45 research outputs found

    Adaptive Multiscale Weighted Permutation Entropy for Rolling Bearing Fault Diagnosis

    Get PDF
    © 2020 The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.Bearing vibration signals contain non-linear and non-stationary features due to instantaneous variations in the operation of rotating machinery. It is important to characterize and analyze the complexity change of the bearing vibration signals so that bearing health conditions can be accurately identified. Entropy measures are non-linear indicators that are applicable to the time series complexity analysis for machine fault diagnosis. In this paper, an improved entropy measure, termed Adaptive Multiscale Weighted Permutation Entropy (AMWPE), is proposed. Then, a new rolling bearing fault diagnosis method is developed based on the AMWPE and multi-class SVM. For comparison, experimental bearing data are analyzed using the AMWPE, compared with the conventional entropy measures, where a multi-class SVM is adopted for fault type classification. Moreover, the robustness of different entropy measures is further studied for the analysis of noisy signals with various Signal-to-Noise Ratios (SNRs). The experimental results have demonstrated the effectiveness of the proposed method in fault diagnosis of rolling bearing under different fault types, severity degrees, and SNR levels.Peer reviewedFinal Accepted Versio

    MAHIVE: Modular Analysis Hierarchical Intrusion Detection System Visualization Event Cybersecurity Engine for Cyber-Physical Systems and Internet of Things Devices

    Get PDF
    Cyber-Physical Systems (CPS), including Industrial Control Systems (ICS) and Industrial Internet of Things (IIoT) networks, have become critical to our national infrastructure. The increased occurrence of cyber-attacks on these systems and the potential for catastrophic losses illustrates the critical need to ensure our CPS and ICS are properly monitored and secured with a multi-pronged approach of prevention, detection, deterrence, and recovery. Traditional Intrusion Detection Systems (IDS) and Intrusion Detection and Prevention Systems (IDPS) lack features that would make them well-suited for CPS and ICS environments. We report on the initial results for MAHIVE: Modular Analysis Hierarchical IDS Visualization Event cybersecurity engine. MAHIVE differs from traditional IDS in that it was specifically designed and developed for CPS, ICS, a IIoT systems and networks. We describe the MAHIVE architecture, the design, and the results of our evaluation using two ICS testbed penetration testing experiments

    A survey on fault diagnosis in wireless sensor networks

    Get PDF
    Wireless sensor networks (WSNs) often consist of hundreds of sensor nodes that may be deployed in relatively harsh and complex environments. In views of hardware cost, sensor nodes always adopt relatively cheap chips, which makes these nodes become error-prone or faulty in the course of their operation. Natural factors and electromagnetic interference could also influence the performance of the WSNs. When sensor nodes become faulty, they may have died which means they cannot communicate with other members in the wireless network, they may be still alive but produce incorrect data, they may be unstable jumping between normal state and faulty state. To improve data quality, shorten response time, strengthen network security, and prolong network lifespan, many studies have focused on fault diagnosis. This survey paper classifies fault diagnosis methods in recent five years into three categories based on decision centers and key attributes of employed algorithms: centralized approaches, distributed approaches, and hybrid approaches. As all these studies have specific goals and limitations, this paper tries to compare them, lists their merits and limits, and propose potential research directions based on established methods and theories

    Gafor : Genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks

    Get PDF
    Acknowledgments: The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing. Funding: This research was funded by King Saud University in 2020.Peer reviewedPublisher PD

    EVALUATION OF DYNAMIC AD-HOC UWB INDOOR POSITIONING SYSTEM

    Get PDF
    Ultra-wideband (UWB) technology has witnessed tremendous development and advancement in the past few years. Currently available UWB transceivers can provide high-precision time-of-flight measurements which corresponds to range measurements with theoretical accuracy of few centimetres. Position estimation using range measurement is determined by measuring the ranges from a rover or a dynamic node, to a set of anchor points with known positions. However, building a flexible and accurate indoor positioning system requires more than just accurate range measurements. The performance of indoor positioning system is affected by the number and the configuration of the anchor points used, along with the accuracy of the anchor positions.This paper introduces LocSpeck, a dynamic ad-hoc positioning system based on the DW1000 UWB transceiver from Decawave. LocSpeck is composed of a set of identical nodes communicating on a common RF channel, forming a fully or partially connected network where the positioning algorithm run on each node. Each LocSpeck node could act as an anchor or a rover, and the role could change dynamically during the same session. The number of nodes in the network could change dynamically, since the firmware of LocSpeck supports adding and removing nodes on-the-fly. The paper compares the performance of the LocSpeck system with commercially available off-the-shelf UWB positioning system. Different operating scenarios are considered when evaluating the performance of the system, including cases where collaboration between the two systems is considered.</p

    Towards the Digital Twin (DT) of narrow-band Internet of Things (NBIoT) wireless communication in industrial indoor environment

    Get PDF
    A study of the behavior of NB-IoT wireless communication in an industrial indoor environment was conducted in this paper. With Wireless Insite software, a scenario in the industrial sector was simulated and modeled. Our research examined how this scenario or environment affected the communication parameters of NB-IoT’s physical layer. In this context, throughput levels among terminals as well as between terminals and transceiver towers, the power received at signal destination points, signal-to-noise ratios (SNRs) in the environment, and distances between terminals and transceivers are considered. These simulated results are also compared with the calculated or theoretical values of these parameters. The results show the effect of the industrial setting on wireless communication. The differences between the theoretical and simulated values are also established

    Design for energy-efficient and reliable fog-assisted healthcare IoT systems

    Get PDF
    Cardiovascular disease and diabetes are two of the most dangerous diseases as they are the leading causes of death in all ages. Unfortunately, they cannot be completely cured with the current knowledge and existing technologies. However, they can be effectively managed by applying methods of continuous health monitoring. Nonetheless, it is difficult to achieve a high quality of healthcare with the current health monitoring systems which often have several limitations such as non-mobility support, energy inefficiency, and an insufficiency of advanced services. Therefore, this thesis presents a Fog computing approach focusing on four main tracks, and proposes it as a solution to the existing limitations. In the first track, the main goal is to introduce Fog computing and Fog services into remote health monitoring systems in order to enhance the quality of healthcare. In the second track, a Fog approach providing mobility support in a real-time health monitoring IoT system is proposed. The handover mechanism run by Fog-assisted smart gateways helps to maintain the connection between sensor nodes and the gateways with a minimized latency. Results show that the handover latency of the proposed Fog approach is 10%-50% less than other state-of-the-art mobility support approaches. In the third track, the designs of four energy-efficient health monitoring IoT systems are discussed and developed. Each energy-efficient system and its sensor nodes are designed to serve a specific purpose such as glucose monitoring, ECG monitoring, or fall detection; with the exception of the fourth system which is an advanced and combined system for simultaneously monitoring many diseases such as diabetes and cardiovascular disease. Results show that these sensor nodes can continuously work, depending on the application, up to 70-155 hours when using a 1000 mAh lithium battery. The fourth track mentioned above, provides a Fog-assisted remote health monitoring IoT system for diabetic patients with cardiovascular disease. Via several proposed algorithms such as QT interval extraction, activity status categorization, and fall detection algorithms, the system can process data and detect abnormalities in real-time. Results show that the proposed system using Fog services is a promising approach for improving the treatment of diabetic patients with cardiovascular disease

    Trust management techniques for the internet of things: A survey

    Get PDF
    A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be leveraged for entertainment, security, and most importantly user trust. Yet, trust is an imperative obstruction that may hinder the IoT growth and even delay the substantial squeeze of a number of applications. In this survey, an extensive analysis of trust management techniques along with their pros and cons is presented in a different context. In comparison with other surveys, the goal is to provide a systematic description of the most relevant trust management techniques to help researchers understand that how various systems fit together to bring preferred functionalities without examining different standards. Besides, the lessons learned are presented, and the views are argued regarding the primary goal trust which is likely to play in the future Internet. 2018 IEEE.This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-01411, A Micro-Service IoTWare Framework Technology Development for Ultra small IoT Device).Scopus2-s2.0-8506427487
    corecore