Computer Science ›› 2019, Vol. 46 ›› Issue (8): 337-341.doi: 10.11896/j.issn.1002-137X.2019.08.056

• Graphics ,Image & Pattern Recognition • Previous Articles    

Fault Detection Method Based on Immune Homeostasis Mechanism

XIAO Zhen-hua, LIANG Yi-wen, TAN Cheng-yu, ZHOU Wen   

  1. (School of Computer Science,Wuhan University,Wuhan 430072,China)
  • Received:2019-03-08 Online:2019-08-15 Published:2019-08-15

Abstract: In view that the existing DCA (dendritic cell algorithm) relies heavily on domain knowledge and artificial experience defining antigen signals in fault detection application,and a single antigen anomaly evaluation method can’t reflect the overall health condition of system,this paper proposed a fault detection method based on immune homeostasis mechanism-IHDC-FD.First of all,in order to solve problem that the danger signal definition is not explicit in actual application,by introducing body’s immune homeostasis mechanism,the change that breaks the homeostasis is consi-dered to be the danger source of system.Therefore,the method of antigen signal of DC adaptive extraction from the change of system state by numerical differential method is proposed.Secondly,the concentration of specific cells within the tissue is the critical factor that can reflect the health of body,and in order to keep healthy,the body’s immune homeostasis has to be maintained.So,by reference to the activation and suppression mechanism of body’s immune homeostasis,the Th and Ts cell concentration which maintain the immune homeostasis is regarded as the evaluation indicators of system imbalance,and once the system lose balance,a fault occurs.Finally,the performance of our method is tested by using step,random and slow drift faults on TE benchmark.Compared with the original DCA,the results show that IHDC-FD not only improves the adaptability of DCA,but also increases the average of fault detection rate by 9.93%,decreases false alarm rate by 230.4% and decreases delay time by 101.2% on the three types of faults testing.Therefore,the IHDC-FD method based on immune homeostasis mechanism has a large improvement than the original DCA on detection performance and adaptability,and it is effective and generality

Key words: Dendritic cells, Immune homeostasis, Numerical differential, Fault detection

CLC Number: 

  • TP277
[1] TAHAN M,TSOUTSANIS E,MUHAMMAD M,et al.Performance-based health monitoring,diagnostics and prognostics for condition-based maintenance of gas turbines:A review .Applied Energy,2017,198(7):122-144.
[2] WAN Z,JIA M P,LIN Z,et al.Comprehensive overview on computational intelligence techniques for machinery condition monitoring and fault diagnosis .Chinese Journal of Mechanical Engineering,2017,30(4):782-795.
[3] WEN L,LI X Y,GAO L,et al.A new convolutional neural network-based data-driven fault diagnosis method .IEEE Transactions on Industrial Electronics,2018,65(7):5990-5998.
[4] KHAN S,YAIRI T.A review on the application of deep lear- ning in system health management .Mechanical Systems & Signal Processing,2018,107(1):241-265.
[5] KIANG C C,SRINIVASAN R.An artificial immune system for adaptive fault detection,diagnosis and recovery .InternationalJournal of Advances in Engineering Sciences & Applied Mathematics,2012,4(1/2):22-31.
[6] BAYAR N,DARMOUL S,HAJRI-GABOUJ S,et al.Fault detection,diagnosis and recovery using artificial immune systems:A review .Engineering Applications of Artificial Intelligence,2015,46(A):43-57.
[7] SILVA G C,CAMINHAS W M,PALHARES R M.Artificial immune systems applied to fault detection and isolation:A brief review of immune response-based approaches and a case study .Applied Soft Computing,2017,57(8):118-131.
[8] MATZINGER P.Tolerance,danger,and the extended family .Annual Review of Immunology,1994,12(1):991-1045.
[9] GREENSMITH J,AICKELIN U,CAYZE R.Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection [C]∥Proceedings of the 4th International Conference on Artificial Immune Systems.Berlin:Springer,2005:153-167.
[10] GREENSMITH J,GALE M B.The functional dendritic cell algorithm:A formal specification with Haskell [C]∥Proceedings of the 2017 IEEE Congress on Evolutionary Computation.Donostia:IEEE,2017:1787-1794.
[11] LAURENTYS C A,PALHARES R M,CAMINHAS W M.Design of an artificial immune system based on Danger Model for fault detection .Expert Systems with Applications,2010,37(7):5145-5152.
[12] AZZAWI D A,PERHINSCHI M G,MONCAYO H,et al.A dendritic cell mechanism for detection,identification,and evaluation of aircraft failures .Control Engineering Practice,2015,41(8):134-148.
[13] CUI D L,ZHANG Q H,XIONG J B,et al.Fault diagnosis research of rotating machinery based on dendritic cell algorithm [C]∥Proceedings of the 2015 IEEE International Conference on Information and Automation.Lijiang:IEEE,2015:1020-1025.
[14] ALIZADEH E,MESKIN N,KHORASANI K.A dendritic cell immune system inspired scheme for sensor fault detection and isolation of wind turbines .IEEE Transactions on Industrial Informatics,2018,PP(99):1-1.
[15] CHELLY Z,ELOUEDI Z.A survey of the dendritic cell algorithm .Knowledge and Information Systems,2016,48(3):505-535.
[16] TANIGUCHI Y,NNAKATA Y.Mechanism for maintaining homeostasis in the immune system of the intestine .Anticancer Research,2009,29(11):4855-4860.
[17] ACKERMAN J M,HILL S E,MURRAY D R.The behavioral immune system:Current concerns and future directions .Social & Personality Psychology Compass,2018,12(3):1-14.
[18] LU J,WU J,TIAN J,et al.Role of T cell-derived exosomes in immunoregulation .Immunologic Research,2018,66(3):313-322.
[19] O’DONNELL J A,LEHMAN J,RODERICK J E,et al.Correction:Dendritic cell RIPK1 maintains immune homeostasis by preventing inflammation and autoimmunity .Journal of Immunology,2018,200(8):3020-3021.
[20] ANDERSEN M H.The balance players of the adaptive immune system .Cancer Research,2018,78(6):1379-1382.
[21] GREENSMITH J,AICKELIN U,CAYZER S.Detecting dan- ger:The dendritic cell algorithm [M]∥Robust Intelligent Systems.London:Springer,2008:89-112.
[22] YANG C,LI T.Research of Danger Signal Extraction Based on Changes in Danger Theory .Computer Science,2015,42(8):170-174.(in Chinese) 杨超,李涛.计算机免疫危险理论中危险信号的提取方法研究.计算机科学,2015,42(8):170-174.
[23] GU F,GREENSMITH J,AICKELIN U.Theoretical formula- tion and analysis of the deterministic dendritic cell algorithm .Biosystems,2013,111(2):127-135.
[24] YIN S,DING S X,HAGHANI A,et al.A comparison study of basic data-driven fault diagnosis and process monitoring methods on the benchmark tennessee eastman process .Journal of Process Control,2012,22(9):1567-1581.
[1] LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232.
[2] CHEN Jing, SHU Qiang, XIE Hao-fei. Priority Ranking Method of Test Cases Based on Fault Location [J]. Computer Science, 2019, 46(8): 239-243.
[3] YANG Chao, QIN Ting-dong, FAN Bo, LI Tao. Study on Detection of Weibo Spammers Based on Danger Theory in Artificial Immunity System [J]. Computer Science, 2018, 45(11): 138-142,159.
[4] PAN Li-li, WANG Tian-e, QIN Jiao-hua and XIANG Xu-yu. Test Case Prioritization Based on DU Chains [J]. Computer Science, 2017, 44(4): 173-176.
[5] LV Ning, YAN Lu-qi and BAI Guang-yuan. Fault Detection for Beer Fermentation Process Based on Segmentation Multiway Kernel Principal Component Analysis [J]. Computer Science, 2016, 43(Z6): 25-27, 33.
[6] YAO Yi, LIU Yong, SHEN Xuan-fan, LIAO Yong and ZHAO Ming. Packet Drop Detector Design Based on IEEE 802.11e in Wireless Sensor and Actuator Networks [J]. Computer Science, 2016, 43(8): 66-70.
[7] LI Jun-li and LI Wei-hua. Semi-supervised SVDD-KFCM Algorithm and its Application in Bearing Fault Detection [J]. Computer Science, 2015, 42(Z6): 134-137.
[8] FANG Xian-jin, WANG Li, KANG Jia and LIU Jia. On Dendritic Cell Algorithm and its Theoretical Investigation [J]. Computer Science, 2015, 42(2): 131-133,156.
[9] WANG Yao-xuan,YE Jun-min,CHEN Jing-ru and OU Zhong-hong. Software Fault Location Method Based on Fault Detection Model of Bipartitie Graphs [J]. Computer Science, 2013, 40(6): 160-163.
[10] . Test Suite Reduction Methods Based on K-medoids [J]. Computer Science, 2012, 39(Z6): 422-424.
[11] WAN Ya-ping,FENG Dan,OUYANG Li-jun,LIU Li,YANG Tian-ming. Self-feedback Fault Detection Algorithm for Peer-to-Peer Storage System [J]. Computer Science, 2010, 37(2): 48-52.
[12] . [J]. Computer Science, 2009, 36(2): 278-281.
[13] ZHANG Jun-min,LIANG Yi-wen. Worm Detection Immune Model Integrating Innate and Adaptive Immunity [J]. Computer Science, 2009, 36(12): 119-123.
[14] LIU Gang, ZHOU Jing-Li, Qin Lei-Hua ,CHEN Xiao-Ping (Computer Department of Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2007, 34(5): 75-78.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111, 142 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .