1,955 research outputs found

    An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things

    Get PDF
    Pipelines are the safest tools for transporting oil and gas. However, the environmental effects and sabotage of hostile people cause corrosion and decay of pipelines, which bring financial and environmental damages. Today, new technologies such as the Internet of Things (IoT) and wireless sensor networks (WSNs) can provide solutions to monitor and timely detect corrosion of oil pipelines. Coverage is a fundamental challenge in pipeline monitoring systems to timely detect and resolve oil leakage and pipeline corrosion. To ensure appropriate coverage on pipeline monitoring systems, one solution is to design a scheduling mechanism for nodes to reduce energy consumption. In this paper, we propose a reinforcement learning-based area coverage technique called CoWSN to intelligently monitor oil and gas pipelines. In CoWSN, the sensing range of each sensor node is converted to a digital matrix to estimate the overlap of this node with other neighboring nodes. Then, a Q-learning-based scheduling mechanism is designed to determine the activity time of sensor nodes based on their overlapping, energy, and distance to the base station. Finally, CoWSN can predict the death time of sensor nodes and replace them at the right time. This work does not allow to be disrupted the data transmission process between sensor nodes and BS. CoWSN is simulated using NS2. Then, our scheme is compared with three area coverage schemes, including the scheme of Rahmani et al., CCM-RL, and CCA according to several parameters, including the average number of active sensor nodes, coverage rate, energy consumption, and network lifetime. The simulation results show that CoWSN has a better performance than other methods

    Road Maintenance through Machine Learning

    Get PDF
    This thesis explores the use of machine learning techniques for road infrastructure maintenance. We propose an innovative machine learning-based approach to improve the efficiency and effectiveness of road maintenance strategies. The focal point of this investigation is the development and implementation of a machine learning framework to enhance road quality monitoring. We use Long Short-Term Memory (LSTM) networks to accurately predict future road conditions and identify potential areas requiring maintenance before significant deterioration occurs. This predictive approach is designed to enable a shift from reactive to proactive road maintenance, optimizing the use of limited resources and improving overall road safety. The methodology of the research is structured in three phases: the creation of a prototype system for road condition data collection, the application of LSTM networks for predictive analysis, and the utilization of optimization techniques to guide effective maintenance decisions. By focusing on predictive accuracy and the strategic allocation of maintenance efforts, the study seeks to extend the lifespan of road infrastructure, reduce maintenance costs, and enhance the driving experience. This thesis is a contribution to the field of road infrastructure maintenance by introducing a predictive maintenance model that leverages advanced machine learning techniques. It aims to transform the traditional maintenance approach, providing a scalable and efficient solution to road infrastructure management challenges, with the potential to significantly influence policy and practice in infrastructure maintenance.KEYWORDS: Machine learning; Infrastructure maintenance; Proactive maintenanc

    Analysis of Security Attacks & Taxonomy in Underwater Wireless Sensor Networks

    Get PDF
    Abstract: Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, open acoustic channel, it's also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and Taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the Taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researcher’s design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues

    Methods for Self-Healing based on traces and unsupervised learning in Self-Organizing Networks

    Get PDF
    With the advent of Long-Term Evolution (LTE) networks and the spread of a highly varied range of services, mobile operators are increasingly aware of the need to strengthen their maintenance and operational tasks in order to ensure a quality and positive user experience. Furthermore, the co- existence of multiple Radio Access Technologies (RAT), the increase in the traffic demand and the need to provide a great variety of services are steering the cellular network toward a new scenario where management tasks are becoming increasingly complex. As a result, mobile operators are focusing their efforts to deal with the maintenance of their networks without increasing either operational expenditures (OPEX) or capital expenditures (CAPEX). In this context, it is becoming necessary to effectively automate the management tasks through the concept of the Self-Organizing Networks (SON). In particular, SON functions cover three different areas: Self-Configuration, Self-Optimization and Self- Healing. Self-Configuration automates the deployment of new network elements and their parameter configuration. Self-Optimization is in charge of modifying the configuration of the parameters in order to enhance user experience. Finally, Self-Healing aims reduce the impact that failures and services degradation have on the end-user. To that end, Self-Healing (SH) systems monitor the network elements through several alarms, measurements and indicators in order to detect outage and degraded cells, then, diagnose the cause of their problem and, finally, execute the compensation or recovery actions. Even though mobile networks are become more prone to failures due to their huge increase in complexity, the automation of the troubleshooting tasks through the SH functionality has not been fully realized. Traditionally, both the research and the development of SON networks have been related to Self-Configuration and Self-Optimization. This has been mainly due to the challenges that need to be faced when SH systems are studied and implemented. This is especially relevant in the case of fault diagnosis. However, mobile operators are paying increasingly more attention to self-healing systems, which entails creating options to face those challenges that allow the development of SH functions. On the one hand, currently, the diagnosis continues to be manually done since it requires considerable hard-earned experience in order to be able to effectively identify the fault cause. In particular, troubleshooting experts thoroughly analyze the performance of the degraded network elements by means of measurements and indicators in order to identify the cause of the detected anomalies and symptoms. Therefore, automating the diagnosis tasks means knowing what specific performance indicators have to be analyzed and how to map the identified symptoms with the associate fault cause. This knowledge is acquired over time and it is characterized by being operator-specific based on their policies and network features. Furthermore, troubleshooting experts typically solve the failures in a network without either documenting the troubleshooting process or recording the analyzed indicators along with the label of the identified fault cause. In addition, because there is no specific regulation on documentation, the few documented faults are neither properly defined nor described in a standard way (e.g. the same fault cause may be appointed with different labels), making it even more difficult to automate the extraction of the expert knowledge. As a result, this a lack of documentation and lack of historical reported faults makes automation of diagnosis process more challenging. On the other hand, when the exact root cause cannot be remotely identified through the statistical information gathered at cell level, drive test are scheduled for further information. These drive tests aim to monitor mobile network performance by using vehicles to personally measure the radio interface quality along a predefined route. In particular, the troubleshooting experts use specialized test equipment in order to manually collect user-level measurements. Consequently, drive test entail a hefty expense for mobile operators, since it involves considerable investment in time and costly resources (such as personal, vehicles and complex test equipment). In this context, the Third Generation Partnership Project (3GPP) has standardized the automatic collection of field measurements (e.g. signaling messages, radio measurements and location information) through the mobile traces features and its extended functionality, the Minimization of Drive Tests (MDT). In particular, those features allow to automatically monitor the network performance in detail, reaching areas that cannot be covered by drive testing (e.g. indoor or private zones). Thus, mobile traces are regarded as an important enabler for SON since they avoid operators to rely on those expensive drive tests while, at the same time, provide greater details than the traditional cell-level indicators. As a result, enhancing the SH functionalities through the mobile traces increases the potential cost savings and the granularity of the analysis. Hence, in this thesis, several solutions are proposed to overcome the limitations that prevent the development of SH with special emphasis on the diagnosis phase. To that end, the lack of historical labeled databases has been addressed in two main ways. First, unsupervised techniques have been used to automatically design diagnosis system from real data without requiring either documentation or historical reports about fault cases. Second, a group of significant faults have been modeled and implemented in a dynamic system level simulator in order to generate an artificial labeled database, which is extremely important in evaluating and comparing the proposed solutions with the state-of- the-art algorithm. Then, the diagnosis of those faults that cannot be identified through the statistical performance indicators gathered at cell level is automated by the analysis of the mobile traces avoiding the costly drive test. In particular, in this thesis, the mobile traces have been used to automatically identify the cause of each unexpected user disconnection, to geo-localize RF problems that affect the cell performance and to identify the impact of a fault depending on the availability of legacy systems (e.g. Third Generation, 3G). Finally, the proposed techniques have been validated using real and simulated LTE data by analyzing its performance and comparing it with reference mechanisms

    Second CLIPS Conference Proceedings, volume 1

    Get PDF
    Topics covered at the 2nd CLIPS Conference held at the Johnson Space Center, September 23-25, 1991 are given. Topics include rule groupings, fault detection using expert systems, decision making using expert systems, knowledge representation, computer aided design and debugging expert systems

    Survey on Additive Manufacturing, Cloud 3D Printing and Services

    Full text link
    Cloud Manufacturing (CM) is the concept of using manufacturing resources in a service oriented way over the Internet. Recent developments in Additive Manufacturing (AM) are making it possible to utilise resources ad-hoc as replacement for traditional manufacturing resources in case of spontaneous problems in the established manufacturing processes. In order to be of use in these scenarios the AM resources must adhere to a strict principle of transparency and service composition in adherence to the Cloud Computing (CC) paradigm. With this review we provide an overview over CM, AM and relevant domains as well as present the historical development of scientific research in these fields, starting from 2002. Part of this work is also a meta-review on the domain to further detail its development and structure

    Nature-inspired survivability: Prey-inspired survivability countermeasures for cloud computing security challenges

    Get PDF
    As cloud computing environments become complex, adversaries have become highly sophisticated and unpredictable. Moreover, they can easily increase attack power and persist longer before detection. Uncertain malicious actions, latent risks, Unobserved or Unobservable risks (UUURs) characterise this new threat domain. This thesis proposes prey-inspired survivability to address unpredictable security challenges borne out of UUURs. While survivability is a well-addressed phenomenon in non-extinct prey animals, applying prey survivability to cloud computing directly is challenging due to contradicting end goals. How to manage evolving survivability goals and requirements under contradicting environmental conditions adds to the challenges. To address these challenges, this thesis proposes a holistic taxonomy which integrate multiple and disparate perspectives of cloud security challenges. In addition, it proposes the TRIZ (Teorija Rezbenija Izobretatelskib Zadach) to derive prey-inspired solutions through resolving contradiction. First, it develops a 3-step process to facilitate interdomain transfer of concepts from nature to cloud. Moreover, TRIZ’s generic approach suggests specific solutions for cloud computing survivability. Then, the thesis presents the conceptual prey-inspired cloud computing survivability framework (Pi-CCSF), built upon TRIZ derived solutions. The framework run-time is pushed to the user-space to support evolving survivability design goals. Furthermore, a target-based decision-making technique (TBDM) is proposed to manage survivability decisions. To evaluate the prey-inspired survivability concept, Pi-CCSF simulator is developed and implemented. Evaluation results shows that escalating survivability actions improve the vitality of vulnerable and compromised virtual machines (VMs) by 5% and dramatically improve their overall survivability. Hypothesis testing conclusively supports the hypothesis that the escalation mechanisms can be applied to enhance the survivability of cloud computing systems. Numeric analysis of TBDM shows that by considering survivability preferences and attitudes (these directly impacts survivability actions), the TBDM method brings unpredictable survivability information closer to decision processes. This enables efficient execution of variable escalating survivability actions, which enables the Pi-CCSF’s decision system (DS) to focus upon decisions that achieve survivability outcomes under unpredictability imposed by UUUR
    • …
    corecore