Professional Documents
Culture Documents
Wireless IoT Monitoring System in Hong KongZhuhaiMacao Bridge and Edge Computing For Anomaly Detection
Wireless IoT Monitoring System in Hong KongZhuhaiMacao Bridge and Edge Computing For Anomaly Detection
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2
and producers. Leveraging edge computing, some data pseudo-labels in source-free domain adaptation [30].
processing tasks are directly performed locally instead of In the context of edge computing, conducting source-free
sending requests and receiving contents from the cloud. As a domain adaptation for the anomaly detection of SHM data is of
result, the data transmission time and network complexity are great significance. The knowledge learned from other bridges
significantly reduced. AI algorithms can be embedded into the (i.e., source data) can be transferred to the target bridge for
edge devices to help pre-clean measurement data and detect the decision making. Only the model pre-trained source data need
anomalies. However, the supervised AI methods require to be stored in edge devices, without accessing the source data.
sufficient labeled data for model training, which is difficult for However, the research on this topic is currently lacking.
most engineering problems [16][17]. This study designs a novel wireless IoT SHM system for the
In application to civil engineering problems with limited and 55-km-long Hong Kong–Zhuhai–Macao Bridge (HZMB),
precious labeled data, performing cross-domain model transfer which is the longest sea-crossing bridge worldwide. Edge
in training AI models has been a trend [18][19]. The model computing and 5G technology are integrated to overcome the
learned from the labeled source domain can be intelligently data transmission, time synchronization, and data quality
transferred to the target domain through feature distribution control issues encountered in traditional WSNs. A novel data
alignment. The traditional domain adaptation methods require anomaly detection method is developed and embedded into the
the coexistence of source and target domain datasets, wherein edge devices for data pre-processing prior to transmission. The
the source datasets are generally in a large volume. Storing self-knowledge distillation is integrated with the
large amounts of source data is space-intensive and not self-supervised learning in the developed method to mitigate
cost-effective for the edge devices [20]. In addition, training AI overconfident pseudo-label predictions and improve model
models jointly with source and target datasets consumes large generalizability.
computational resources. Recently, source-free domain The remainder of this paper is organized as follows. Section
adaptation algorithms have been developed for computer vision II introduces the wireless IoT system designed for the HZMB.
tasks (e.g., image classification and segmentation) [21][22], Section III describes the developed source-free domain
where the source data are inaccessible during adaptation and adaptation algorithm for SHM data anomaly detection
only the model trained from source data is provided. embedded in the edge device. Section IV applies the proposed
Self-supervision is a main branch in source-free domain method to cross-bridge knowledge transfer and presents the
adaptation. Pseudo labeling [23], mutual information data anomaly detection results of the SHM data from the
maximization [24], entropy minimization [25], and contrastive HZMB. Section V draws the conclusion.
learning strategies [26] have been introduced to aid
self-training. For example, Liang et al. [24] proposed to II. WIRELESS SHM SYSTEM AND EDGE COMPUTING OF THE
maximize the mutual information across domains and applied QINGZHOU BRIDGE
the nearest prototype classifier to improve the accuracy of The HZMB consists of three cable-stayed bridges, a series of
pseudo-labels for self-supervision. Yang et al. [27] developed continuous viaducts, an undersea tunnel and four artificial
the neighborhood clustering regularization strategy to classify islands. The Qingzhou Bridge (Fig. 1), one of the three
target data by promoting label consistency among data with cable-stayed bridges, has a main span of 458 m and a total
high local affinity. Xia et al. [26] developed an adaptive length of 1,150 m. The steel box girder of the bridge is
adversarial network with a contrastive category-wise matching supported by two H-shaped towers, two auxiliary piers, and two
module. The main concern of these studies is to obtain robust transitional piers. The H-shaped tower consists of two concrete
representatives (e.g., pseudo-labels and prototypes) for domain legs, one concrete transom in the lower position, and one steel
adaptation. transom in the shape of a Chinese knot in the upper position
The limited computational capacity and memory space of [31][32].
low-computational microcontrollers (e.g., smartphones and
portable and edge devices) also pose challenges in the
deployment of deep complex AI models. Knowledge
distillation [28] is proposed to train a simplified small network
(i.e., student) to mimic the complex over-parameterized large
network (i.e., teacher) for knowledge transfer. Existing studies
have shown that the performance of student model may even
overpass the teacher model [28]. Recently, the knowledge Fig.1. Configuration of the Qingzhou Bridge
distillation technology has been improved to self-knowledge A. Wireless SHM system
distillation [29], where the model is taught to be its own teacher
A wired SHM system is designed to monitor the bridge’s
and the past predictions are used as soft labels for the next
structural responses at critical locations, environmental factors
prediction to mitigate the model collapse and improve the
(e.g., temperature, wind, humidity, and corrosion), and external
generalizability. Hence, in addition to compressing complex
loads (e.g., traffic) since the bridge opened to the public in 2018.
models, knowledge distillation can be utilized in the
The 3D layout of the wired SHM system is shown in Fig. 2,
self-distillation manner to enhance the accuracy of
which consists of 262 sensors, including hygro-thermometers,
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3
thermometers, anemometers, GPS rovers, accelerometers, One pyranometer facing up measures the direct solar radiation,
liquid leveling systems, displacement transducers, cable whereas the other one facing down measures the reflected solar
tensiometers, strain gauges, corrosion sensors, and reaction radiation from the sea. The thermal images measure the road
dynamometers. All sensors are connected to a central station to surface temperature directly. The system incorporates 5G, edge
store data in the centralized wired SHM system. computing, and efficient DL algorithms to solve data
Hong Kong
communication, time synchronization, decentralized
computing, and data quality control issues. The designed
wireless system can be regarded as a new paradigm for future
wireless SHM systems.
B. IoT paradigm demonstration
WSNs are prone to hardware or communication
Anemometer (4) malfunctions and failures, particularly in harsh environmental
Hygro-Thermometer (11)
Accelerometer (17)
conditions. Additionally, transmitting and synchronizing vast
GPS (3) amounts of data can be arduous in a centralized WSN. To
Liquid Leveling System (24)
Zhuhai Displacement Transducer (4) address these issues, the wireless SHM system for Qingzhou
Cable Tensiometer (24)
Strain Gauge (102)
Bridge incorporates emerging technologies such as 5G and
Thermometer (102) edge computing [33], which help alleviate data transmission
Corrosion Sensor (9)
Reaction Dynamometer (4) and network complexity challenges commonly faced by
Fig.2. Layout of wired sensors of the Qingzhou Bridge traditional wireless SHM systems.
The use of accelerometers serves as an example to illustrate
However, the wired SHM system has certain limitations. The
the full module composition within this advanced system and
primary concern is the high data processing load in the central
its workflow is illustrated in Fig. 4. To be specific, the
server. Besides, the installation and maintenance of wired
components include PCB393B31 accelerometer, HTeC-D3000
sensors are challenging in long-span sea-crossing bridges. For
data acquisition unit, Hongdian Z2 5G gateway, NVIDIA
example, the off-line data processing shows that a small
Xavier NX edge computing board, and Alibaba cloud platform.
number of sensors may be mis-connected to the data acquisition
Particularly, NVIDIA Xavier NX edge computing boards are
unit, causing difficulties in the later analysis results. In addition,
integrated to perform local data processing tasks, promising
the existing SHM system does have pyranometers to measure
data security, reducing data transmission load, and enabling
the solar radiation, which are necessary for obtaining the
timely responses in specific situations. The 5G timing module
temperature distribution of the bridge [31]. Installing and
is connected to each sensor locally to ensure time
connecting new sensors to the current SHM system are costly.
synchronization. Moreover, the adaptation of 5G
With the advances in wireless communication technology,
communication enhances data transmission speed and capacity,
WSNs have been used in some SHM systems with the
due to its low latency and broad bandwidth. All processed data
advantage of being easier in manipulation, more economic and
will be transmitted automatically to a central cloud platform for
efficient than the wired one. Wireless SHM systems can be
evaluation and long-term data storage, which is also more
designed in a decentralized manner, which reduces data
easily scalable and maintainable. Authorized users can
transmission and processing workloads. In this connection, this
configure the edge device remotely from the cloud.
study develops a novel wireless SHM system as a complement
to the above wired system, as displayed in Fig. 3.
Data transmission
Query
Embed
Artificial
Sensor Data acquisition Edge device Intelligence
system
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 4
to the source, reducing latency. This real-time processing using ANSYS, as shown in Fig. 7. The entire FE model consists
capability is crucial for critical applications in the wireless of 520,422 elements and 493,941 nodes. The solid elements are
SHM system, where timely decision-making and intervention used for the steel box girder, the asphalt concrete layer, tower
can prevent potential infrastructure damage or failure. Secondly, legs, lower tower transoms, and piers. The shell elements are
edge computing contributes to lower battery consumption and used for diaphragms, U-ribs, and upper tower transoms. In
bandwidth costs. By handling data processing at the network's particular, SOLID45, SOLID65, and SHELL181 are assigned
edge, the need for continuous data transmission to remote cloud to the solid and shell elements. Detailed information about the
servers is significantly reduced. This results in decreased power FE model is given in [31][32]. The first five frequencies and
usage and a more efficient utilization of available bandwidth, mode shapes of the FE model are calculated, and compared
ultimately leading to cost savings. Additionally, edge with the measured ones in Table I. The measured frequencies
computing enhances data safety and privacy. Localized data are very similar to the FE model analysis results, verifying the
processing minimizes the risk of data breaches or interception accuracy of the FE model and validating the serviceability and
during transmission, ensuring that sensitive information effectiveness of the designed wireless SHM system.
remains secure. The successful implementation of intelligent
edge computing in the Qingzhou Bridge's wireless SHM
system can be attributed to the NVIDIA Xavier NX, a widely
popular edge computing device for machine learning
applications. Its powerful processing capabilities, energy
efficiency, and compact design make it an ideal choice for
integrating advanced analytics and real-time monitoring into
the SHM system, ultimately contributing to the overall safety
and reliability of the bridge infrastructure.
C. Monitoring data and structural analysis
Structural vibration characteristics including frequencies and
mode shapes are widely used in SHM problems [34]. For
example, changes in the frequencies or mode shapes of a
structure before and after the damage occurs can be used to
Fig. 5. One-hour acceleration data from Sensors ACC1X and ACG1X
locate and quantity the damage [35]. They can also be used to
verify the accuracy of the numerical finite element model. If the
model is inaccurate, its frequencies and mode shapes may differ
from the measured counterparts. The model then needs to be
updated so that its frequencies and mode shapes match the
measures ones in an optimal manner. This technique is referred
to as model updating [36].
The modal analysis is conducted using the ARTeMIS Modal
Pro software based on the measurement data. Fig. 5 shows
one-hour time-domain acceleration data from the wireless
monitoring system. The frequency domain decomposition
method is used to calculate the spectral density matrix of the
measured acceleration data. Afterward, the singular value Fig. 6. Spectrum analysis based on acceleration data
decomposition is performed on the spectral density matrix to
approximately decompose the acceleration response into a set
of independent single-degree-of-freedom systems. The
self-spectral density of these single-degree-of-freedom systems
are calculated in the modal coordinates. The peaks in the
spectral density correspond to the natural vibration frequencies
of the structure, and the corresponding eigenvectors represent
structural vibration mode shapes. The spectral analysis result is
shown in Fig. 6. The peaks are distinct and significant, which
indicates the high quality of measurement data. The first five
frequencies and mode shapes are then estimated and shown in
Table I.
The modal analysis results are further compared with the
counterparts calculated from the finite element (FE) model. The Fig. 7. Refined FE model of the Qingzhou Bridge
3D refined FE model of the Qingzhou Bridge is established
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 5
TABLE I
MODAL ANALYSIS AND COMPARISON
Resources First five modes
Analysis
based on
monitoring
data
(1) 0.269 Hz (2) 0.372Hz (3) 0.497 Hz (4) 0.577 Hz (5) 0.644 Hz
Analysis
based on
the FE
model
(1) 0.266 Hz (2) 0.379Hz (3) 0.446 Hz (4) 0.580 Hz (5) 0.648 Hz
as
III. EDGE COMPUTING FOR DATA ANOMALY DETECTION 𝐾
The measurement data may inevitably suffer from noise and ℒ𝑠𝑟𝑐 = −𝔼𝑥𝑠 𝜖𝑋𝑠 ∑ 𝑦𝑘 log 𝜎𝑘 (𝜙𝑠 (𝑥𝑠 )) (1)
anomalies. Based on the designed new wireless system, AI 𝑘=1
algorithms are embedded into the NVIDIA edge computing where 𝜙𝑠 (𝑥𝑠 ) = ℎ𝑠 (𝑓𝑠 (𝑥𝑠 )) is the output of network, 𝜎(∙)
board to detect data anomalies caused by sensor faults. denotes the softmax processing, 𝜎𝑘 (𝑧) = 𝑒 𝑧𝑘 ⁄∑𝐾 𝑧𝑖
𝑖=1 𝑒 denotes
Afterward, only data of good quality will be transmitted to the the kth element in the softmax output of a K-dimensional vector
central server. z, and 𝑦𝑘 is the one-of-K encoding vector where the kth element
In the context of edge computing, this study develops a equals 1 and the rest are all 0. However, such a training manner
source-free domain adaptation method for data anomaly makes the network prone to overfitting and shows weak
detection, which transfers the AI model trained from the other adaptation performance in cross-domain tasks. To address this
bridge with sufficient labeled data to the target Qingzhou issue, the label-smoothing technique [24] is introduced to
Bridge without any labeled data. The method mitigates the improve the model generalizability in down-scaling tasks and
problem of lacking labeled data in the traditional supervised further facilitate the source-free domain adaptation as specified
training and avoids the requirement of pre-storing source data later. Specifically, the original cross-entropy function is
in the edge computing in the traditional domain adaptation. The modified to add a uniform distribution 1/K over the
framework of the developed method is illustrated in Fig. 8. ground-truth one-hot label 𝑦𝑘 . The cross-entropy loss is then
Specific techniques are outlined in the following sections to aid calculated between the modified target label 𝑦̂𝑘 and network’s
the domain adaptation in the situation that source domain data softmax output as
𝐾
are unavailable.
𝑙𝑠
Source Bridge (Labeled) Feature extractor Classifier
ℒ𝑠𝑟𝑐 = −𝔼𝑥𝑠 𝜖𝑋𝑠 ∑ 𝑦̂𝑘 log 𝜎𝑘 (𝜙𝑠 (𝑥𝑠 )) (2)
Resnet-18 𝑘=1
F B C Lce
where 𝑦̂𝑘 = (1 − 𝛼)𝑦𝑘 + 𝛼/𝐾, and 𝛼 is the smoothing factor
C N
... with the default value of 0.1 [23]. The label-smoothing strategy
Initialization encourages the extracted features to be equidistantly and tightly
Lim
Student clustered according to categories [24].
F B
Target Bridge (Unlabeled) C N
C Lkd B. Information maximization for source-free domain
Lsl adaptation
EMA
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 6
Following the idea of adversarial domain adaptation, the where 𝛿(∙,∙) measures the cosine distance between two items,
source and target domain are designed to share the same ‖∙‖2 denotes the L2-norm. In the ith iteration, the class
classifier to help match the feature distributions. That is, the centroids and pseudo-labels are then updated as follows:
classifier for the target domain is directly cloned from the
(𝑖) ∑𝑥 𝜖𝑋 𝜉(𝑦̃𝑡(𝑖−1) = 𝑘) 𝑓̃𝑡 (𝑥𝑡 )
source domain and kept fixed ( ℎ𝑡 = ℎ𝑠 ). Only the feature 𝜇𝑘 = 𝑡 𝑡 (8)
extractor is updated (𝑓𝑡 ≠ 𝑓𝑠 ) during the adaptation. As the ∑𝑥𝑡𝜖𝑋𝑡 𝜉(𝑦̃𝑡(𝑖−1) = 𝑘)
(𝑖)
classifier has been trained to classify the source domain whose (𝑖) 𝑓̃𝑡 (𝑥𝑡 ) ∙ 𝜇𝑘
labels are represented by the one-hot encoding, if the feature 𝑦̃𝑡 = arg min (1 − (𝑖)
) (9)
𝑘 ‖𝑓̃𝑡 (𝑥𝑡 )‖2 ‖𝜇𝑘 ‖2
distributions of the source and target domains have been
matched, the predicted labels of the target domain should be where 𝜉(∙) is an indicator that equals 1 when the argument is
close to one-hot encoding and discriminative across different true. Eqs. (3) and (4) are iterated for multiple rounds. With the
classes. In corresponding, the loss function ℒ𝑖𝑚 consists of two self-estimated pseudo-labels, the loss function is given by:
𝐾
items, ℒ𝑒𝑛𝑡 and ℒ𝑑𝑖𝑣 . Minimizing ℒ𝑒𝑛𝑡 impels the softmax
output to approach the one-hot encoding label, and minimizing ℒ𝑠𝑙 = −𝔼𝑥𝑡 𝜖𝑋𝑡 ∑ 𝑦̃𝑡 log 𝜎𝑘 (𝜙𝑡 (𝑥𝑡 )) (10)
ℒ𝑑𝑖𝑣 promotes the diversity of the predicted labels. The loss 𝑘=1
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 7
IV. CROSS-BRIDGE MODEL TRANSFER caused by sensor fault, as shown in Fig. 10. The descriptions of
all patterns are specified in Table II. The quantities of each
A. Source bridge
pattern in the source training and test data are given in Table III.
A long-span cable-stayed bridge in China provided by The The training dataset has a total of 28,272 samples and the test
First International Project Competition is used as the source dataset has 26,448 samples in total.
bridge [38], as shown in Fig. 9. The SHM system of the bridge
consists of multiple sensors. Only acceleration data are used in
this study for anomaly detection. The data from a total of 38
channels are used with a sampling frequency of 20 Hz. The
measurement data are divided into hourly segments without
overlapping. One-month data (January 1–31, 2021) are used as
the source training dataset. The data in February 2012
(February 1–29, 2021) are used as a blind dataset to test the
model performance. Fig. 10. Data patterns in the source bridge
TABLE II
DESCRIPTION OF THE ANOMALY PATTERNS
Patterns Descriptions
Normal Data are collected in the normal state of sensors
Missing Data are absent with the magnitude of zero or a fixed value
Minor Data have a quite tiny amplitude relative to the normal data
Outlier One or more outliers appears in the dataset
Fig. 9. Sensor layout of the source bridge Square Data oscillates violently to a fixed magnitude
The entire source training and test dataset contains seven Trend Data are non-stationary with monotonous trend
data patterns, including the normal pattern and six abnormal Drift Data are non-stationary with random drift
patterns (i.e., missing, minor, outlier, square, trend, drift)
TABLE III
SOURCE TRAINING AND TEST DATASET
Datasets Patterns Normal Missing Minor Outlier Square Trend Drift Total
Quantity 13,575 2,942 1,775 527 2,996 5,778 679 28,272
Training
(%) 48.02% 10.41% 6.28% 1.86% 10.60% 20.44% 2.40% 100%
Quantity 12,897 2,967 1,650 331 3,214 4,558 831 26,448
Test
(%) 48.76% 11.22% 6.24% 1.25% 12.15% 17.23% 3.15% 100%
The data samples are converted into grayscale figures and where TP, FP, FN, and TN denote the true positive, false
used as the input to the feature extractor 𝑓𝑠 , which adopts the positive, false negative, and true negative, respectively.
pre-trained ResNet18 model. As the gray image has only one Accuracy represents the correct prediction of the entire datasets.
channel, rather than three channels of RGB images, an For each category, precision and recall are defined, where the
additional convolutional layer with one input channel is added former equals the ratio of correctly predicted positives over all
before the ResNet18 module. Besides, an additional batch positives, and the latter equals the ratio of correctly predicted
normalization layer and a fully connected layer are placed after positives over all samples of this category.
the ResNet18 module, as illustrated in Fig. 8. The classifier ℎ𝑠 The training accuracy over epochs is plotted in Fig. 11(a).
is composed of a fully connected layer and a weight The well-trained model is applied to the blind test dataset for
normalization layer, with the final output size of seven. As performance validation. The confusion matrix of the test
introduced previously, the label-smoothing technique is dataset is plotted in Fig. 11(b). The precision and recall of each
employed to train the model through back-propagation. The category are calculated in Table IV. The precision and recall of
network is updated by using the stochastic gradient descent the outlier and drift patterns are relatively low compared with
with a momentum of 0.9 and weight decay of 10 –3. The learning the rest patterns, which is probably due to the insufficient
rate of the feature extractor and the classifier is set to 10–3 and training samples and muti-pattern anomalies [39]. Nevertheless,
10–2, respectively. The batch size is 76 in the source dataset and the model achieves an acceptable overall accuracy in
the epoch is set to 50. Several indices are used to evaluate the classifying data anomalies. The well-trained model is used in
model performance, which are defined as the following section for domain adaptation.
𝑇𝑃 + 𝑇𝑁 TABLE IV
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (14) CLASSIFICATION RESULTS
𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁 Patterns Normal Missing Minor Outlier Square Trend Drift
𝑇𝑃
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (15) Precision 99.0% 99.8% 94.6% 80.4% 99.7% 97.6% 83.2%
𝑇𝑃 + 𝐹𝑃 Recall 99.3% 99.9% 95.6% 79.5% 98.8% 96.3% 87.1%
𝑇𝑃
𝑅𝑒𝑐𝑎𝑙𝑙 = (16) Accuracy 98%
𝑇𝑃 + 𝐹𝑁
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 8
The missing pattern has both high precision and recall, and the
remaining patterns either have low precision or recall. The
performance of the trained anomaly detection model degrades
when applied to the new bridge.
The proposed source-free domain adaptation method is then
applied. The hyper-parameters in Eq. (13) are set to 𝜆 = 0.3
and 𝛾 = 0.1. The temperature scaling parameter in Eq. (11) is
set to 𝑇 = 2. The epoch is set to 30. The accuracy over epochs
is plotted in Fig. 14. The blue marker denotes the model
(a) accuracy in each epoch. The red marker denotes the accuracy
by further updating the predicted labels using the
self-supervised prototype learning and self-knowledge
distillation. In each epoch, the model parameters remain
unchanged in the step of estimating red marker, but the
obtained pseudo-labels will participate in the model training in
the next epoch, as defined in Eqs. (10) and (12). In general,
self-supervised learning and self-knowledge distillation
improve the accuracy of the obtained labels. After training, the
obtained model is applied to the target datasets, and the results
are shown in Fig. 13(b) and Table VI. Compared with using the
(b)
Fig. 11. Source model training. (a) Accuracy over epochs; (b) Confusion matrix
model trained from source bridge directly, the cross-domain
of source test dataset. adapted model achieves more accurate classification results,
validating the effectiveness of the developed method.
B. Target bridge
The target bridge is the Qingzhou Bridge of the HZMB.
Similar to the source bridge, only the acceleration data are
studied. There are five uniaxial accelerometers and seven
biaxial accelerometers in total, as shown in Fig. 3, resulting in a
total of (5+7×2) = 19 channels. The sampling frequency is 50
Hz. One-month data collected from February 1–28, 2023 are
studied. Similarly, data samples are generated based on the
non-overlapped hourly responses. Data anomalies occur in four
channels only in February, that is, two biaxial accelerometers
installed on the tower. Hence, only acceleration data from these (a)
four channels form the target dataset for data anomaly detection.
Five patterns are plotted in Fig. 12. The specific dataset
information is given in Table V.
(b)
Fig. 13. Confusion matrix of the target dataset. (a) Without adaptation; (b) After
trend drift adaptation.
Fig. 12. Data patterns in the HZMB
TABLE V
TARGET DATASET
Dataset Patterns Normal Missing Outlier Trend Drift Total
Quantity 2,450 57 24 118 39 2,688
Target
Percentage 91.15% 2.12% 0.89% 4.39% 1.45% 100%
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 9
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 10
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3300073
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 11
Authorized licensed use limited to: UNIV OF ALABAMA-TUSCALOOSA. Downloaded on September 15,2023 at 12:03:04 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.