2021
DOI: 10.3390/electronics10030302
|View full text |Cite
|
Sign up to set email alerts
|

Edge Computing for Data Anomaly Detection of Multi-Sensors in Underground Mining

Abstract: There is a growing interest in safety warning of underground mining due to the huge threat being faced by those working in underground mining. Data acquisition of sensors based on Internet of Things (IoT) is currently the main method, but the data anomaly detection and analysis of multi-sensors is a challenging task: firstly, the data that are collected by different sensors of underground mining are heterogeneous; secondly, real-time is required for the data anomaly detection of safety warning. Currently, ther… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 31 publications
(50 reference statements)
0
12
0
Order By: Relevance
“…In the sequence, we present a discussion of the main aspects of related works. [21] 2020 Framework ✓ ✓ ✓ PCA, R-PCA Liu et al [8] 2020 Algorithm ✓ ✓ Chi-Square Distance Greco et al [22] 2019 Architecture ✓ ✓ HTM, Node-RED, Flink, Kafka Liu et al [14] proposed an anomaly detection method using K-Means and C-Means over a sliding window, executed on a sink node on the network edge. They monitored multiple sensors in realtime inside an underground mine.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In the sequence, we present a discussion of the main aspects of related works. [21] 2020 Framework ✓ ✓ ✓ PCA, R-PCA Liu et al [8] 2020 Algorithm ✓ ✓ Chi-Square Distance Greco et al [22] 2019 Architecture ✓ ✓ HTM, Node-RED, Flink, Kafka Liu et al [14] proposed an anomaly detection method using K-Means and C-Means over a sliding window, executed on a sink node on the network edge. They monitored multiple sensors in realtime inside an underground mine.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the existing methods to process sensor data rely on cloud architecture and Stream Processing (SP) or Complex Event Processing (CEP) services, bringing some problems to industrial plants [12,13]. Sometimes, companies operating in remote places such as the countryside, offshore or underground do not have reliable and stable Internet access [14]. Usually, IIoT applications execute real-time analysis in product supply chain management, performance evaluation, and simulation [1].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Edge anomaly detection for sensor networks appears in many research areas of the IoT in industrial solutions [ 20 ]. Many traditional clustering methods, such as K-means and C-means have been proposed for data analysis and prediction, but they are not directly useful for IoT applications in underground mining systems.…”
Section: Related Workmentioning
confidence: 99%