期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Image segmentation algorithm based on high-dimension fuzzy character and restrained clustering network 被引量:2
1
作者 Baoping Wang Yang Fang Chao Sun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期298-306,共9页
An image segmentation algorithm of the restrained fuzzy Kohonen clustering network (RFKCN) based on high- dimension fuzzy character is proposed. The algorithm includes two steps. The first step is the fuzzification ... An image segmentation algorithm of the restrained fuzzy Kohonen clustering network (RFKCN) based on high- dimension fuzzy character is proposed. The algorithm includes two steps. The first step is the fuzzification of pixels in which two redundant images are built by fuzzy mean value and fuzzy median value. The second step is to construct a three-dimensional (3-D) feature vector of redundant images and their original images and cluster the feature vector through RFKCN, to realize image seg- mentation. The proposed algorithm fully takes into account not only gray distribution information of pixels, but also relevant information and fuzzy information among neighboring pixels in constructing 3- D character space. Based on the combination of competitiveness, redundancy and complementary of the information, the proposed algorithm improves the accuracy of clustering. Theoretical anal- yses and experimental results demonstrate that the proposed algorithm has a good segmentation performance. 展开更多
关键词 image segmentation high-dimension fuzzy character restrained fuzzy Kohonen clustering network (RFKCN).
下载PDF
Network Traffic Clustering with QoS-Awareness
2
作者 Jielun Zhang Fuhao Li Feng Ye 《China Communications》 SCIE CSCD 2022年第3期202-214,共13页
Network traffic classification is essential in supporting network measurement and management.Many existing traffic classification approaches provide application-level results regardless of the network quality of servi... Network traffic classification is essential in supporting network measurement and management.Many existing traffic classification approaches provide application-level results regardless of the network quality of service(QoS)requirements.In practice,traffic flows from the same application may have irregular network behaviors that should be identified to various QoS classes for best network resource management.To address the issues,we propose to conduct traffic classification with two newly defined QoSaware features,i.e.,inter-APP similarity and intraAPP diversity.The inter-APP similarity represents the close QoS association between the traffic flows that originate from the different Internet applications.The intra-APP diversity describes the QoS variety of the traffic even among those originated from the same Internet application.The core of performing the QoS-aware feature extraction is a Long-Short Term Memory neural network based Autoencoder(LSTMAE).The QoS-aware features extracted by the encoder part of the LSTM-AE are then clustered into the corresponding QoS classes.Real-life data from multiple applications are collected to evaluate the proposed QoS-aware network traffic classification approach.The evaluation results demonstrate the efficacy of the extracted QoS-aware features in supporting the traffic classification,which can further contribute to future network measurement and management. 展开更多
关键词 network traffic clustering QUALITY-OF-SERVICE quality-of-experience deep learning
下载PDF
Optimal Energy Efficiency Resource Allocation Strategy for Cognitive Clustering Network under PUEA Attack
3
作者 Linna Hu Ning Cao +3 位作者 Rui Shi Xue Cai Minghe Mao Zhiyu Chen 《China Communications》 SCIE CSCD 2020年第10期249-263,共15页
5G has pushed the use of radio spectrum to a new level,and cognitive clustering network can effectively improve the utilization of radio spectrum,which is a feasible way to solve the growing demand for wireless commun... 5G has pushed the use of radio spectrum to a new level,and cognitive clustering network can effectively improve the utilization of radio spectrum,which is a feasible way to solve the growing demand for wireless communications.However,cognitive clustering network is vulnerable to PUEA attack,which will lead to the degradation of system detection performance,thereby reducing the energy efficiency.Aiming at these problems,this paper investigates the optimal energy efficiency resource allocation scheme for cognitive clustering network under PUEA attack.A cooperative user selection algorithm based on selection factor is proposed to effectively resist PUEA user attack and improve detection performance.We construct the energy efficiency optimization problem under multi-constraint conditions and transform the nonlinear programming problem into parametric programming problem,which is solved by Lagrangian function and Karush-Kuhn-Tucker condition.Then the sub-gradient iterative algorithm based on optimal energy efficiency under PUEA attack is proposed and its complexity is analyzed.Simulation results indicate that proposed method is effective when subjected to PUEA attacks,and the impact of different parameters on energy efficiency is analyzed. 展开更多
关键词 cognitive clustering network energy efficiency resource allocation PUEA cooperative user selection
下载PDF
Exact Solution for Clustering Coefficient of Random Apollonian Networks
4
作者 方频捷 张端明 +1 位作者 何敏华 蒋小勤 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期221-223,共3页
By means of the series method, we obtain the exact analytical solution of clustering coefficient in random Apollonian networks [Phys. Rev. E 71 (2005)046141]. Our exact analytical result is identical with the simula... By means of the series method, we obtain the exact analytical solution of clustering coefficient in random Apollonian networks [Phys. Rev. E 71 (2005)046141]. Our exact analytical result is identical with the simulation, whereas in the original work, there is a deviation of about 4% between their approximate analytical result and the simulation. 展开更多
关键词 Exact Solution for clustering Coefficient of Random Apollonian networks
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
5
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network
6
作者 HUANG Xingyang YANG Ming 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1563-1568,共6页
In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregat... In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregation will consume much more energy than common nodes and may quit the mission in advance due to energy exhausting because of taxing decryption and re-encryption operation; moreover, it will bring complex key management to ensure the security of the data and corresponding keys. This paper was designed specifically to address above problem based on the thought of privacy homomorphism, It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture. Using the simulation and analysis, we show that our scheme consume the energy only about 21% of AED scheme. 展开更多
关键词 data aggregation privacy homomorphism perfect security network clustering wireless sensor network
下载PDF
Distributed Satellite Cluster Network:a Survey
7
作者 董飞鸿 王敬超 +1 位作者 杨杰 蔡春晓 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期332-336,共5页
The ability of the monolithic satellite,satellite orbit(especially GEO),and radio resource are very limited,so the development of distributed satellite cluster network(DSCN) receives more and more worldwide attention.... The ability of the monolithic satellite,satellite orbit(especially GEO),and radio resource are very limited,so the development of distributed satellite cluster network(DSCN) receives more and more worldwide attention.In this paper,DSCN is surveyed and the study status of DSCN architecture design is summarized.The formation flying of spacecrafts,reconfiguration,networking,and applied research on distributed satellite spacecraft are described in detail.The DSCN will provide a great technology innovation for space information network,satellite communications,satellite navigation,deep space exploration,and space remote sensing.In addition,this paper points out future trends of the DSCN development. 展开更多
关键词 distributed satellite cluster network(DSCN) ARCHITECTURE formation flying networkING space information network
下载PDF
Effects of internal noise on the spiking regularity of a clustered Hodgkin–Huxley neuronal network
8
作者 Xiaojuan Sun 《Theoretical & Applied Mechanics Letters》 CAS 2014年第1期35-40,共6页
Spiking regularity in a clustered Hodgkin–Huxley(HH) neuronal network has been studied in this letter. A stochastic HH neuronal model with channel blocks has been applied as local neuronal model. Effects of the int... Spiking regularity in a clustered Hodgkin–Huxley(HH) neuronal network has been studied in this letter. A stochastic HH neuronal model with channel blocks has been applied as local neuronal model. Effects of the internal channel noise on the spiking regularity are discussed by changing the membrane patch size. We find that when there is no channel blocks in potassium channels, there exist some intermediate membrane patch sizes at which the spiking regularity could reach to a higher level. Spiking regularity increases with the membrane patch size when sodium channels are not blocked. Namely, depending on different channel blocking states, internal channel noise tuned by membrane patch size could have different influence on the spiking regularity of neuronal networks. 展开更多
关键词 spiking regularity internal noise clustered neuronal network Hodgkin–Huxley neuron
下载PDF
Reliability Evaluation of Mobile Communication Networks
9
作者 任晓涛 赵胜辉 匡镜明 《Journal of Beijing Institute of Technology》 EI CAS 2004年第S1期7-11,共5页
A new reliability evaluation measure, global clustering reliability (GCR), is proposed. Firstly, the common measures used in invulnerability and survivability evaluation of mobile communication networks are discussed,... A new reliability evaluation measure, global clustering reliability (GCR), is proposed. Firstly, the common measures used in invulnerability and survivability evaluation of mobile communication networks are discussed, and the shortcomings of these measures are pointed out. Then a new reliability evaluation measure, GCR, which is applicable to mobile communication networks, is proposed. And some properties and theorem about this measure are put forward. Finally, simulation calculation of reliability evaluation that uses this measure to 12 kinds of topological networks is accomplished. And the comparison between this measure and link connected factor (LCF) measure is also given. The results proved that the design of GCR is reasonable, its computation is rapid, moreover, it can take into account of invalidation of both nodes and links, and it has good physical meanings 展开更多
关键词 clustering . mobile communication networks: reliability EVALUATION
下载PDF
Four Types of Percolation Transitions in the Cluster Aggregation Network Model
10
作者 韩文臣 杨俊忠 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第1期59-62,共4页
We study the percolation transition in a one-species cluster aggregation network model, in which the parameter α describes the suppression on the cluster sizes. It is found that the model can exhibit four types of pe... We study the percolation transition in a one-species cluster aggregation network model, in which the parameter α describes the suppression on the cluster sizes. It is found that the model can exhibit four types of percolation transitions, two continuous percolation transitions and two discontinuous ones. Continuous and discontinuous percolation transitions can be distinguished from each other by the largest single jump. Two types of continuous percolation transitions show different behaviors in the time gap. Two types of discontinuous percolation transitions are different in the time evolution of the cluster size distribution. Moreover, we also find that the time gap may also be a measure to distinguish different discontinuous percolations in this model. 展开更多
关键词 Four Types of Percolation Transitions in the Cluster Aggregation network Model
下载PDF
Storage Assignment Optimization in a Multi-tier Shuttle Warehousing System 被引量:8
11
作者 WANG Yanyan MOU Shandong WU Yaohua 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第2期421-429,共9页
The current mathematical models for the storage assignment problem are generally established based on the traveling salesman problem(TSP),which has been widely applied in the conventional automated storage and retri... The current mathematical models for the storage assignment problem are generally established based on the traveling salesman problem(TSP),which has been widely applied in the conventional automated storage and retrieval system(AS/RS).However,the previous mathematical models in conventional AS/RS do not match multi-tier shuttle warehousing systems(MSWS) because the characteristics of parallel retrieval in multiple tiers and progressive vertical movement destroy the foundation of TSP.In this study,a two-stage open queuing network model in which shuttles and a lift are regarded as servers at different stages is proposed to analyze system performance in the terms of shuttle waiting period(SWP) and lift idle period(LIP) during transaction cycle time.A mean arrival time difference matrix for pairwise stock keeping units(SKUs) is presented to determine the mean waiting time and queue length to optimize the storage assignment problem on the basis of SKU correlation.The decomposition method is applied to analyze the interactions among outbound task time,SWP,and LIP.The ant colony clustering algorithm is designed to determine storage partitions using clustering items.In addition,goods are assigned for storage according to the rearranging permutation and the combination of storage partitions in a 2D plane.This combination is derived based on the analysis results of the queuing network model and on three basic principles.The storage assignment method and its entire optimization algorithm method as applied in a MSWS are verified through a practical engineering project conducted in the tobacco industry.The applying results show that the total SWP and LIP can be reduced effectively to improve the utilization rates of all devices and to increase the throughput of the distribution center. 展开更多
关键词 Multi-tier shuttle warehousing system storage assignment optimization open queuing network ant colony clustering algorithm
下载PDF
Joint Design of Clustering and In-cluster Data Route for Heterogeneous Wireless Sensor Networks 被引量:1
12
作者 Liang Xue Ying Liu +2 位作者 Zhi-Qun Gu Zhi-Hua Li Xin-Ping Guan 《International Journal of Automation and computing》 EI CSCD 2017年第6期637-649,共13页
A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in ... A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads. 展开更多
关键词 Heterogeneous wireless sensor networks clustering technique in-cluster data routes integral framework network lifetimes
原文传递
Realistic Efficiency Evaluations for Parallel Computations under Workstation Cluster
13
作者 Mo Zeyao Li Xiaomei(Dept. of Computer, Changsha institute of Technology Changsha, China, 410073) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期329-336,共8页
In recent years, high performance scientific computing under workstation cluster connected by local area network is becoming a hot point. Owing to both the longer latency and the higher overhead for protocol processin... In recent years, high performance scientific computing under workstation cluster connected by local area network is becoming a hot point. Owing to both the longer latency and the higher overhead for protocol processing compared with the powerful single workstation capacity, it is becoming severe important to keep balance not only for numerical load but also for communication load, and to overlap communications with computations while parallel computing. Hence,our efficiency evaluation rules must discover these capacities of a given parallel algorithm in order to optimize the existed algorithm to attain its highest parallel efficiency. The traditional efficiency evaluation rules can not succeed in this work any more. Fortunately, thanks to Culler's detail discuss in LogP model about interconnection networks for MPP systems, we present a system of efficiency evaluation rules for parallel computations under workstation cluster with PVM3.0 parallel software framework in this paper. These rules can satisfy above acquirements successfully. At last, two typical synchronous,and asynchronous applications are designed to verify the validity of these rules under 4 SGIs workstations cluster connected by Ethernet. 展开更多
关键词 parallel efficiency evaluation workstation cluster PVM. network parallel computations.
下载PDF
Optimization of satellite searching strategy of the non-stationary antenna
14
作者 曹海青 王渝 姚志英 《Journal of Beijing Institute of Technology》 EI CAS 2015年第3期398-404,共7页
The tiny searching step length and the satellite distribution density are the major factors to influence the efficiency of the satellite finder,so a scientific and reasonable method to calculate the tiny searching ste... The tiny searching step length and the satellite distribution density are the major factors to influence the efficiency of the satellite finder,so a scientific and reasonable method to calculate the tiny searching step length is proposed to optimize the satellite searching strategy. The pattern clustering and BP neural network are applied to optimize the tiny searching step length. The calculated tiny searching step length is approximately equal to the theoretic value for each satellite. In application,the satellite searching results will be dynamically added to the training samples to re-train the network to improve the generalizability and the precision. Experiments validate that the optimization of the tiny searching step length can avoid the error of locating target satellite and improve the searching efficiency. 展开更多
关键词 tiny searching step length satellite finder patter clustering neural network
下载PDF
Phytochemical interventions for post-traumatic stress disorder:A cluster co-occurrence network analysis using CiteSpace
15
作者 Biao Gao Yi-cui Qu +5 位作者 Meng-yu Cai Yin-yin Zhang Hong-tao Lu Hong-xia Li Yu-xiao Tang Hui Shen 《Journal of Integrative Medicine》 SCIE CAS CSCD 2023年第4期385-396,共12页
Objective:This study investigated trends in the study of phytochemical treatment of post-traumatic stress disorder(PTSD).Methods:The Web of Science database(2007-2022)was searched using the search terms“phytochemical... Objective:This study investigated trends in the study of phytochemical treatment of post-traumatic stress disorder(PTSD).Methods:The Web of Science database(2007-2022)was searched using the search terms“phytochemicals”and“PTSD,”and relevant literature was compiled.Network clustering co-occurrence analysis and qualitative narrative review were conducted.Results:Three hundred and one articles were included in the analysis of published research,which has surged since 2015 with nearly half of all relevant articles coming from North America.The category is dominated by neuroscience and neurology,with two journals,Addictive Behaviors and Drug and Alcohol Dependence,publishing the greatest number of papers on these topics.Most studies focused on psychedelic intervention for PTSD.Three timelines show an“ebb and flow”phenomenon between“substance use/marijuana abuse”and“psychedelic medicine/medicinal cannabis.”Other phytochemicals account for a small proportion of the research and focus on topics like neurosteroid turnover,serotonin levels,and brain-derived neurotrophic factor expression.Conclusion:Research on phytochemicals and PTSD is unevenly distributed across countries/regions,disciplines,and journals.Since 2015,the research paradigm shifted to constitute the mainstream of psychedelic research thus far,leading to the exploration of botanical active ingredients and molecular mechanisms.Other studies focus on anti-oxidative stress and anti-inflammation. 展开更多
关键词 PHYTOCHEMICAL Post-traumatic stress disorder Text analysis clustering co-occurrence network PSYCHEDELIC
原文传递
Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network 被引量:1
16
作者 Muntadher Sallal Gareth Owenson +1 位作者 Dawood Salman Mo Adda 《Blockchain(Research and Applications)》 2022年第1期49-64,共16页
Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions.Bitcoin is gaining wider adoption than any previous crypto-currency.However,the mechanism of peers randomly choosing l... Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions.Bitcoin is gaining wider adoption than any previous crypto-currency.However,the mechanism of peers randomly choosing logical neighbours without any knowledge about the underlying physical topology can cause a delay overhead in information propagation which makes the system vulnerable to double spend attacks.Aiming at alleviating the propagation delay problem,this paper introduces a proximity-aware extension to the current Bitcoin protocol,named Master Node Based Clustering(MNBC).The ultimate purpose of the proposed protocol,which is based on how clusters are formulated and how nodes can define their membership,is to improve the information propagation delay in the Bitcoin network.In the MNBC protocol,physical internet connectivity increases as well as the number of hops between nodes decreases through assigning nodes to be responsible for maintaining clusters based on physical Internet proximity.Furthermore,a reputation-based blockchain protocol is integrated with MNBC protocol in order to securely assign a master node for every cluster.We validate our proposed methods through a set of simulation experiments and the findings show how the proposed methods run and their impact in optimising the transaction propagation delay. 展开更多
关键词 Information propagation delay network clustering Bitcoin network Reputation blockchain
原文传递
Meta-Path-Based Search and Mining in Heterogeneous Information Networks 被引量:15
17
作者 Yizhou Sun Jiawei Han 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期329-338,共10页
Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link predic... Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link prediction. Most existing network studies are on homogeneous networks, where nodes and links are assumed from one single type. In reality, however, heterogeneous information networks can better model the real-world systems, which are typically semi-structured and typed, following a network schema. In order to mine these heterogeneous information networks directly, we propose to explore the meta structure of the information network, i.e., the network schema. The concepts of meta-paths are proposed to systematically capture numerous semantic relationships across multiple types of objects, which are defined as a path over the graph of network schema. Meta-paths can provide guidance for search and mining of the network and help analyze and understand the semantic meaning of the objects and relations in the network. Under this framework, similarity search and other mining tasks such as relationship prediction and clustering can be addressed by systematic exploration of the network meta structure. Moreover, with user's guidance or feedback, we can select the best meta-path or their weighted combination for a specific mining task. 展开更多
关键词 heterogeneous information network meta-path similarity search relationship prediction user-guided clustering
原文传递
Fast Community Detection Based on Distance Dynamics 被引量:2
18
作者 Lei Chen Jing Zhang +1 位作者 Lijun Cai Ziyun Deng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第6期564-585,共22页
The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this model is its very long computation time in large-scale netwo... The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this model is its very long computation time in large-scale networks. To identify the community structure of a large-scale network with high speed and high quality, in this paper, we propose a fast community detection algorithm, the F-Attractor, which is based on the distance dynamics model. The main contributions of the F-Attractor are as follows. First, we propose the use of two prejudgment rules from two different perspectives: node and edge. Based on these two rules, we develop a strategy of internal edge prejudgment for predicting the internal edges of the network. Internal edge prejudgment can reduce the number of edges and their neighbors that participate in the distance dynamics model. Second, we introduce a triangle distance to further enhance the speed of the interaction process in the distance dynamics model. This triangle distance uses two known distances to measure a third distance without any extra computation. We combine the above techniques to improve the distance dynamics model and then describe the community detection process of the F-Attractor. The results of an extensive series of experiments demonstrate that the F-Attractor offers high-speed community detection and high partition quality. 展开更多
关键词 community detection interaction model complex network graph clustering graph mining
原文传递
Applied Fault Detection and Diagnosis for Industrial Gas Turbine Systems 被引量:1
19
作者 Yu Zhang Chris Bingham +1 位作者 Mike Garlick Michael Gallimore 《International Journal of Automation and computing》 EI CSCD 2017年第4期463-473,共11页
The paper presents readily implementable approaches for fault detection and diagnosis (FDD) based on measurements from multiple sensor groups, for industrial systems. Specifically, the use of hierarchical clustering... The paper presents readily implementable approaches for fault detection and diagnosis (FDD) based on measurements from multiple sensor groups, for industrial systems. Specifically, the use of hierarchical clustering (HC) and self-organizing map neural networks (SOMNNs) are shown to provide robust and user-friendly tools for application to industrial gas turbine (IGT) systems. HC fingerprints are found for normal operation, and FDD is achieved by monitoring cluster changes occurring in the resulting dendrograms. Similarly, fingerprints of operational behaviour are also obtained using SOMNN based classification maps (CMs) that are initially determined during normal operation, and FDD is performed by detecting changes in their CMs. The proposed methods are shown to be capable of FDD from a large group of sensors that measure a variety of physical quantities. A key feature of the paper is the development of techniques to accommodate transient system operation, which can often lead to false-alarms being triggered when using traditional techniques if the monitoring algorithms are not first desensitized. Case studies showing the efficacy of the techniques for detecting sensor faults, bearing tilt pad wear and early stage pre-chamber burnout, are included. The presented techniques are now being applied operationally and monitoring IGTs in various regions of the world. 展开更多
关键词 Fault detection and diagnosis hierarchical clustering self-organizing map neural network.
原文传递
Distributed Algorithms for Event Reporting in Mobile-Sink WSNs for Internet of Things 被引量:5
20
作者 Catalina Aranzazu-Suescun Mihaela Cardei 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期413-426,共14页
Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT... Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT)and participate in various tasks. WSNs play an important role monitoring and reporting environment information and collecting surrounding context. In this paper we consider a WSN deployed for an application such as environment monitoring, and a mobile sink which acts as the gateway between the Internet and the WSN. Data gathering is a challenging problem in WSNs and in the IoT because the information has to be available quickly and effectively without delays and redundancies. In this paper we propose several distributed algorithms for composite event detection and reporting to a mobile sink. Once data is collected by the sink, it can be shared using the IoT infrastructure. We analyze the performance of our algorithms using WSNet simulator, which is specially designed for event-based WSNs. We measure various metrics such as average residual energy, percentage of composite events processed successfully at the sink, and the average number of hops to reach the sink. 展开更多
关键词 composite events distributed algorithm energy efficiency event-based clustering Internet of Things mobile sink wireless sensor networks
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部