Taking into account the whole system structure and the component reliability estimation uncertainty, a system reliability estimation method based on probability and statistical theory for distributed monitoring system...Taking into account the whole system structure and the component reliability estimation uncertainty, a system reliability estimation method based on probability and statistical theory for distributed monitoring systems is presented. The variance and confidence intervals of the system reliability estimation are obtained by expressing system reliability as a linear sum of products of higher order moments of component reliability estimates when the number of component or system survivals obeys binomial distribution. The eigenfunction of binomial distribution is used to determine the moments of component reliability estimates, and a symbolic matrix which can facilitate the search of explicit system reliability estimates is proposed. Furthermore, a case of application is used to illustrate the procedure, and with the help of this example, various issues such as the applicability of this estimation model, and measures to improve system reliability of monitoring systems are discussed.展开更多
Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t...Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.展开更多
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje...We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.展开更多
The primary goal in the analysis of hierarchical distributed monitoring and control architectures is to study the spatiotemporal patterns of the interactions between areas or subsystems.In this paper,a novel conceptua...The primary goal in the analysis of hierarchical distributed monitoring and control architectures is to study the spatiotemporal patterns of the interactions between areas or subsystems.In this paper,a novel conceptual framework for distributed monitoring of power system oscillations using multiblock principal component analysis(MB-PCA)and higher-order singular value decomposition(HOSVD)is proposed to understand,characterize,and visualize the global behavior of the power system.The proposed framework can be used to evaluate the influence of a given area or utility on the oscillatory behavior,uncover low-dimensional structures from high-dimensional data,and analyze the effects of heterogeneous data on the modal characteristics and interpretation of power system.The metrics are then investigated to examine the relationships between the dynamic patterns and participation of individual data blocks in the global behavior of the system.Practical application of these techniques is demonstrated by case studies of two systems:a 14-machine test system and a 5449-bus 635-generator equivalent model of a large power system.展开更多
Based on the discussion of bluetooth and network technology, this paper proposed an entire framework of a wireless distributed monitoring system by combining the characteristics of industry application. The feasibilit...Based on the discussion of bluetooth and network technology, this paper proposed an entire framework of a wireless distributed monitoring system by combining the characteristics of industry application. The feasibility of putting this kind of system in practice is discussed. The wireless distributed monitoring system can enhance the performance of condition monitoring more than the traditional one used now.展开更多
With the vigorous development of mobile networks,the number of devices at the network edge is growing rapidly and the massive amount of data generated by the devices brings a huge challenge of response latency and com...With the vigorous development of mobile networks,the number of devices at the network edge is growing rapidly and the massive amount of data generated by the devices brings a huge challenge of response latency and communication burden.Existing resource monitoring systems are widely deployed in cloud data centers,but it is difficult for traditional resource monitoring solutions to handle the massive data generated by thousands of edge devices.To address these challenges,we propose a super resolution sensing(SRS)method for distributed resource monitoring,which can be used to recover reliable and accurate high‑frequency data from low‑frequency sampled resource monitoring data.Experiments based on the proposed SRS model are also conducted and the experimental results show that it can effectively reduce the errors generated when recovering low‑frequency monitoring data to high‑frequency data,and verify the effectiveness and practical value of applying SRS method for resource monitoring on edge clouds.展开更多
There are several purposes of analyzing a program: functional or performance analysis, debugging or, more recently, mapping a program to a new parallel or distributed architecture. In this paper, we introduce an effec...There are several purposes of analyzing a program: functional or performance analysis, debugging or, more recently, mapping a program to a new parallel or distributed architecture. In this paper, we introduce an effective method leading to the Execution Graph (EG) from a program. First,the Unix profiling tool Gprof is used to get the Execution Model (EM) of a C-program. Then the event-driven monitoring tool AICOS-SIMPLE is used to get the EG which includes not only the call graph but also the execution time table of the program. This method is suitable for analyzing modern distributed programs. As the example of the analysis, the well known HTTP protocol under the NCSA Mosaic is chosen. An EG of NCSA Mosaic on the routing level is given.展开更多
A de-centralised load management technique exploiting the flexibility in the charging of Electric Vehicles (EVs) is presented. Two charging regimes are assumed. The Controlled Charging Regime (CCR) between 16:30 hours...A de-centralised load management technique exploiting the flexibility in the charging of Electric Vehicles (EVs) is presented. Two charging regimes are assumed. The Controlled Charging Regime (CCR) between 16:30 hours and 06:00 hours of the next day and the Uncontrolled Charging Regime (UCR) between 06:00 hours and 16:30 hours of the same day. During the CCR, the charging of EVs is coordinated and controlled by means of a wireless two-way communication link between EV Smart Charge Controllers (EVSCCs) at EV owners’ premises and the EV Load Controller (EVLC) at the local LV distribution substation. The EVLC sorts the EVs batteries in ascending order of their states of charge (SoC) and sends command signals for charging to as many EVs as the transformer could allow at that interval based on the condition of the transformer as analysed by the Distribution Transformer Monitor (DTM). A real and typical urban LV area distribution network in Great Britain (GB) is used as the case study. The technique is applied on</span></span><span><span><span style="font-family:""> </span></span></span><span><span><span style="font-family:"">the LV area when its transformer is carrying the future load demand of the area on a typical winter weekday in the year 2050. To achieve the load management, load demand of the LV area network is decomposed into Non-EV <span>load and EV load. The load on the transformer is managed by varying the EV load in an optimisation objective function which maximises the capacity uti</span>lisation of the transformer subject to operational constraints and non-disruption of daily trips of EV owners. Results show that with the proposed load management technique, LV distribution networks could accommodate high uptake of EVs without compromising the useful normal life expectancy of distribution transformers before the need for capacity reinforcement.展开更多
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po...A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.展开更多
基金This project is supported by National Natural Science Foundation of China(No.50335020,No.50205009)Laboratory of Intelligence Manufacturing Technology of Ministry of Education of China(No.J100301).
文摘Taking into account the whole system structure and the component reliability estimation uncertainty, a system reliability estimation method based on probability and statistical theory for distributed monitoring systems is presented. The variance and confidence intervals of the system reliability estimation are obtained by expressing system reliability as a linear sum of products of higher order moments of component reliability estimates when the number of component or system survivals obeys binomial distribution. The eigenfunction of binomial distribution is used to determine the moments of component reliability estimates, and a symbolic matrix which can facilitate the search of explicit system reliability estimates is proposed. Furthermore, a case of application is used to illustrate the procedure, and with the help of this example, various issues such as the applicability of this estimation model, and measures to improve system reliability of monitoring systems are discussed.
基金the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number 223202.
文摘Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.
文摘We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.
文摘The primary goal in the analysis of hierarchical distributed monitoring and control architectures is to study the spatiotemporal patterns of the interactions between areas or subsystems.In this paper,a novel conceptual framework for distributed monitoring of power system oscillations using multiblock principal component analysis(MB-PCA)and higher-order singular value decomposition(HOSVD)is proposed to understand,characterize,and visualize the global behavior of the power system.The proposed framework can be used to evaluate the influence of a given area or utility on the oscillatory behavior,uncover low-dimensional structures from high-dimensional data,and analyze the effects of heterogeneous data on the modal characteristics and interpretation of power system.The metrics are then investigated to examine the relationships between the dynamic patterns and participation of individual data blocks in the global behavior of the system.Practical application of these techniques is demonstrated by case studies of two systems:a 14-machine test system and a 5449-bus 635-generator equivalent model of a large power system.
文摘Based on the discussion of bluetooth and network technology, this paper proposed an entire framework of a wireless distributed monitoring system by combining the characteristics of industry application. The feasibility of putting this kind of system in practice is discussed. The wireless distributed monitoring system can enhance the performance of condition monitoring more than the traditional one used now.
文摘With the vigorous development of mobile networks,the number of devices at the network edge is growing rapidly and the massive amount of data generated by the devices brings a huge challenge of response latency and communication burden.Existing resource monitoring systems are widely deployed in cloud data centers,but it is difficult for traditional resource monitoring solutions to handle the massive data generated by thousands of edge devices.To address these challenges,we propose a super resolution sensing(SRS)method for distributed resource monitoring,which can be used to recover reliable and accurate high‑frequency data from low‑frequency sampled resource monitoring data.Experiments based on the proposed SRS model are also conducted and the experimental results show that it can effectively reduce the errors generated when recovering low‑frequency monitoring data to high‑frequency data,and verify the effectiveness and practical value of applying SRS method for resource monitoring on edge clouds.
文摘There are several purposes of analyzing a program: functional or performance analysis, debugging or, more recently, mapping a program to a new parallel or distributed architecture. In this paper, we introduce an effective method leading to the Execution Graph (EG) from a program. First,the Unix profiling tool Gprof is used to get the Execution Model (EM) of a C-program. Then the event-driven monitoring tool AICOS-SIMPLE is used to get the EG which includes not only the call graph but also the execution time table of the program. This method is suitable for analyzing modern distributed programs. As the example of the analysis, the well known HTTP protocol under the NCSA Mosaic is chosen. An EG of NCSA Mosaic on the routing level is given.
文摘A de-centralised load management technique exploiting the flexibility in the charging of Electric Vehicles (EVs) is presented. Two charging regimes are assumed. The Controlled Charging Regime (CCR) between 16:30 hours and 06:00 hours of the next day and the Uncontrolled Charging Regime (UCR) between 06:00 hours and 16:30 hours of the same day. During the CCR, the charging of EVs is coordinated and controlled by means of a wireless two-way communication link between EV Smart Charge Controllers (EVSCCs) at EV owners’ premises and the EV Load Controller (EVLC) at the local LV distribution substation. The EVLC sorts the EVs batteries in ascending order of their states of charge (SoC) and sends command signals for charging to as many EVs as the transformer could allow at that interval based on the condition of the transformer as analysed by the Distribution Transformer Monitor (DTM). A real and typical urban LV area distribution network in Great Britain (GB) is used as the case study. The technique is applied on</span></span><span><span><span style="font-family:""> </span></span></span><span><span><span style="font-family:"">the LV area when its transformer is carrying the future load demand of the area on a typical winter weekday in the year 2050. To achieve the load management, load demand of the LV area network is decomposed into Non-EV <span>load and EV load. The load on the transformer is managed by varying the EV load in an optimisation objective function which maximises the capacity uti</span>lisation of the transformer subject to operational constraints and non-disruption of daily trips of EV owners. Results show that with the proposed load management technique, LV distribution networks could accommodate high uptake of EVs without compromising the useful normal life expectancy of distribution transformers before the need for capacity reinforcement.
基金Supported by the National Natural Science Foundation of China(61370212)the Research Fund for the Doctoral Program of Higher Education of China(20122304130002)+1 种基金the Natural Science Foundation of Heilongjiang Province(ZD 201102)the Fundamental Research Fund for the Central Universities(HEUCFZ1213,HEUCF100601)
文摘A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.