4.6 Article

Dependable Structural Health Monitoring Using Wireless Sensor Networks

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2015.2469655

关键词

Wireless sensor networks; structural health monitoring; dependability; fault detection; fault-tolerance; energy-efficiency

资金

  1. Central South University
  2. China postdoctoral research fund [2015T80884]
  3. Fordham University
  4. National Natural Science Foundation of China [61632009, 61472451, 61402543]
  5. High Level Talents Program of Higher Education in Guangdong Province [2016ZJ01]
  6. NSF [CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, CNS 1301774, ECCS 1231461]

向作者/读者索取更多资源

As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural health monitoring (SHM) due to relatively low-cost, easy installation, and so forth. However, there is still an unaddressed challenge: the application-specific dependability in terms of sensor fault detection and tolerance. The dependability is also affected by a reduction on the quality of monitoring when mitigating WSN constrains (e.g., limited energy, narrow bandwidth). We address these by designing a dependable distributed WSN framework for SHM (called DependSHM) and then examining its ability to cope with sensor faults and constraints. We find evidence that faulty sensors can corrupt results of a health event (e.g., damage) in a structural system without being detected. More specifically, we bring attention to an undiscovered yet interesting fact, i.e., the real measured signals introduced by one or more faulty sensors may cause an undamaged location to be identified as damaged (false positive) or a damaged location as undamaged (false negative) diagnosis. This can be caused by faults in sensor bonding, precision degradation, amplification gain, bias, drift, noise, and so forth. In DependSHM, we present a distributed automated algorithm to detect such types of faults, and we offer an online signal reconstruction algorithm to recover fromthe wrong diagnosis. Through comprehensive simulations and a WSN prototype system implementation, we evaluate the effectiveness of DependSHM.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT

Yang Xu, Md Zakirul Alam Bhuiyan, Tian Wang, Xiaokang Zhou, Amit Kumar Singh

Summary: In this article, we propose a framework called C-fDRL to protect the context-aware privacy of task offloading using context-aware federated deep reinforcement learning. The framework operates in three stages (CloudAI, EdgeAI, and DeviceAI) of the overall system, decoupling data from tasks through a context-aware data management approach for local and edge computation, leading to improved data privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Towards Robust Task Assignment in Mobile Crowdsensing Systems

Liang Wang, Zhiwen Yu, Kaishun Wu, Dingqi Yang, En Wang, Tian Wang, Yihan Mei, Bin Guo

Summary: Mobile Crowdsensing (MCS) is an appealing paradigm for collaboratively collecting data from surrounding environments by assigning outsourced sensing tasks to volunteer workers. However, unpredictable disruptions during task implementation often result in task execution failure and impair the benefit of MCS systems. In this work, we propose a robust task assignment scheme that proactively creates assignments offline, aiming to strengthen the robustness of the scheme and minimize workers' traveling detour cost. By leveraging workers' spatiotemporal mobility, we construct an assignment graph and use an evolutionary multi-tasking optimization algorithm (EMTRA) to achieve adequate Pareto-optimal schemes. Comprehensive experiments on real-world datasets validate the effectiveness and applicability of our approach.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things

Jing Bai, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Neal N. Xiong, Anfeng Liu

Summary: In this article, a trust-based active notice task offloading (TANTO) scheme is proposed to provide trust and low-delay task offloading for resource-limited IoT devices in areas with no available communication infrastructure. The main innovations of TANTO include a novel task offloading mechanism, a trust calculation and reasoning method, and an online UAV trajectory optimization algorithm. Experimental results show that TANTO outperforms previous studies in terms of task completion rate, tasks' average completion time, and UAV's flight cost.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Theory & Methods

A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues

Jiang Xiao, Huichuwu Li, Minrui Wu, Hai Jin, M. Jamal Deen, Jiannong Cao

Summary: This article introduces the latest research progress in wireless device-free human sensing (WDHS) technology, classifying the systems into different categories and discussing various sensing task types and motion granularity. The article also proposes a new research framework to summarize WDHS systems, and presents future research directions in terms of data collection, sensing methodology, performance evaluation, and application scenarios.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

Personalized Federated Learning on Non-IID Data via Group-based Meta-learning

Lei Yang, Jiaming Huang, Wanyu Lin, Jiannong Cao

Summary: Personalized federated learning (PFL) provides personalized models that fit the local data distribution of each client. We propose a Group-based Federated Meta-Learning framework (G-FML) that adaptively divides clients into groups based on data distribution similarity to achieve personalized models. Experimental results show that our framework improves model accuracy by up to 13.15% compared to state-of-the-art federated meta-learning.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2023)

Article Computer Science, Theory & Methods

Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions

Juncen Zhu, Jiannong Cao, Divya Saxena, Shan Jiang, Houda Ferradi

Summary: Federated learning is a privacy-preserving machine learning technique that trains models across multiple devices without exchanging local data samples. Existing centralized solutions have disadvantages, and blockchain has been identified as a potential solution. This work comprehensively surveys challenges, solutions, and future directions for blockchain-empowered federated learning.

ACM COMPUTING SURVEYS (2023)

Article Engineering, Electrical & Electronic

Consensus of Multiagent Systems With Intermittent Communication via Extended State Observer

Rongling Yu, Ping He, Heng Li, Jiannong Cao, Feiqi Deng

Summary: This article investigates the consensus problem of linear multi-agent systems (MASs) with unknown external disturbances under intermittent communication. Firstly, the distributed extended observer is utilized to observe the relative output information and unknown disturbance. Then, a distributed active disturbance rejection intermittent consensus protocol is proposed using the observer information. Finally, a simulation example is provided to demonstrate the effectiveness of the consensus protocol.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2023)

Editorial Material Automation & Control Systems

Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications

Md Zakirul Alam Bhuiyan, Sy-Yen Kuo, Guojun Wang

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

Cooperative Location-Sensing Network Based on Vehicular Communication Security Against Attacks

Zhaoyang Wang, Song Wang, Md Zakirul Alam Bhuiyan, Jiping Xu, Yanzhu Hu

Summary: This paper proposes a federated cryptosystem localization based on optimized constraints to protect the security of a cooperative location-sensing system. By defining a penalty function and utilizing the Paillier cryptosystem for encryption, privacy preservation against attacks is achieved.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Group Consensus of Second-Order Sample MASs via Distributed Event-Triggered Mechanism

Zengcheng Sun, Ping He, Heng Li, Jiannong Cao, Feiqi Deng

Summary: The group consensus of second-order sample multi-agent systems is investigated using a distributed event-triggered mechanism. A consensus protocol is proposed, which is updated only when the event-triggered condition is met and the update only depends on the data collected at the moment of triggering. The sufficient condition for group consensus is obtained, and a differential equation is constructed to avoid the Zeno phenomenon and obtain a minimum positive and lower bound for any two trigger time intervals. The effectiveness is verified through a simulation example.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2023)

Article Automation & Control Systems

EID-GAN: Generative Adversarial Nets for Extremely Imbalanced Data Augmentation

Wei Li, Jinlin Chen, Jiannong Cao, Chao Ma, Jia Wang, Xiaohui Cui, Ping Chen

Summary: In this article, a new augmentation model called EID-GANs is proposed to address the extremely imbalanced data augmentation problem. The model utilizes a new penalty function to guide the generator in learning the features of outliers and incorporates outlier detectors for evaluating the availability of generated instances. Experimental results demonstrate that EID-GAN outperforms existing augmentation models on different imbalanced datasets.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

High-Efficiency Blockchain-Based Supply Chain Traceability

Hanqing Wu, Shan Jiang, Jiannong Cao

Summary: Supply chain traceability requires transparency, authenticity, and high efficiency in product tracking. Blockchain has been widely adopted for transparency and authenticity, but the efficiency issue has been overlooked.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data

Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, Jiannong Cao

Summary: The article introduces the personal data privacy protection scheme PDPChain based on consortium blockchain, which uses an improved Paillier homomorphic encryption mechanism and CP-ABE to achieve fine-grained access control, ensuring user privacy and security. Experimental results validate the effectiveness of the scheme in reducing encryption and decryption time.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Artificial Intelligence

Time-Aware Dynamic Graph Embedding for Asynchronous Structural Evolution

Yu Yang, Hongzhi Yin, Jiannong Cao, Tong Chen, Quoc Viet Hung Nguyen, Xiaofang Zhou, Lei Chen

Summary: Dynamic graphs are graphs whose structure changes over time. Existing approaches only consider dynamic graphs as a sequence of changes in vertex connections, ignoring the asynchronous nature of the dynamics where the evolution of each local structure starts at different times and lasts for various durations. To address this, we propose a novel representation of dynamic graphs as temporal edge sequences associated with joining time of vertices (ToV) and timespan of edges (ToE). We also introduce a time-aware Transformer to embed the dynamic connections and ToEs into learned vertex representations, along with encoding time-sensitive information. Our approach outperforms the state-of-the-art in various graph mining tasks and is efficient for embedding large-scale dynamic graphs.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Information Systems

Reliable Dynamic Service Chain Scheduling in 5G Networks

Lei Yang, Junzhong Jia, Hongcai Lin, Jiannong Cao

Summary: This paper focuses on the problem of Service Function Chain (SFC) scheduling in the dynamic 5G network environment. It formulates the problem as a mixed integer non-linear programming and proposes a reinforcement learning method to increase the success rate of SFC requests.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

暂无数据