2020
DOI: 10.1002/stc.2623
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical outlier detection approach for online distributed structural identification

Abstract: In this paper, a hierarchical outlier detection approach is proposed for online distributed structural identification. In contrast to centralized identification, distributed identification extracts important features from the raw response data at the sensor nodes and transmits only them to the base station. Therefore, outlier detection is substantially more complicated than the traditional approach. In the proposed method, the local outliers in the raw data are detected directly at the corresponding sensor nod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 57 publications
0
11
0
Order By: Relevance
“…At the same time, it does not rely on annotated datasets, which contributes to the promotion and production application of network anomaly detection model greatly. At the same time, CRND can be widely used as a feature extractor, which may be better used to solve the target problem when combined with the related research of outlier detection [38,39].…”
Section: Discussionmentioning
confidence: 99%
“…At the same time, it does not rely on annotated datasets, which contributes to the promotion and production application of network anomaly detection model greatly. At the same time, CRND can be widely used as a feature extractor, which may be better used to solve the target problem when combined with the related research of outlier detection [38,39].…”
Section: Discussionmentioning
confidence: 99%
“…An efficient, stand-alone and autonomous SHM algorithm should therefore be designed for localizing and isolating a faulty sensor at its time of occurrence and still continues with the damage estimation, undeterred by the fault. Faulty sensor data may also arise due to the presence of outliers in the measured data, for which outlier probability for detection can be utilized [21,22]. However present study focuses on faulty measurement data obtained following before-mentioned reasons only.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As a result, the algorithm shifted to level II for finer localization of the faulty sensors in the 2nd group. The possible combinations of the sensors in the 2nd sensor group were denoted as (4), ( 5), ( 6), (4,5), (4,6), (5,6), and (4,5,6), and they corresponded to the model classes M 2, j ð Þ , j ¼ 1, 2,…, 7 in level II, respectively. During the time period from t ¼ 51:015 s to t ¼ 52:29 s, it is seen that the model class M 2,6 ð Þ had the highest plausibility (Figure 7c), so the faulty sensors in the 2nd group could be located at the 5th and 6th sensors.…”
Section: Group Numbermentioning
confidence: 99%
“…It involves the observation and analysis of a structural system over time using sampled response measurements, so that changes of the material and geometric properties for engineering structures can be monitored. SHM contains various research topics, such as optimal sensor placement, 1,2 data cleansing, 3,4 structural model updating, [5][6][7][8] structural damage evaluation, [9][10][11] input identification, [12][13][14] and uncertainty quantification. 15,16 Among various SHM techniques, online structural identification is regarded as one of the most desirable approaches to assess the health status of the structure, since it can track the structural states promptly.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation