Signature Methods for Time Series Analysis
Main Article Content
Abstract
Signature methods are a powerful tool for time series analysis, transforming them into a form suitable for machine learning tasks. The article examines the fundamental concepts of path signatures, their properties, and geometric interpretation, as well as computational methods for various types of time series. Examples of signature method applications in different fields, including finance, medicine, and education, are presented, highlighting their advantages over traditional approaches. Special attention is given to synthetic data generation based on signatures, which is particularly relevant when working with limited datasets. The experimental results on generating and predicting student digital learning trajectories demonstrate the effectiveness of signature methods for machine learning applications in time series analysis and forecasting.
Article Details
References
2. Chen K.-T. Integration of paths – a faithful representation of paths by non-commutative formal power series // Transactions of the American Mathematical Socie-ty. 1958. Vol. 89. P. 395–407. https://doi.org/10.1090/S0002-9947-1958-0106258-0
3. Lyons T. J. Differential equations driven by rough signals // Revista Ma-tematica Iberoamericana. 1998. Vol. 14. No. 2. P. 215–310. https://doi.org/10.4171/RMI/240
4. Lyons T. J., Caruana M., Levy T. Differential equations driven by rough paths // Lecture Notes in Mathematics. 2007. № 1908. https://doi.org/10.1007/978-3-540-71285-5
5. Friz P. K., Hairer M. A course on rough paths. With an introduction to regu-larity structures (2nd edition) // Springer. 2020. https://doi.org/10.1007/978-3-030-41556-3
6. Boedihardjo H., Geng X., Lyons T., Yang D. The signature of a rough path: Uniqueness. 2014. https://arxiv.org/abs/1406.7871
7. Hambly B., Lyons T. Uniqueness for the signature of a path of bounded var-iation and the reduced path group // Annals of Mathematics. 2010. Vol. 171. No. 1. P. 109–167. https://doi.org/10.4007/annals.2010.171.109
8. Graham B. Sparse arrays of signatures for online character recognition. 2013. https://arxiv.org/abs/1308.0371
9. Morrill J., Kormilitzin A., Nevado-Holgado A., Swaminathan S., Howison S., Lyons T. J. The signature-based model for early detection of sepsis from electronic health records in the intensive care unit // IEEE Conference on Computing in Cardiology. 2019. https://doi.org/10.22489/CinC.2019.014
10. Chevyrev I., Kormilitzin A. A Primer on the Signature Method in Machine Learning. 2019. https://arxiv.org/abs/1603.03788
11. Buhler H., Horvath B., Lyons T., Arribas I. P., Wood B. A data-driven market simulator for small data environments. 2020. https://arxiv.org/abs/2006.14498
12. Gyurko L. G., Lyons T., Kontkowski M., Field J. Extracting information from the signature of a financial data stream. 2014. https://arxiv.org/abs/1307.7244v2
13. Cohen S. N., Lui S., Malpass W., Mantoan G., Nesheim L., de Paula A., Reeves A., Scott C., Small E., Yang L. Nowcasting with signature methods. 2023. https://arxiv.org/abs/2305.10256v1
14. Zou H., Hastie T. Regularization and variable selection via the elastic net // Journal of the Royal Statistical Society: Series B (Statistical Methodology). 2005. Vol. 67. No. 2. P. 301–320. https://doi.org/10.1111/j.1467-9868.2005.00503.x
15. Fermanian A. Embedding and learning with signatures // Computational Statistics & Data Analysis. 2021. Vol. 157. No. 107148. https://doi.org/10.1016/j.csda.2020.107148
16. Chevyrev I., Oberhauser H. Signature moments to characterize laws of sto-chastic processes. 2018. https://arxiv.org/abs/1810.10971

This work is licensed under a Creative Commons Attribution 4.0 International License.
Presenting an article for publication in the Russian Digital Libraries Journal (RDLJ), the authors automatically give consent to grant a limited license to use the materials of the Kazan (Volga) Federal University (KFU) (of course, only if the article is accepted for publication). This means that KFU has the right to publish an article in the next issue of the journal (on the website or in printed form), as well as to reprint this article in the archives of RDLJ CDs or to include in a particular information system or database, produced by KFU.
All copyrighted materials are placed in RDLJ with the consent of the authors. In the event that any of the authors have objected to its publication of materials on this site, the material can be removed, subject to notification to the Editor in writing.
Documents published in RDLJ are protected by copyright and all rights are reserved by the authors. Authors independently monitor compliance with their rights to reproduce or translate their papers published in the journal. If the material is published in RDLJ, reprinted with permission by another publisher or translated into another language, a reference to the original publication.
By submitting an article for publication in RDLJ, authors should take into account that the publication on the Internet, on the one hand, provide unique opportunities for access to their content, but on the other hand, are a new form of information exchange in the global information society where authors and publishers is not always provided with protection against unauthorized copying or other use of materials protected by copyright.
RDLJ is copyrighted. When using materials from the log must indicate the URL: index.phtml page = elbib / rus / journal?. Any change, addition or editing of the author's text are not allowed. Copying individual fragments of articles from the journal is allowed for distribute, remix, adapt, and build upon article, even commercially, as long as they credit that article for the original creation.
Request for the right to reproduce or use any of the materials published in RDLJ should be addressed to the Editor-in-Chief A.M. Elizarov at the following address: amelizarov@gmail.com.
The publishers of RDLJ is not responsible for the view, set out in the published opinion articles.
We suggest the authors of articles downloaded from this page, sign it and send it to the journal publisher's address by e-mail scan copyright agreements on the transfer of non-exclusive rights to use the work.