143,650 research outputs found
Industrial implementation of intelligent system techniques for nuclear power plant condition monitoring
As the nuclear power plants within the UK age, there is an increased requirement for condition monitoring to ensure that the plants are still be able to operate safely. This paper describes the novel application of Intelligent Systems (IS) techniques to provide decision support to the condition monitoring of Nuclear Power Plant (NPP) reactor cores within the UK. The resulting system, BETA (British Energy Trace Analysis) is deployed within the UK’s nuclear operator and provides automated decision support for the analysis of refuelling data, a lead indicator of the health of AGR (Advanced Gas-cooled Reactor) nuclear power plant cores. The key contribution of this work is the improvement of existing manual, labour-intensive analysis through the application of IS techniques to provide decision support to NPP reactor core condition monitoring. This enables an existing source of condition monitoring data to be analysed in a rapid and repeatable manner, providing additional information relating to core health on a more regular basis than routine inspection data allows. The application of IS techniques addresses two issues with the existing manual interpretation of the data, namely the limited availability of expertise and the variability of assessment between different experts. Decision support is provided by four applications of intelligent systems techniques. Two instances of a rule-based expert system are deployed, the first to automatically identify key features within the refuelling data and the second to classify specific types of anomaly. Clustering techniques are applied to support the definition of benchmark behaviour, which is used to detect the presence of anomalies within the refuelling data. Finally data mining techniques are used to track the evolution of the normal benchmark behaviour over time. This results in a system that not only provides support for analysing new refuelling events but also provides the platform to allow future events to be analysed. The BETA system has been deployed within the nuclear operator in the UK and is used at both the engineering offices and on station to support the analysis of refuelling events from two AGR stations, with a view to expanding it to the rest of the fleet in the near future
A field study of team working in a new human supervisory control system
This paper presents a case study of an investigation into team behaviour in an energy distribution company. The main aim was to investigate the impact of major changes in the company on system performance, comprising human and technical elements. A socio-technical systems approach was adopted. There were main differences between the teams investigated in the study: the time of year each control room was studied (i.e. summer or winter),the stage of development each team was in (i.e. 10 months), and the team structure (i.e. hierarchical or heterarchical). In all other respects the control rooms were the same: employing the same technology and within the same organization. The main findings were: the teams studied in the winter months were engaged in more `planning’ and `awareness’ type of activities than those studies in the summer months. Newer teams seem to be engaged in more sharing of information than older teams, which maybe indicative of the development process. One of the hierarchical teams was engaged in more `system-driven’ activities than the heterarchical team studied at the same time of year. Finally, in general, the heterarchical team perceived a greater degree of team working culture than its hierarchical counterparts. This applied research project confirms findings from laboratory research and emphasizes the importance of involving ergonomics in the design of team working in human supervisory control
MorphIC: A 65-nm 738k-Synapse/mm Quad-Core Binary-Weight Digital Neuromorphic Processor with Stochastic Spike-Driven Online Learning
Recent trends in the field of neural network accelerators investigate weight
quantization as a means to increase the resource- and power-efficiency of
hardware devices. As full on-chip weight storage is necessary to avoid the high
energy cost of off-chip memory accesses, memory reduction requirements for
weight storage pushed toward the use of binary weights, which were demonstrated
to have a limited accuracy reduction on many applications when
quantization-aware training techniques are used. In parallel, spiking neural
network (SNN) architectures are explored to further reduce power when
processing sparse event-based data streams, while on-chip spike-based online
learning appears as a key feature for applications constrained in power and
resources during the training phase. However, designing power- and
area-efficient spiking neural networks still requires the development of
specific techniques in order to leverage on-chip online learning on binary
weights without compromising the synapse density. In this work, we demonstrate
MorphIC, a quad-core binary-weight digital neuromorphic processor embedding a
stochastic version of the spike-driven synaptic plasticity (S-SDSP) learning
rule and a hierarchical routing fabric for large-scale chip interconnection.
The MorphIC SNN processor embeds a total of 2k leaky integrate-and-fire (LIF)
neurons and more than two million plastic synapses for an active silicon area
of 2.86mm in 65nm CMOS, achieving a high density of 738k synapses/mm.
MorphIC demonstrates an order-of-magnitude improvement in the area-accuracy
tradeoff on the MNIST classification task compared to previously-proposed SNNs,
while having no penalty in the energy-accuracy tradeoff.Comment: This document is the paper as accepted for publication in the IEEE
Transactions on Biomedical Circuits and Systems journal (2019), the
fully-edited paper is available at
https://ieeexplore.ieee.org/document/876400
Mobile Edge Computing Empowers Internet of Things
In this paper, we propose a Mobile Edge Internet of Things (MEIoT)
architecture by leveraging the fiber-wireless access technology, the cloudlet
concept, and the software defined networking framework. The MEIoT architecture
brings computing and storage resources close to Internet of Things (IoT)
devices in order to speed up IoT data sharing and analytics. Specifically, the
IoT devices (belonging to the same user) are associated to a specific proxy
Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes
the IoT data (generated by its IoT devices) in real-time. Moreover, we
introduce the semantic and social IoT technology in the context of MEIoT to
solve the interoperability and inefficient access control problem in the IoT
system. In addition, we propose two dynamic proxy VM migration methods to
minimize the end-to-end delay between proxy VMs and their IoT devices and to
minimize the total on-grid energy consumption of the cloudlets, respectively.
Performance of the proposed methods are validated via extensive simulations
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
- …