collapse of the Dotcom bubble, and the shaded areas are colored according to the window size from the starting point. Similarly, 09/15/2008 (denoted as tLeh) corresponds to the bankruptcy of Lehman Brothers. The values of →g0 represent the influence values for (∅0,Mon,Tue,Wed,Thu,Fri), whereas those of →g1 correspond to (∅1,Ji1,Ji2,Ji3,Ji4).
To identify the optimal influence vector, the experiment employed a grid search strategy with a window size of w=360 over →g0=(0,a1,0,a2,0,a3) and →g1=(0,a4,a5,a6,a7), where ai∈{0,1,2} for all i. Table 1 summarizes the detection ratios for identifying the Dotcom and Lehman crises among the 37 = 2187 possible (→g0,→g1) pairs. In the table, Dot represents the set of (→g0,→g1) pairs where the max value of the TASC curve exceeds the threshold ϵ=0.9999 within the interval [tDot,tDot+w] and is less than 0.25 in all other regions. This can be formally expressed as max(TASC∣[tDot,tDot+w])>ϵ, max(TASC∣[−∞,tDot])<0.25, and max(TASC∣[tDot+w,tDot+2w])<0.25. Similarly, Leh represents the set of (→g0,→g1) pairs where the max value of the TASC curve exceeds the threshold ϵ=0.9999 within the interval [tLeh,tLeh+w] and is less than 0.25 in all other regions except the interval [tDot,tDot+w]. This is formally expressed as max(TASC∣[tLeh,tLeh+w])>ϵ and max(TASC∣[−∞,tDot])<0.25, max(TASC∣[tDot+w,tLeh])<0.25, and max(TASC∣[tLeh+w,tLeh+2w])<0.25.
Dot | Leh | Dot ∩ Leh | Dot ∖ Leh | Leh ∖ Dot | |
Detect ratio (%) | 20.58 | 17.88 | 6.22 | 14.36 | 11.66 |
Dot: The set of (→g0,→g1) pairs detecting the collapse of the Dotcom bubble as an anomaly; Leh: The set of (→g0,→g1) pairs detecting the bankruptcy of Lehman Brothers as an anomaly, where →g0=(0,a1,0,a2,0,a3) and →g1=(0,a4,a5,a6,a7), with ai∈{0,1,2}. |
As shown in the second row of Figure 7, the TASC0 successfully detects the Lehman crisis but fails to detect the Dotcom bubble collapse. The pair (→g0,→g1)∈Dot∩Leh, where →g0=(0,20,0,0,0,0) and →g1=(0,0,10,0,20), successfully detects both the Dotcom bubble collapse and the Lehman Brothers crisis as anomalies. Figure 8 illustrates the normalized one-dimensional persistence diagrams for four stock indices at the peak anomaly day, denoted as tpeak, of TASC with →g0=(0,20,0,0,0,0) and →g1=(0,0,10,0,20) in the Dotcom collapse region. Here, the normalized one-dimensional persistence diagram refers to c⋅dgm1 with c=1/(Mi4√M), where Mi and M are normalization factors defined for ASC and TASC, respectively, ensuring the maximum values are scaled to 1. This normalization stems from the definition of TASC, which is given by:
TASC(t)=1M4∏i=1ASC(Pi)(t)=4∏i=1(1Mi4√M∞∑k=1‖λk(dgm1(ˆTi|wt))‖∞)=4∏i=1(∞∑k=1‖λk(1Mi4√Mdgm1(ˆTi|wt))‖∞). |
In Figure 8, the label 'Before' refers to the case where (→g0,→g1) are both zero vectors, while the label 'After' refers to the case where →g0=(0,20,0,0,0,0) and →g1=(0,0,10,0,20). In the before case, the one-dimensional points for the four stock indices are close to the y=x line, indicating a lower anomaly score, whereas in the after case, the points diverge further from the y=x line, suggesting a higher anomaly score.
Figure 9 shows the TASC results for various window sizes w. For window sizes w=180,210,240, and 270, the TASCs fail to detect the Dotcom bubble. With larger window sizes of 300,330, and 360, the TASCs identify the Dotcom bubble area. For window sizes of w=180,210, and 240, high anomaly scores are observed in the regions starting at 11/26/2004 and 11/14/2014. Increasing the window size to 270,300,330, and 360 results in the disappearance of high anomaly scores in these regions. This suggests that the Dotcom and Lehman crises, which have led to a sustained global economic crisis, are predominantly measured when the window size is extended.
In the experiment discussed in Section 3.5, the adjustment of the zeroth feature did not significantly influence the birth of points, as shown in Figure 6. However, the zeroth feature is crucial for anomaly detection in this section. Figure 10 illustrates the outcomes of the same experiment as in Figure 9 but with →g0 set as the zero vector. The anomaly scores in the shaded areas resemble those in Figure 9, but noisier anomalies were observed in the mid-region, as shown in Figure 10. One approach to analyze the stock volatility is to examine the prices only for a specific day of the week and analyze them weekly. This approach reduces short-term, repetitive noise and focuses more on long-term trends and patterns. In our methodology, by setting →g0=(0,20,0,0,0,0), we emphasize the information for Monday to enable a focused analysis of the effect of this particular day of the week. Similar results are observed when focusing on Tuesday, Wednesday, Thursday, and Friday. As demonstrated here, the proposed method generates various domain-specific and interpretable results by adjusting both g0 and g1.
Music data is time series data containing information beyond pitch and rhythm. Although music is a challenging form of art to quantify, the authors of [34] analyzed the hidden topological information in traditional Korean music. We analyze the Celebrated Chop Waltz as a simple example, where each note is played simultaneously with both the right and left hands. Define the pair of pitches played simultaneously using the left and right hands as a pitch pair. We define the time series T as T(tm)=(P(tm),D(tm)), where P(tm) is a pitch pair and D(tm) is the playing length of each note played at the mth timestamp tm. For instance, in the left part of Figure 11, the pitch pair (F,G) is repeated six times with an eighth note duration.
As shown in Figure 11, the Celebrated Chop Waltz contains staccato and slur musical notations. We aim to understand how the changes in the influence of these musical notations affect the results of PH calculations. Staccato is a technique in which notes are played very briefly. Slur indicates that two distinct notes should be played as if they are connected smoothly. We define staccato related to a single note as the zeroth feature and slur related to two or more notes as the first feature. The time series ˆT=(T,Tf) is characterized as
(1) T(tm)=(P(tm),D(tm)) at the timestamp tm.
(2) The zeroth feature set F0 used in Tf is {∅0, staccato}.
(3) The first feature set F1 used in Tf is {∅1, slur}.
We conducted experiments to investigate the effects of changes in influence values on the resulting PDs. Figure 12 shows the topological information about the one-dimensional PD as influence values for the staccato and slur vary. In Figure 12, the x-axis represents the cases where →g0 is (0,x), which corresponds to the influence of the staccato being x. The y-axis signifies when →g1 is (0,y), indicating the value of the slur as y. Figures 12a and 12b plot the longest and shortest persistence among all points in dgm1, respectively. Here, the persistence is defined as d−b for each point (b,d)∈dgm1(→g0,→g1). The function z=z(x,y) in Figure 12a is
z(x,y)=max{d−b|(b,d)∈dgm1(→g0,→g1)} with →g0=(0,x) and →g1=(0,y) |
and that in Figure 12b is
z(x,y)=min{d−b|(b,d)∈dgm1(→g0,→g1)} with →g0=(0,x) and →g1=(0,y). |
Figure 12c shows the total number of points in dgm1(→g0,→g1). The function z=z(x,y) in Figure 12c is defined as
z(x,y)=|dgm1(→g0,→g1)| with →g0=(0,x) and →g1=(0,y), |
where |⋅| represents the number of elements in the multi-set. Figure 12d illustrates the sum of the L∞-norm of the k-th persistence landscape λk of dgm1(→g0,→g1), which can be considered as information related to the overall total persistence. The function z=z(x,y) in Figure 12d is
z(x,y)=∞∑k=1‖λk(dgm1(→g0,→g1))‖∞ with →g0=(0,x) and →g1=(0,y). |
The continuity of the surface observed in Figure 12d is a consequence of Theorem 4.1.
From Figure 12c, we observe that when (x,y)=(0,0), the number of points in dgm1 is the highest. However, as x and y increase, the number of points gradually decreases. If x and y are sufficiently large, only the two points with longer persistence remain. The disappearing points with smaller persistence cause the discontinuities shown in Figure 12b. In Figures 12a and 12b, the variation in the shortest persistence is greater than that in the longest persistence. Therefore, the changes in Figure 12d are primarily due to the variation of the points with shorter persistence. This suggests that points with shorter persistence can provide important information about the overall topological structure of the music. The authors of [34] also considered all points representing the music's hidden structure as important, regardless of the persistence. From this perspective, when the influences of staccato and slur are zero, the highest number of hidden topological structures of the music are observed. However, when the influences of staccato and slur are sufficiently large, only two structures remain. In summary, starting with six points when (x,y)=(0,0), changes in the x and y values cause points with relatively shorter persistence to vary dramatically, with up to four disappearances. This illustrates how the overall PH outcome changes with variations in the influence of staccato and slur.
In [34], the authors analyzed the hidden topological structures in music using the cycle representatives of each point in dgm1. They introduced the overlapping percentage to quantify the topological repetitiveness in music. Assume that dgm1 contains m points [b1,d1],…,[bm,dm]. For each point [bi,di], we fix a corresponding one-dimensional cycle representative σi⊆V. Although σi is generally not unique, the authors of [34] used the JavaPlex algorithm [47] to select σi. The chosen cycle representatives σi correspond closely with the 2-simplex, which directly results in the disappearance of the 1-cycle. For a music time series T:T→X, define
Nc=|{t∈T∣T(t)∈m⋃i=1σi}| and Ns=|{t∈T∣T(t)∈⋃1≤i<j≤m(σi∩σj)}|. |
Then, the overlapping percentage is defined as (Ns/Nc)×100(. This value represents the percentage of timestamps in a time series that belongs simultaneously to multiple cycle representatives. Figure 13 shows the overlapping percentage obtained by varying the influence vector g. In Figure 13, the overlapping percentage increases for the staccato influence x when x>0 rather than x=0. This suggests that the presence of staccato adds greater topological repetitiveness than its absence; however, increasing the value does not necessarily enhance it further. Moreover, as the influence of the slur y increases, the overlapping percentage decreases. Slurs appear less frequently in scores than staccato. Emphasizing the slurs gradually decreases the overlapping percentage, reducing the topological repetitiveness.
In this section, we described the effect of adjusting the influence vector g on the overall PH outcome. This analysis allows us to examine the impact of features on the time series. As shown in this section, the proposed method yields a more flexible analysis by varying g from the music data.
This section is devoted to the proof of Theorem 4.1.
Proof. Consider any featured time series (ˆT,g). We append g to all notations if they are variables dependent on g. Consider the connected graph ˆGg=(V,E,ˆWgV,ˆWgE) and the metric space (V,ˆdg). Recall that in Section 2.3, we defined the filtration value function hg:X→R, where X=P(V). By Lemma 4.1, we have DB(dgmp(g),dgmp(g′))≤‖hg−hg′‖∞ for any two influence vectors g and g′. Therefore, it suffices to show that there exists a constant C independent of g and g′, satisfying ‖hg−hg′‖∞≤C‖g−g′‖∞.
Since X is finite, we have ‖hg−hg′‖∞=|(hg−hg′)(σ∗)| for a p-simplex σ∗∈X. By the maximality of hg and hg′, hg(σ∗)=ˆdg(vg,wg) and hg′(σ∗)=ˆdg′(vg′,wg′) for edges (vg,wg),(vg′,wg′)⊆σ∗. Consider an interpolation map q(t)=(1−t)g+tg′ for a real number t, where q(0)=g and q(1)=g′. Define a function H(t)=ˆdq(t)(vg,wg)−ˆdq(t)(vg′,wg′), where ˆdq(t) is the distance in the graph ˆGq(t), as defined in Definition 3.4. By the maximality of the functions hg and hg′, we have H(0)≥0 and H(1)≤0. Because H is continuous on the closed interval [0,1], by the intermediate value theorem, there exists a real number t0∈[0,1] such that H(t0)=0. If we denote q(t0) as g∗, we have
|(hg−hg′)(σ∗)|=|ˆdg(vg,wg)−ˆdg′(vg′,wg′)|≤|ˆdg(vg,wg)−ˆdg∗(vg,wg)|+|ˆdg∗(vg′,wg′)−ˆdg′(vg′,wg′)|=|hg−hg∗|((vg,wg))+|hg∗−hg′|((vg′,wg′)). |
If we can prove there exists a constant C such that |hg1−hg2|(e)≤C‖g1−g2‖∞ for any influence vectors g1,g2 and edge e∈E, then we have
|hg−hg∗|((vg,wg))+|hg∗−hg′|((vg′,wg′))≤C‖g−g∗‖∞+C‖g′−g∗‖∞=Ct0‖g−g′‖∞+C(1−t0)‖g−g′‖∞=C‖g−g′‖∞, |
which completes the proof. Therefore, it suffices to show that for any influence vectors g, g′ and edge e∈E, there exists a constant C such that |hg−hg′|(e)≤C‖g−g′‖∞.
Take any influence vectors g, g′ and edge e∗=(v,w)∈E. Consider an interpolation map q(t)=(1−t)g+tg′ for the real number t such that q(0)=g and q(1)=g′. For any influence vector q(t), we have ˆdq(t)(v,w)=∑e∈pq(t)Lq(t)(e) for some path pq(t) from v to w, as described in Definition 3.4. Define a function K(t)=∑e∈pgLq(t)(e)−∑e∈pg′Lq(t)(e). By the minimality of paths pg and pg′, we deduce K(0)≤0 and K(1)≥0. By the intermediate value theorem, there exists t1∈[0,1] such that K(t1)=0. If we denote q(t1) as g∗, then
|(hg−hg′)(e∗)|=|ˆdg(v,w)−ˆdg′(v,w)|=|∑e∈pgLg(e)−∑e∈pg′Lg′(e)|=|∑e∈pgLg(e)−∑e∈pgLg∗(e)+∑e∈pg′Lg∗(e)−∑e∈pg′Lg′(e)|≤∑e∈pg|Lg(e)−Lg∗(e)|+∑e∈pg′|Lg∗(e)−Lg′(e)|. | (6.1) |
Consider the first summation in inequality (6.1) as follows:
∑e∈pg|Lg(e)−Lg∗(e)|=∑e∈pg|(ˆWgE(e))−1−(ˆWg∗E(e))−1−αg(ρ(ˆWgV(a)+ˆWgV(b))+αg∗(ρ(ˆWg∗V(a)+ˆWg∗V(b))|≤∑e∈pg|(ˆWgE(e))−1−(ˆWg∗E(e))−1|+|αg(ρ(ˆWgV(a)+ˆWgV(b))−αg∗(ρ(ˆWg∗V(a)+ˆWg∗V(b))|. |
We can express (ˆWgE(e))−1=1/(∑j(g1(sj)+1)c1iej), where ie designates the position of e in the rows of the first count matrix C1=(c1ij). Observe that
∑e∈pg|(ˆWgE(e))−1−(ˆWg∗E(e))−1|=∑e∈pg|1∑j(g1(sj)+1)c1iej−1∑j(g∗1(sj)+1)c1iej|=∑e∈pg|∑jc1iej(g1(sj)−g∗1(sj))(∑j(g1(sj)+1)c1iej)(∑j(g∗1(sj)+1)c1iej)|≤∑e∈pg|∑jc1iej(g1(sj)−g∗1(sj))(∑jc1iej)(∑jc1iej)|≤∑e∈pg|(∑jc1iej)(∑jc1iej)(∑jc1iej)|‖g−g∗‖∞≤t1∑e∈pg(1(∑jc1iej))‖g−g′‖∞ by g−g∗=t1(g−g′)≤t1∑e∈pg(1(∑jc1iej))‖g−g′‖∞≤t1∑e∈pg(1Cmin1)‖g−g′‖∞ by Cmin1=mine∈E∑jc1iej≤t11Cmin1‖g−g′‖∞(|V|−1). | (6.2) |
In the last inequality (6.2), we utilize the fact that the number of edges in a path p, without repeated vertices, is precisely |Vp|−1, where |Vp| denotes the number of vertices in p. The path pg does not contain any repeated vertices owing to its minimality in the definition of the distance d.
We demonstrate that αg is bounded for any given g; recall that αg=mine∈E(ˆWgE(e))−1. Given that all elements of an influence vector are nonnegative,
∑j(g1(sj)+1)c1iej≥∑jc1iej≥mine∈E{∑jc1iej}=Cmin1 |
holds for any edge e∈E. Therefore, we can assert that αg≤1Cmin1 for any g.
Lemma 6.1. Given any pair of influence vectors g and g′, it holds true that |αg−αg′|≤1Cmin1‖g−g′‖∞.
Proof. Observe that for any edge e∈E,
|(ˆWgE(e))−1−(ˆWg′E(e))−1|=|∑jc1iej(g1−g′1)(tj)(∑j(g1(sj)+1)c1iej)(∑j(g′1(tj)+1)c1iej)|≤|(∑jc1iej)‖g−g′‖∞(∑jc1iej)(∑jc1iej)|=1(∑jc1iej)‖g−g′‖∞≤1Cmin1‖g−g′‖∞. | (6.3) |
Assume that |αg−αg′|>1Cmin1‖g−g′‖∞. Without a loss of generality, suppose αg>αg′. Because the set of edges E is finite, there exist edges e1,e2∈E such that αg=(ˆWgE(e1))−1 and αg′=(ˆWg′E(e2))−1. From the inequality 6.3, we derive that |αg′−(ˆWgE(e2))−1|≤1Cmin1‖g−g′‖∞, leading to (ˆWgE(e2))−1≤αg′+1Cmin1‖g−g′‖∞. However, by assumption, we obtain αg′+1Cmin1‖g−g′‖∞<αg. This implies (ˆWgE(e2))−1<αg, which contradicts the definition of αg as the minimum value across all edges e∈E for a given g.
For any edge e=(a,b), if we write ρ(ˆWgV(a)+ˆWgV(b)) as D(g,e), then
∑e∈pg|αg(ρ(ˆWgV(a)+ˆWgV(b))−αg∗(ρ(ˆWg∗V(a)+ˆWg∗V(b))|=∑e∈pg|αgD(g,e)−αg∗D(g∗,e)|. |
The vertex weight ˆWgV(v) can be expressed as ˆWgV(v)=∑jg0(rj)c0ivj, where iv designates the position of vertex v in the rows of the zeroth count matrix C0=(c0ij). Because ρ is Lipschitz continuous, there exists a positive constant k such that |ρ(z)−ρ(z′)|≤k|z−z′| for any two real numbers z and z′. Hence,
|D(g,e)−D(g∗,e)|=|ρ(ˆWgV(a)+ˆWgV(b))−ρ(ˆWg∗V(a)+ˆWg∗V(b))|≤k|(ˆWgV(a)+ˆWgV(b))−(ˆWg∗V(a)+ˆWg∗V(b))|=k|(∑jc0iaj(g0−g∗0)(sj)+∑jc0ibj(g0−g∗0)(sj))|≤k‖g−g∗‖∞∑j(c0iaj+c0ibj)≤2kCmax0‖g−g∗‖∞ by Cmax0=maxv∈V∑jc0ivj. |
Therefore, we have
∑e∈pg|αgD(g,e)−αg∗D(g∗,e)|=∑e∈pg|αgD(g,e)−αgD(g∗,e)+αgD(g∗,e)−αg∗D(g∗,e)|≤∑e∈pg|αg||D(g,e)−D(g∗,e)|+∑e∈pg|αg−αg∗||D(g∗,e)|≤∑e∈pg1Cmin1|D(g,e)−D(g∗,e)|+∑e∈pg|αg−αg∗|≤∑e∈pg2Cmin1kCmax0‖g−g∗‖∞+∑e∈pg1Cmin1‖g−g∗‖∞=(2kCmax0+1)‖g−g∗‖∞Cmin1∑e∈pg1≤(2kCmax0+1)‖g−g∗‖∞Cmin1(|V|−1)=t1(2kCmax0+1)‖g−g′‖∞Cmin1(|V|−1)by g−g∗=t1(g−g′). | (6.4) |
If we set a constant C:=(2kCmax0+1)1Cmin1(|V|−1), then by the inequalities (6.2) and (6.4), we have
∑e∈pg|Lg(e)−Lg∗(e)|≤∑e∈pg|(ˆWgE(e))−1−(ˆWg∗E(e))−1|+|αg(ρ(ˆWgV(a)+ˆWgV(b))−αg∗(ρ(ˆWg∗V(a)+ˆWg∗V(b))|≤t11Cmin1‖g−g′‖∞(|V|−1)+t1(2kCmax0+1)‖g−g′‖∞Cmin1(|V|−1)=t1C‖g−g′‖∞. |
Similarly, we have
∑e∈pg|Lg∗(e)−Lg′(e)|≤(1−t1)C‖g−g′‖∞. |
Therefore, by the inequality (6.1), we conclude
|(hg−hg′)(e∗)|≤t1C‖g−g′‖∞+(1−t1)C‖g−g′‖∞=C‖g−g′‖∞, |
which completes the proof.
In this paper, we introduced a novel concept of the featured time series data and proposed a method based on persistent homology with varying influence vectors. With the featured time series and influence vectors, the proposed method allows customizing PH calculations to reflect domain-specific knowledge effectively. Our approach enhances the adaptability of domain-specific PH analysis across different types of time series data and ensures the stability of the PH calculations. The application of our methodology to real-world datasets, such as stock data for anomaly detection and musical data for feature impact analysis, has shown promising results. These applications demonstrate the practical feasibility and effectiveness of our proposed method. However, there remain limitations within applications that necessitate further improvements. The selection of an optimal influence vector depends on a grid search method, as a specialized algorithm for determining the optimal influence vector has not yet been developed. Additionally, the computational complexity of persistent homology calculations presents significant challenges for real-time analysis. Future research will focus on extending this framework to other applications and exploring the optimization method of the influence vectors that can further refine the accuracy and applicability of PH under various settings.
The first author conceived the proposed idea and conducted analytical and numerical calculations. The second author supervised the project. The first and second authors contributed to the final version of the manuscript.
This work was supported by NRF of Korea under the grant number 2021R1A2C3009648 and POSTECH Basic Science Research Institute under the NRF grant number NRF2021R1A6A1A1004294412. The work is also supported partially by NRF grant by the Korea government (MSIT) (RS-2023-00219980).
The authors declare that they have no conflicts of interest.
[1] | M. Braei, S. Wagner, Anomaly detection in univariate time-series: A survey on the state-of-the-art, 2020. https://doi.org/10.48550/arXiv.2004.00433 |
[2] |
A. Blázquez-García, A. Conde, U. Mori, J. A Lozano, A review on outlier/anomaly detection in time series data, ACM Comput. Surv., 54 (2021), 1–33. https://doi.org/10.1145/3444690 doi: 10.1145/3444690
![]() |
[3] |
B. Lim, S. Zohren, Time-series forecasting with deep learning: a survey, Philos. T. R. Soc. A, 379 (2021), 20200209. https://doi.org/10.1098/rsta.2020.0209 doi: 10.1098/rsta.2020.0209
![]() |
[4] |
O. B. Sezer, M. U. Gudelek, A. M. Ozbayoglu, Financial time series forecasting with deep learning: A systematic literature review: 2005–2019, Appl. soft comput., 90 (2020), 106181. https://doi.org/10.1016/j.asoc.2020.106181 doi: 10.1016/j.asoc.2020.106181
![]() |
[5] |
J. F. Torres, D. Hadjout, A. Sebaa, F. Martínez-Álvarez, A. Troncoso, Deep learning for time series forecasting: a survey, Big Data, 9 (2021), 3–21. https://doi.org/10.1089/big.2020.0159 doi: 10.1089/big.2020.0159
![]() |
[6] |
P. Lara-Benítez, M. Carranza-García, J. C. Riquelme, An experimental review on deep learning architectures for time series forecasting, Int. J. Neural Syst., 31 (2021), 2130001. https://doi.org/10.1142/S0129065721300011 doi: 10.1142/S0129065721300011
![]() |
[7] |
A. Bagnall, J. Lines, A. Bostrom, J. Large, E. Keogh, The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances, Data Min. Knowl. Disc., 31 (2017), 606–660. https://doi.org/10.1007/s10618-016-0483-9 doi: 10.1007/s10618-016-0483-9
![]() |
[8] |
G. A. Susto, A. Cenedese, M. Terzi, Time-series classification methods: Review and applications to power systems data, Big Data Appl. Power Syst., 2018 (2018), 179–220. https://doi.org/10.1016/B978-0-12-811968-6.00009-7 doi: 10.1016/B978-0-12-811968-6.00009-7
![]() |
[9] |
H. Ismail Fawaz, G. Forestier, J. Weber, L. Idoumghar, P. A. Muller, Deep learning for time series classification: a review, Data Min. Knowl. Disc., 33 (2019), 917–963. https://doi.org/10.1007/s10618-019-00619-1 doi: 10.1007/s10618-019-00619-1
![]() |
[10] |
A. Abanda, U. Mori, J. A Lozano, A review on distance based time series classification, Data Min. Knowl. Dis., 33 (2019), 378–412. https://doi.org/10.1007/s10618-018-0596-4 doi: 10.1007/s10618-018-0596-4
![]() |
[11] |
S. Aghabozorgi, A. S. Shirkhorshidi, T. Y. Wah, Time-series clustering-a decade review, Inform. syst., 53 (2015), 16–38. https://doi.org/10.1016/j.is.2015.04.007 doi: 10.1016/j.is.2015.04.007
![]() |
[12] | E. A. Maharaj, P. D'Urso, J. Caiado, Time series clustering and classification, Chapman and Hall/CRC, 2019. https://doi.org/10.1201/9780429058264 |
[13] |
M. Ali, A. Alqahtani, M. W. Jones, X. Xie, Clustering and classification for time series data in visual analytics: A survey, IEEE Access, 7 (2019), 181314–181338. https://doi.org/10.1109/ACCESS.2019.2958551 doi: 10.1109/ACCESS.2019.2958551
![]() |
[14] | N. H. Packard, J. P. Crutchfield, J. D. Farmer, R. S. Shaw, Geometry from a time series, Phys. Rev. Lett., 45 (1980), 712. https://doi.org/10.1103/PhysRevLett.45.712 |
[15] | F. Takens, Detecting strange attractors in turbulence, In: Dynamical Systems and Turbulence, Warwick 1980, Berlin: Springer, 1981. https://doi.org/10.1007/BFb0091924 |
[16] | P. Skraba, V. De Silva, M. Vejdemo-Johansson, Topological analysis of recurrent systems, In: NIPS 2012 Workshop on Algebraic Topology and Machine Learning, 2012, 1–5. |
[17] |
J. A. Perea, J. Harer, Sliding windows and persistence: An application of topological methods to signal analysis, Found. Comput. Math., 15 (2015), 799–838. https://doi.org/10.1007/s10208-014-9206-z doi: 10.1007/s10208-014-9206-z
![]() |
[18] | J. A. Perea, Persistent homology of toroidal sliding window embeddings, In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016, 6435–6439. https://doi.org/10.1109/ICASSP.2016.7472916 |
[19] | J. Berwald, M. Gidea, Critical transitions in a model of a genetic regulatory system, 2013. https://doi.org/10.48550/arXiv.1309.7919 |
[20] |
M. Scheffer, J. Bascompte, W. A. Brock, V. Brovkin, S. R. Carpenter, V. Dakos, et al., Early-warning signals for critical transitions, Nature, 461 (2009), 53–59. https://doi.org/10.1038/nature08227 doi: 10.1038/nature08227
![]() |
[21] | F. A. Khasawneh, E. Munch, Stability determination in turning using persistent homology and time series analysis, In: Proceedings of the ASME 2014 International Mechanical Engineering Congress and Exposition, 2014, 14–20. https://doi.org/10.1115/IMECE2014-40221 |
[22] |
C. M. M. Pereira, R. F. de Mello, Persistent homology for time series and spatial data clustering, Expert Syst. Appl., 42 (2015), 6026–6038. https://doi.org/10.1016/j.eswa.2015.04.010 doi: 10.1016/j.eswa.2015.04.010
![]() |
[23] |
Q. H. Tran, Y. Hasegawa, Topological time-series analysis with delay-variant embedding, Phys. Rev. E, 99 (2019), 032209. https://doi.org/10.1103/PhysRevE.99.032209 doi: 10.1103/PhysRevE.99.032209
![]() |
[24] |
C. Wu, C. A. Hargreaves, Topological machine learning for multivariate time series, J. Exp. Theor. Artif. In., 34 (2022), 311–326. https://doi.org/10.1080/0952813X.2021.1871971 doi: 10.1080/0952813X.2021.1871971
![]() |
[25] |
S. Emrani, T. Gentimis, H. Krim, Persistent homology of delay embeddings and its application to wheeze detection, IEEE Signal Proc. Let., 21 (2014), 459–463. https://doi.org/10.1109/LSP.2014.2305700 doi: 10.1109/LSP.2014.2305700
![]() |
[26] |
M. Gidea, Y. Katz, Topological data analysis of financial time series: Landscapes of crashes, Physica A, 491 (2018), 820–834. https://doi.org/10.1016/j.physa.2017.09.028 doi: 10.1016/j.physa.2017.09.028
![]() |
[27] |
M. S. Ismail, M. S. Md Noorani, M. Ismail, F. A. Razak, M. A. Alias, Early warning signals of financial crises using persistent homology, Physica A, 586 (2022), 126459. https://doi.org/10.1016/j.physa.2021.126459 doi: 10.1016/j.physa.2021.126459
![]() |
[28] | V. Venkataraman, K. N. Ramamurthy, P. Turaga, Persistent homology of attractors for action recognition, In: 2016 IEEE international conference on image processing (ICIP), 2016, 4150–4154.. https://doi.org/10.1109/ICIP.2016.7533141 |
[29] |
J. A Perea, A. Deckard, S. B. Haase, J. Harer, Sw1pers: Sliding windows and 1-persistence scoring; discovering periodicity in gene expression time series data, BMC Bioinformatics, 16 (2015), 257. https://doi.org/10.1186/s12859-015-0645-6 doi: 10.1186/s12859-015-0645-6
![]() |
[30] |
B. J. Stolz, H. A. Harrington, M. A. Porter, Persistent homology of time-dependent functional networks constructed from coupled time series, Chaos, 27 (2017), 047410. https://doi.org/10.1063/1.4978997 doi: 10.1063/1.4978997
![]() |
[31] | M. Gidea, Topological data analysis of critical transitions in financial networks, In: 3rd International Winter School and Conference on Network Science, 2017, 47–59. https://doi.org/10.1007/978-3-319-55471-6_5 |
[32] |
S. Gholizadeh, A. Seyeditabari, W. Zadrozny, Topological signature of 19th century novelists: Persistent homology in text mining, Big Data Cogn. Comput., 2 (2018), 33. https://doi.org/10.3390/bdcc2040033 doi: 10.3390/bdcc2040033
![]() |
[33] |
M. E. Aktas, E. Akbas, J. Papayik, Y. Kovankaya, Classification of turkish makam music: a topological approach, J. Math. Music, 13 (2019), 135–149. https://doi.org/10.1080/17459737.2019.1622810 doi: 10.1080/17459737.2019.1622810
![]() |
[34] |
M. L. Tran, C. Park, J. H. Jung, Topological data analysis of korean music in jeongganbo: a cycle structure, J. Math. Music, 17 (2023), 403–432. https://doi.org/10.1080/17459737.2022.2164626 doi: 10.1080/17459737.2022.2164626
![]() |
[35] |
M. L. Tran, D. Lee, J. H. Jung, Machine composition of korean music via topological data analysis and artificial neural network, J. Math. Music, 18 (2024), 20–41. https://doi.org/10.1080/17459737.2023.2197905 doi: 10.1080/17459737.2023.2197905
![]() |
[36] |
M. G Bergomi, A. Baratè, Homological persistence in time series: an application to music classification., J. Math. Music, 14 (2020), 204–221. https://doi.org/10.1080/17459737.2020.1786745 doi: 10.1080/17459737.2020.1786745
![]() |
[37] |
M. Mijangos, A. Bravetti, P. Padilla-Longoria, Musical stylistic analysis: a study of intervallic transition graphs via persistent homology, J. Math. Music, 18 (2024), 89–108. https://doi.org/10.1080/17459737.2023.2232811 doi: 10.1080/17459737.2023.2232811
![]() |
[38] | D. Cao, Y. Wang, J. Duan, C. Zhang, X. Zhu, C. Huang, et al., Spectral temporal graph neural network for multivariate time-series forecasting, Adv. Neural Inform. Proc. Syst., 33 (2020), 17766–17778. |
[39] | A. Deng, B. Hooi, Graph neural network-based anomaly detection in multivariate time series, In: Proceedings of the AAAI conference on artificial intelligence, 2021, 4027–4035. https://doi.org/10.1609/aaai.v35i5.16523 |
[40] | D. Zha, K. Lai, K. Zhou, X. Hu, Towards similarity-aware time-series classification, In: Proceedings of the 2022 SIAM International Conference on Data Mining (SDM), 2022,199–207. https://doi.org/10.1137/1.9781611977172.23 |
[41] |
R. Gilmore, Topological analysis of chaotic dynamical systems, Rev. Mod. Phys., 70 (1998), 1455. https://doi.org/10.1103/RevModPhys.70.1455 doi: 10.1103/RevModPhys.70.1455
![]() |
[42] |
D. S. Broomhead, G. P. King, Extracting qualitative dynamics from experimental data, Physica D, 20 (1986), 217–236. https://doi.org/10.1016/0167-2789(86)90031-X doi: 10.1016/0167-2789(86)90031-X
![]() |
[43] |
E. Tan, S. Algar, D. Corrêa, M. Small, T. Stemler, D. Walker, Selecting embedding delays: An overview of embedding techniques and a new method using persistent homology, Chaos, 33 (2023), 032101. https://doi.org/10.1063/5.0137223 doi: 10.1063/5.0137223
![]() |
[44] |
L. Vietoris, Über den höheren zusammenhang kompakter räume und eine klasse von zusammenhangstreuen abbildungen, Math. Ann., 97 (1927), 454–472. https://doi.org/10.1007/BF01447877 doi: 10.1007/BF01447877
![]() |
[45] | M. Gromov, Hyperbolic groups, In: Essays in group theory, 1987. https://doi.org/10.1007/978-1-4613-9586-7_3 |
[46] | Edelsbrunner, Letscher, Zomorodian, Topological persistence, simplification, Discrete Comput. Geom., 28 (2002), 511–533. https://doi.org/10.1007/s00454-002-2885-2 |
[47] | H. Adams, A. Tausz, M. Vejdemo-Johansson, Javaplex: A research software package for persistent (co) homology, In: Mathematical Software-ICMS 2014, 2014,129–136. https://doi.org/10.1007/978-3-662-44199-2_23 |
[48] | C. Maria, J. Boissonnat, M. Glisse, M. Yvinec, The gudhi library: Simplicial complexes and persistent homology, In: Mathematical Software-ICMS 2014, 2014,167–174. https://doi.org/10.1007/978-3-662-44199-2_28 |
[49] |
U. Bauer, Ripser: efficient computation of vietoris-rips persistence barcodes, J. Appl. Comput. Topology, 5 (2021), 391–423. https://doi.org/10.1007/s41468-021-00071-5 doi: 10.1007/s41468-021-00071-5
![]() |
[50] | D. Attali, A. Lieutier, D. Salinas, Vietoris-rips complexes also provide topologically correct reconstructions of sampled shapes, In: Proceedings of the twenty-seventh annual symposium on Computational geometry, 2011,491–500. https://doi.org/10.1145/1998196.1998276 |
[51] | T. K. Dey, Y. Wang, Computational topology for data analysis, Cambridge University Press, 2022. https://doi.org/10.1017/9781009099950 |
[52] | E. W. Dijkstra, A note on two problems in connexion with graphs, Numer. Math., 1 (1959), 269–271. |
[53] | D. Cohen-Steiner, H. Edelsbrunner, J. Harer, Stability of persistence diagrams, In: Proceedings of the twenty-first annual symposium on Computational geometry, 2005,263–271. https://doi.org/10.1145/1064092.1064133 |
[54] |
M. M. Ghazani, A. A. M. Malekshah, R. Khosravi, Analyzing time–frequency connectedness between cryptocurrencies, stock indices, and benchmark crude oils during the covid-19 pandemic, Financ. Innova., 10 (2024), 119. https://doi.org/10.1186/s40854-024-00645-z doi: 10.1186/s40854-024-00645-z
![]() |
[55] |
S. C. Nayak, S. Dehuri, S. B. Cho, Elitist-opposition-based artificial electric field algorithm for higher-order neural network optimization and financial time series forecasting, Financ. Innov., 10 (2024), 5. https://doi.org/10.1186/s40854-023-00534-x doi: 10.1186/s40854-023-00534-x
![]() |
[56] |
M. Anas, S. J. H. Shahzad, L. Yarovaya, The use of high-frequency data in cryptocurrency research: A meta-review of literature with bibliometric analysis, Financ. Innov., 10 (2024), 90. https://doi.org/10.1186/s40854-023-00595-y doi: 10.1186/s40854-023-00595-y
![]() |
[57] | S. W. Akingbade, M. Gidea, M. Manzi, V. Nateghi, Why topological data analysis detects financial bubbles? Commun. Nonlinear Sci., 128 (2024), 107665. https://doi.org/10.1016/j.cnsns.2023.107665 |
[58] | P. Bubenik, Statistical topological data analysis using persistence landscapes, J. Mach. Learn. Res., 16 (2015), 77–102. |
Dot | Leh | Dot ∩ Leh | Dot ∖ Leh | Leh ∖ Dot | |
Detect ratio (%) | 20.58 | 17.88 | 6.22 | 14.36 | 11.66 |
Dot: The set of (→g0,→g1) pairs detecting the collapse of the Dotcom bubble as an anomaly; Leh: The set of (→g0,→g1) pairs detecting the bankruptcy of Lehman Brothers as an anomaly, where →g0=(0,a1,0,a2,0,a3) and →g1=(0,a4,a5,a6,a7), with ai∈{0,1,2}. |
Dot | Leh | Dot ∩ Leh | Dot ∖ Leh | Leh ∖ Dot | |
Detect ratio (%) | 20.58 | 17.88 | 6.22 | 14.36 | 11.66 |
Dot: The set of (→g0,→g1) pairs detecting the collapse of the Dotcom bubble as an anomaly; Leh: The set of (→g0,→g1) pairs detecting the bankruptcy of Lehman Brothers as an anomaly, where →g0=(0,a1,0,a2,0,a3) and →g1=(0,a4,a5,a6,a7), with ai∈{0,1,2}. |