16,589 research outputs found

    Outlier detection techniques for wireless sensor networks: A survey

    Get PDF
    In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree

    Enhanced PEMS Performance and Regulatory Compliance through Machine Learning

    Get PDF
    Modeling technologies can provide strong support to existing emission management systems, by means of what is known as a Predictive Emission Monitoring System (PEMS). These systems do not measure emissions through any hardware device, but use computer models to predict emission concentrations on the ground of process data (e.g., fuel flow, load) and ambient parameters (e.g., air temperature, relative humidity). They actually represent a relevant application arena for the so-called Inferential Sensor technology which has quickly proved to be invaluable in modern process automation and optimization strategies (Qin et al., 1997; Kadlec et al., 2009). While lots of applications demonstrate that software systems provide accuracy comparable to that of hardware-based Continuous Emission Monitoring Systems (CEMS), virtual analyzers are able to offer additional features and capabilities which are often not properly considered by end-users. Depending on local regulations and constraints, PEMS can be exploited either as primary source of emission monitoring or as a back-up of hardware-based CEMS able to validate analyzersā€™ readings and extend their service factor. PEMS consistency (and therefore its acceptance from environmental authorities) is directly linked to the accuracy and reliability of each parameter used as input of the models. While environmental authorities are steadily opening to PEMS, it is easy to foresee that major recognition and acceptance will be driven by extending PEMS robustness in front of possible sensor failures. Providing reliable instrument fail-over procedures is the main objective of Sensor Validation (SV) strategies. In this work, the capabilities of a class of machine learning algorithms will be presented, showing the results based on tests performed actual field data gathered at a fluid catalytic cracking unit

    Robust recursive eigendecomposition and subspace-based algorithms with application to fault detection in wireless sensor networks

    Get PDF
    The principal component analysis (PCA) is a valuable tool in multivariate statistics, and it is an effective method for fault detection in wireless sensor networks (WSNs) and other related applications. However, its online implementation requires the computation of eigendecomposition (ED) or singular value decomposition. To reduce the arithmetic complexity, we propose an efficient fault detection approach using the subspace tracking concept. In particular, two new robust subspace tracking algorithms are developed, namely, the robust orthonormal projection approximation subspace tracking (OPAST) with rank-1 modification and the robust OPAST with deflation. Both methods rely on robust M-estimate-based recursive covariance estimate to improve the robustness against the effect of faulty samples, and they offer different tradeoff between fault detection accuracy and arithmetic complexity. Since only the ED in the major subspace is computed, their arithmetic complexities are much lower than those of other conventional PCA-based algorithms. Furthermore, we propose new robust T 2 score and SPE detection criteria with recursive update formulas to improve the robustness over their conventional counterparts and to facilitate online implementation for the proposed robust subspace ED and tracking algorithms. Computer simulation and experimental results on WSN data show that the proposed fault detection approach, which combines the aforementioned robust subspace tracking algorithms with the robust detection criteria, is able to achieve better performance than other conventional approaches. Hence, it serves as an attractive alternative to other conventional approaches to fault detection in WSNs and other related applications because of its low complexity, efficient recursive implementation, and good performance. Ā© 2012 IEEE.published_or_final_versio

    An Unsupervised Method for Estimating the Global Horizontal Irradiance from Photovoltaic Power Measurements

    Full text link
    In this paper, we present a method to determine the global horizontal irradiance (GHI) from the power measurements of one or more PV systems, located in the same neighborhood. The method is completely unsupervised and is based on a physical model of a PV plant. The precise assessment of solar irradiance is pivotal for the forecast of the electric power generated by photovoltaic (PV) plants. However, on-ground measurements are expensive and are generally not performed for small and medium-sized PV plants. Satellite-based services represent a valid alternative to on site measurements, but their space-time resolution is limited. Results from two case studies located in Switzerland are presented. The performance of the proposed method at assessing GHI is compared with that of free and commercial satellite services. Our results show that the presented method is generally better than satellite-based services, especially at high temporal resolutions

    Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough

    Get PDF
    Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security architectures are aware of the problem and provide privacy enhancing mechanisms, notably pseudonymous authentication. However, the granularity and the amount of location information IVC protocols divulge, enable an adversary that eavesdrops all traffic throughout an area, to reconstruct long traces of the whereabouts of the majority of vehicles within the same area. Our analysis in this paper confirms the existence of this kind of threat. As a result, it is questionable if strong location privacy is achievable in IVC systems against a powerful adversary.\u

    A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures

    Get PDF
    This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor networks and complex event processing. Even though the deliverableā€™s authors have tried to avoid a too technical language and have tried to explain every concept referred to, the deliverable might seem rather technical to readers so far little familiar with the techniques it describes

    Financing infrastructure

    Get PDF
    A review of the 2010 EIB Conference in Economics and Financeinfrastructure; public investment; corporate investment; investment funds

    Views from the coalface: chemo-sensors, sensor networks and the semantic sensor web

    Get PDF
    Currently millions of sensors are being deployed in sensor networks across the world. These networks generate vast quantities of heterogeneous data across various levels of spatial and temporal granularity. Sensors range from single-point in situ sensors to remote satellite sensors which can cover the globe. The semantic sensor web in principle should allow for the unification of the web with the real-word. In this position paper, we discuss the major challenges to this unification from the perspective of sensor developers (especially chemo-sensors) and integrating sensors data in real-world deployments. These challenges include: (1) identifying the quality of the data; (2) heterogeneity of data sources and data transport methods; (3) integrating data streams from different sources and modalities (esp. contextual information), and (4) pushing intelligence to the sensor level
    • ā€¦
    corecore