期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Adaptive Change Detection for Long-Term Machinery Monitoring Using Incremental Sliding-Window
1
作者 Teng Wang Guo-Liang Lu +1 位作者 Jie Liu Peng Yan 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第6期1338-1346,共9页
Detection of structural changes from an opera- tional process is a major goal in machine condition moni- toring. Existing methods for this purpose are mainly based on retrospective analysis, resulting in a large detec... Detection of structural changes from an opera- tional process is a major goal in machine condition moni- toring. Existing methods for this purpose are mainly based on retrospective analysis, resulting in a large detection delay that limits their usages in real applications. This paper presents a new adaptive real-time change detection algorithm, an extension of the recent research by combin- ing with an incremental sliding-window strategy, to handle the multi-change detection in long-term monitoring of machine operations. In particular, in the framework, Hil- bert space embedding of distribution is used to map the original data into the Re-producing Kernel Hilbert Space (RK_HS) for change detection; then, a new adaptive threshold strategy can be developed when making change decision, in which a global factor (used to control the coarse-to-fine level of detection) is introduced to replace the fixed value of threshold. Through experiments on a range of real testing data which was collected from an experimental rotating machinery system, the excellent detection performances of the algorithm for engineering applications were demonstrated. Compared with state-of- the-art methods, the proposed algorithm can be more suitable for long-term machinery condition monitoring without any manual re-calibration, thus is promising in modern industries. 展开更多
关键词 machine monitoring Change detection Long-term monitoring Adaptive threshold
在线阅读 下载PDF
Leveraging Safe and Secure AI for Predictive Maintenance of Mechanical Devices Using Incremental Learning and Drift Detection
2
作者 Prashanth B.S Manoj Kumar M.V. +1 位作者 Nasser Almuraqab Puneetha B.H 《Computers, Materials & Continua》 2025年第6期4979-4998,共20页
Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical devices.Most of the machine learning models are ... Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical devices.Most of the machine learning models are built on the assumption of a static learning environment,but in practical situations,the data generated by the process is dynamic.This evolution of the data is termed concept drift.This research paper presents an approach for predictingmechanical failure in real-time using incremental learning based on the statistically calculated parameters of mechanical equipment.The method proposed here is applicable to allmechanical devices that are susceptible to failure or operational degradation.The proposed method in this paper is equipped with the capacity to detect the drift in data generation and adaptation.The proposed approach evaluates the machine learning and deep learning models for their efficacy in handling the errors related to industrial machines due to their dynamic nature.It is observed that,in the settings without concept drift in the data,methods like SVM and Random Forest performed better compared to deep neural networks.However,this resulted in poor sensitivity for the smallest drift in the machine data reported as a drift.In this perspective,DNN generated the stable drift detection method;it reported an accuracy of 84%and an AUC of 0.87 while detecting only a single drift point,indicating the stability to performbetter in detecting and adapting to new data in the drifting environments under industrial measurement settings. 展开更多
关键词 Incremental learning drift detection real-time failure prediction deep neural network proactive machine health monitoring
在线阅读 下载PDF
A Web-based machining process monitoring system for E-manufacturing implementation 被引量:2
3
作者 SHIN Bong-cheol KIM Gun-hee +5 位作者 CHOI Jin-hwa JEON Byung-cheol LEE Honghee CHO Myeong-woo HAN Jin-yong PARK Dong-sam 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第9期1467-1473,共7页
Recently, with the rapid growth of information technology, many studies have been performed to implement Web-based manufacturing system. Such technologies are expected to meet the need of many manufacturing industries... Recently, with the rapid growth of information technology, many studies have been performed to implement Web-based manufacturing system. Such technologies are expected to meet the need of many manufacturing industries who want to adopt E-manufacturing system for the construction of globalization, agility, and digitalization to cope with the rapid changing market requirements. In this research, a real-time Web-based machine tool and machining process monitoring system is developed as the first step for implementing E-manufacturing system. In this system, the current variations of the main spindle and feeding motors are measured using hall sensors. And the relationship between the cutting force and the spindle motor RMS (Root Mean Square) current at various spindle rotational speeds is obtained. Thermocouples are used to measure temperature variations of important heat sources of a machine tool. Also, a rule-based expert system is applied in order to decide the machining process and machine tool are in normal conditions. Finally, the effectiveness of the developed system is verified through a series of experiments. 展开更多
关键词 E-MANUFACTURING Web-based system INTERNET Machining process monitoring Expert system
在线阅读 下载PDF
Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing 被引量:2
4
作者 HUANG Qiang SHEN Changxiang FANG Yanxiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期13-16,共4页
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM... With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 展开更多
关键词 trusted computing virtual machine monitor(VMM) separation kernel trusted computing base (TCB)
在线阅读 下载PDF
Deep-water Riser Fatigue Monitoring Systems Based on Acoustic Telemetry 被引量:5
5
作者 LI Baojun WANG Haiyan +3 位作者 SHEN Xiaohong YAN Yongsheng YANG Fuzhou HUA Fei 《Journal of Ocean University of China》 SCIE CAS 2014年第6期951-956,共6页
Marine risers play a key role in the deep and ultra-deep water oil and gas production. The vortex-induced vibration (VIV) of marine risers constitutes an important problem in deep water oil exploration and productio... Marine risers play a key role in the deep and ultra-deep water oil and gas production. The vortex-induced vibration (VIV) of marine risers constitutes an important problem in deep water oil exploration and production. VIV will result in high rates of structural failure of marine riser due to fatigue damage accumulation and diminishes the riser fatigue life. In-service monitoring or full scale testing is essential to improve our understanding of V1V response and enhance our ability to predict fatigue damage. One ma- rine riser fatigue acoustic telemetry scheme is proposed and an engineering prototype machine has been developed to monitor deep and ultra-deep water risers' fatigue and failure that can diminish the riser fatigue life and lead to economic losses and eco-catastrophe. Many breakthroughs and innovation have been achieved in the process of developing an engineering prototype machine. Sea trials were done on the 6th generation deep-water drilling platform HYSY-981 in the South China Sea. The inclination monitoring results show that the marine riser fatigue acoustic telemetry scheme is feasible and reliable and the engineering prototype machine meets the design criterion and can match the requirements of deep and ultra-deep water riser fatigue monitoring. The rich experience and field data gained in the sea trial which provide much technical support for optimization in the engineering prototype machine in the future. 展开更多
关键词 marine riser fatigue monitoring engineering prototype machine underwater telemetry
在线阅读 下载PDF
Multiple attacks on virtualization-based security monitoring
6
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 VIRTUALIZATION VULNERABILITY attack method security threat virtual machine monitor
在线阅读 下载PDF
State of the Art Vibration Analysis of Electrical Rotating Machines
7
作者 Israr Ullah Naeem Arbab Waheed Gul 《Journal of Electrical Engineering》 2017年第2期84-99,共16页
Electrical machines are precarious mechanisms in manufacturing practices. A motor failure may yield an unexpected interruption at the industrial plant, with consequences in costs, product quality, and security. To gov... Electrical machines are precarious mechanisms in manufacturing practices. A motor failure may yield an unexpected interruption at the industrial plant, with consequences in costs, product quality, and security. To govern the conditions of each part of motor, various testing and monitoring methods have been developed. In this paper, a review on effective fault indicators and vibration based condition monitoring approaches of rotating electrical machines has been accomplished. The determination of the review is to progress the understanding of vibration based analysis, and its use in the Machine Health Monitoring. A variety of analysis was identified to highlight the concept of predictive maintenance in industries. The techniques of vibration analysis were investigated to detect both healthy and fault related signals of rotating machineries. 展开更多
关键词 machine health monitoring vibration analysis time domain frequency domain
在线阅读 下载PDF
Research on Pick-up Feature of ESP Recording Charts Based on Bitmap Images 被引量:5
8
作者 Feng Ding Tu Yiliu +1 位作者 Zhu Hongwu Xue Dunsong 《Petroleum Science》 SCIE CAS CSCD 2005年第3期5-10,共6页
During the oil production, in order to monitor the working conditions of an electrical submersible pump (ESP),an electrical current recorder is used to monitor the electric motor current of an ESP. The recorder char... During the oil production, in order to monitor the working conditions of an electrical submersible pump (ESP),an electrical current recorder is used to monitor the electric motor current of an ESP. The recorder charts indicate various working conditions of the ESP. Subtle malfunctions or abnormal problems of the ESP can be detected and further analyzed from various features of these current curves on the recording charts. Presently, these current charts are manually read and analyzed in oil fields. In this paper, a diagnosis expert system is presented for automatically analyzing these current recording charts and identifying the working condition of the ESP. This expert system includes an open knowledge base, which can be updated or enriched according to the identified features of the current curves on the recording charts, and a condition monitoring and failure pattern recognition method, which is called "pick-up method of feature of the recording chart", and can be correctly applied in most cases. It has been shown that this expert system can effectively improve the accuracy and efficiency of failure diagnosis and working condition monitoring of ESPs. 展开更多
关键词 Electrical submersible pump expert system fault diagnosis machine condition monitoring patternidentification or recognition
原文传递
Detecting Hidden Malware Method Based on "In-VM" Model 被引量:2
9
作者 陈林 刘波 +2 位作者 胡华平 肖枫涛 张静 《China Communications》 SCIE CSCD 2011年第4期99-108,共10页
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and... Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. 展开更多
关键词 network security Virtual machine Monitor(VMM) malware detection hidden process hardware virtualization
在线阅读 下载PDF
Prototype for logging system calls and its overhead analysis
10
作者 Meng Jiangtao Lu Xianliang Dong Guishan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期661-666,F0003,共7页
With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the vip operating system runs on the virtual machine monitor as non-privileged mode. The... With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the vip operating system runs on the virtual machine monitor as non-privileged mode. The redirecting and monitoring modules are added into the virtual machine monitor. When a vip application is calling a system call, it is trapped and redirected from the least privileged level into the virtual machine monitor running in the most privileged level. After logging is finished. it returns to the vip operating system running in the more privileged level and starts the system call. Compared with the traditional methods for logging system activities, the novel method makes it more difficult to destroy or tamper the logs. The preliminary evaluation shows that the prototype is simple and efficient. 展开更多
关键词 virtual machine monitor virtual monitor XEN vip operating system hyper call system call.
在线阅读 下载PDF
The Influence of Training Quality on the Performance of Neural Networks 被引量:1
11
作者 Jiang Lin Qu Liangsheng Chen Tao Institute of Diagnostics & Cybernetics Xi′an Jiaotong University, Xi′an, 710049, P.R.China 《International Journal of Plant Engineering and Management》 1996年第1期29-37,共9页
This paper analyses the error sources in neural network prediction. The relationship between prediction error and quality of training sets is revealed. The influence of quality of training sets on the performance of a... This paper analyses the error sources in neural network prediction. The relationship between prediction error and quality of training sets is revealed. The influence of quality of training sets on the performance of an artificial neural network(ANN) applied in time series prediction is discussed. A numerical criterion called degree of consistency(DCT) defined from the statistical point of view for evaluating quality of training sets is introduced. Some simulation results and corresponding suggestions are presented along with the new criterion in order to properly select the training sets for neural network training. 展开更多
关键词 Artificial Neural network PREDICTION Pseudodistance machine condition monitoring
在线阅读 下载PDF
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture 被引量:4
12
作者 Yuehua DAI Yi SHI Yong QI Jianbao REN Peijian WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第1期34-43,共10页
Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the... Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the interface be- tween OS and VMM complex. This results in a code base that is very hard to verify the security of the VMM. For exam- ple, a misuse of a VMM hyper-call by a malicious vip OS can corrupt the whole VMM. The complexity of the VMM also makes it hard to formally verify the correctness of the system's behavior. In this paper a new VMM, operating sys- tem virtualization (OSV), is proposed. The multiprocessor boot interface and memory configuration interface are virtu- alized in OSV at boot time in the Linux kernel. After booting, only inter-processor interrupt operations are intercepted by OSV, which makes the interface between OSV and OS sim- ple. The interface is verified using formal model checking, which ensures a malicious OS cannot attack OSV through the interface. Currently, OSV is implemented based on the AMD Opteron multi-core server architecture. Evaluation re- sults show that Linux running on OSV has a similar perfor- mance to native Linux. OSV has a performance improvement of 4%-13% over Xen. 展开更多
关键词 virtual machine monitor model operating sys tem many core formal verification
原文传递
Learning from the crowd:Road infrastructure monitoring system 被引量:2
13
作者 Johannes Masino Jakob Thumm +1 位作者 Michael Frey Frank Gauterin 《Journal of Traffic and Transportation Engineering(English Edition)》 2017年第5期451-463,共13页
The condition of the road infrastructure has severe impacts on the road safety, driving comfort, and on the rolling resistance. Therefore, the road infrastructure must be moni- tored comprehensively and in regular int... The condition of the road infrastructure has severe impacts on the road safety, driving comfort, and on the rolling resistance. Therefore, the road infrastructure must be moni- tored comprehensively and in regular intervals to identify damaged road segments and road hazards. Methods have been developed to comprehensively and automatically digitize the road infrastructure and estimate the road quality, which are based on vehicle sensors and a supervised machine learning classification. Since different types of vehicles have various suspension systems with different response functions, one classifier cannot be taken over to other vehicles. Usually, a high amount of time is needed to acquire training data for each individual vehicle and classifier. To address this problem, the methods to collect training data automatically for new vehicles based on the comparison of trajectories of untrained and trained vehicles have been developed. The results show that the method based on a k-dimensional tree and Euclidean distance performs best and is robust in transferring the information of the road surface from one vehicle to another. Furthermore, this method offers the possibility to merge the output and road infrastructure information from multiple vehicles to enable a more robust and precise prediction of the ground truth. 展开更多
关键词 Road infrastructure condition monitoring Tree graphs Euclidean distance machine learning Classification
原文传递
Dynamic cache partitioning based on hot page migration 被引量:2
14
作者 Xiaolin WANG Xiang WEN +3 位作者 Yechen LI Zhenlin WANG Yingwei LUO Xiaoming LI 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第4期363-372,共10页
Static cache partitioning can reduce inter- application cache interference and improve the composite performance of a cache-polluted application and a cache- sensitive application when they run on cores that share the... Static cache partitioning can reduce inter- application cache interference and improve the composite performance of a cache-polluted application and a cache- sensitive application when they run on cores that share the last level cache in the same multi-core processor. In a virtu- alized system, since different applications might run on dif- ferent virtual machines (VMs) in different time, it is inappli- cable to partition the cache statically in advance. This paper proposes a dynamic cache partitioning scheme that makes use of hot page detection and page migration to improve the com- posite performance of co-hosted virtual machines dynami- cally according to prior knowledge of cache-sensitive appli- cations. Experimental results show that the overhead of our page migration scheme is low, while in most cases, the com- posite performance is an improvement over free composition. 展开更多
关键词 cache partitioning hot page migration dynamic cache partitioning VIRTUALIZATION virtual machine monitor
原文传递
Optimizations for High Performance Network Virtualization 被引量:2
15
作者 Fan-Fu Zhou Ru-Hui Ma Jian Li Li-Xia Chen Wei-Dong Qiu Hai-Bing Guan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第1期107-116,共10页
The increasing requirements of intensive interoperaterbility among the distributed nodes desiderate the high performance network connections, owing to the substantial growth of cloud computing and datacenters. Network... The increasing requirements of intensive interoperaterbility among the distributed nodes desiderate the high performance network connections, owing to the substantial growth of cloud computing and datacenters. Network I/O virtualization aggregates the network resource and separates it into manageable parts for particular servers or devices, which provides effective consolidation and elastic management with high agility, flexibility and scalability as well as reduced cost and cabling. However, both network I/O virtualization aggregation and the increasing network speed incur higher traffic density, which generates a heavy system stress for I/O data moving and I/O event processing. Consequently, many researchers have dedicated to enhancing the system performance and alleviating the system overhead for high performance networking virtualizatiou. This paper first elaborates the mainstreaming I/O virtualization methodologies, including device emulation, split-driver model and hardware assisted model. Then, the paper discusses and compares their specific advantages in addition to performance bottlenecks in practical utilities. This paper mainly focuses on the comprehensive survey of state- of-the-art approaches for performance optimizations and improvements as well as the portability management for network I/O virtualization. The approaches include various novel data delivery schemes, overhead mitigations for interrupt processing and adequate resource allocations for dynamic network states. Finally, we highlight the diversity of I/O virtualization besides the performance improvements in network virtualization infrastructure. 展开更多
关键词 network virtualization single root I/O virtualization (SR-IOV) virtual machine monitor (VMM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部