Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (4): 1235-1243.DOI: 10.11772/j.issn.1001-9081.2021071182
Special Issue: CCF第36届中国计算机应用大会 (CCF NCCA 2021)
• The 36 CCF National Conference of Computer Applications (CCF NCCA 2020) • Previous Articles Next Articles
Jing LIU1,2,3, Zhihong DONG1, Zheyu ZHANG1, Zhigang SUN4, Haipeng JI2,3,5()
Received:
2021-07-08
Revised:
2021-09-03
Accepted:
2021-09-06
Online:
2021-09-18
Published:
2022-04-10
Contact:
Haipeng JI
About author:
LIU Jing, born in 1979, Ph. D., research fellow. Her research interests include industrial artificial intelligence.Supported by:
刘晶1,2,3, 董志红1, 张喆语1, 孙志刚4, 季海鹏2,3,5()
通讯作者:
季海鹏
作者简介:
刘晶(1979—),女,内蒙古包头人,研究员,博士,CCF高级会员,主要研究方向:工业人工智能基金资助:
CLC Number:
Jing LIU, Zhihong DONG, Zheyu ZHANG, Zhigang SUN, Haipeng JI. Data sharing method of industrial internet of things based on federal incremental learning[J]. Journal of Computer Applications, 2022, 42(4): 1235-1243.
刘晶, 董志红, 张喆语, 孙志刚, 季海鹏. 基于联邦增量学习的工业物联网数据共享方法[J]. 《计算机应用》唯一官方网站, 2022, 42(4): 1235-1243.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021071182
编号 | 轴承位置 | 故障部位 | 故障直径/mm |
---|---|---|---|
1 | None | None | 0.000 |
2 | Driver End | IRW | 0.007 |
3 | Driver End | IRW | 0.014 |
4 | Driver End | ORW | 0.007 |
5 | Driver End | ORW | 0.014 |
6 | Driver End | BA | 0.007 |
7 | Driver End | BA | 0.014 |
8 | Fan End | IRW | 0.007 |
9 | Fan End | IRW | 0.014 |
10 | Fan End | ORW | 0.007 |
11 | Fan End | ORW | 0.014 |
12 | Fan End | BA | 0.007 |
13 | Fan End | BA | 0.014 |
Tab. 1 Experimental data description of bearing failure
编号 | 轴承位置 | 故障部位 | 故障直径/mm |
---|---|---|---|
1 | None | None | 0.000 |
2 | Driver End | IRW | 0.007 |
3 | Driver End | IRW | 0.014 |
4 | Driver End | ORW | 0.007 |
5 | Driver End | ORW | 0.014 |
6 | Driver End | BA | 0.007 |
7 | Driver End | BA | 0.014 |
8 | Fan End | IRW | 0.007 |
9 | Fan End | IRW | 0.014 |
10 | Fan End | ORW | 0.007 |
11 | Fan End | ORW | 0.014 |
12 | Fan End | BA | 0.007 |
13 | Fan End | BA | 0.014 |
网络层 | 权重 | 偏置 | |
---|---|---|---|
weight_hh | weight_ih | ||
LSTM层 | 256 × 100 | 256 × 100 | 100 |
dense层1 | 256 × 64 | 64 | |
dense层2 | 64 × 13 | 13 |
Tab. 2 LSTM parameters
网络层 | 权重 | 偏置 | |
---|---|---|---|
weight_hh | weight_ih | ||
LSTM层 | 256 × 100 | 256 × 100 | 100 |
dense层1 | 256 × 64 | 64 | |
dense层2 | 64 × 13 | 13 |
F值 | 通信轮次 | 每轮时间/s | 训练集准确率 | 测试集准确率 |
---|---|---|---|---|
0.3 | 33 | 12.395 | 0.954 8 | 0.938 8 |
0.5 | 29 | 18.703 | 0.960 2 | 0.943 9 |
0.7 | 26 | 23.787 | 0.962 3 | 0.945 4 |
1.0 | 17 | 28.854 | 0.972 1 | 0.963 1 |
Tab. 3 Influence of scale factor on model performance
F值 | 通信轮次 | 每轮时间/s | 训练集准确率 | 测试集准确率 |
---|---|---|---|---|
0.3 | 33 | 12.395 | 0.954 8 | 0.938 8 |
0.5 | 29 | 18.703 | 0.960 2 | 0.943 9 |
0.7 | 26 | 23.787 | 0.962 3 | 0.945 4 |
1.0 | 17 | 28.854 | 0.972 1 | 0.963 1 |
F 值 | 方法 | 工厂子端 | 不同通信轮次下的极值 | ||||
---|---|---|---|---|---|---|---|
1 | 5 | 10 | 20 | 30 | |||
0.3 | FIL-IIOT | Factory_0 | 3.127 | 0.841 | 0.507 | 1.432 | 0.767 |
Factory_1 | 0.768 | 1.960 | 0.527 | 1.576 | 1.782 | ||
Factory_2 | 2.547 | 1.482 | 1.653 | 2.276 | 2.520 | ||
Factory_3 | 1.926 | 2.568 | 0.911 | 1.374 | 2.167 | ||
Factory_4 | 0.202 | 2.962 | 2.120 | 1.096 | 0.796 | ||
Factory_5 | 2.772 | 3.005 | 0.232 | 2.895 | 1.279 | ||
Factory_6 | 2.352 | 0.628 | 2.937 | 1.652 | 1.581 | ||
Factory_7 | 3.779 | 1.384 | 0.132 | 1.563 | 1.280 | ||
Factory_8 | 3.003 | 2.370 | 0.523 | 1.057 | 1.527 | ||
Factory_9 | 2.830 | 1.196 | 1.268 | 0.904 | 1.666 | ||
FedAvg | Factory_0 | 2.760 | 0.276 | 3.096 | 1.994 | 1.896 | |
Factory_1 | 2.626 | 1.062 | 1.944 | 1.137 | 1.271 | ||
Factory_2 | 2.683 | 1.303 | 3.588 | 1.273 | 2.037 | ||
Factory_3 | 1.415 | 2.944 | 1.911 | 0.994 | 1.199 | ||
Factory_4 | 3.185 | 2.477 | 1.042 | 1.810 | 0.301 | ||
Factory_5 | 1.688 | 2.420 | 1.038 | 2.294 | 3.023 | ||
Factory_6 | 2.151 | 2.709 | 2.737 | 1.252 | 2.332 | ||
Factory_7 | 0.444 | 2.344 | 2.365 | 0.966 | 0.942 | ||
Factory_8 | 0.499 | 1.463 | 2.148 | 0.167 | 2.233 | ||
Factory_9 | 2.947 | 2.710 | 2.616 | 2.350 | 1.277 | ||
1.0 | FedAvg | Factory_0 | 0.357 | 1.789 | 2.212 | 2.352 | 0.738 |
Factory_1 | 2.352 | 0.598 | 2.570 | 1.657 | 2.679 | ||
Factory_2 | 0.766 | 1.832 | 1.408 | 1.253 | 2.489 | ||
Factory_3 | 2.594 | 0.495 | 0.458 | 1.632 | 2.829 | ||
Factory_4 | 0.403 | 2.411 | 2.549 | 2.964 | 1.682 | ||
Factory_5 | 1.386 | 1.394 | 2.096 | 1.823 | 2.205 | ||
Factory_6 | 0.411 | 3.620 | 1.230 | 1.489 | 2.806 | ||
Factory_7 | 2.235 | 1.879 | 1.745 | 0.861 | 0.859 | ||
Factory_8 | 0.641 | 3.447 | 3.177 | 0.630 | 1.399 | ||
Factory_9 | 2.587 | 2.300 | 2.871 | 1.981 | 2.778 |
Tab. 4 Change of factory sub-end level value
F 值 | 方法 | 工厂子端 | 不同通信轮次下的极值 | ||||
---|---|---|---|---|---|---|---|
1 | 5 | 10 | 20 | 30 | |||
0.3 | FIL-IIOT | Factory_0 | 3.127 | 0.841 | 0.507 | 1.432 | 0.767 |
Factory_1 | 0.768 | 1.960 | 0.527 | 1.576 | 1.782 | ||
Factory_2 | 2.547 | 1.482 | 1.653 | 2.276 | 2.520 | ||
Factory_3 | 1.926 | 2.568 | 0.911 | 1.374 | 2.167 | ||
Factory_4 | 0.202 | 2.962 | 2.120 | 1.096 | 0.796 | ||
Factory_5 | 2.772 | 3.005 | 0.232 | 2.895 | 1.279 | ||
Factory_6 | 2.352 | 0.628 | 2.937 | 1.652 | 1.581 | ||
Factory_7 | 3.779 | 1.384 | 0.132 | 1.563 | 1.280 | ||
Factory_8 | 3.003 | 2.370 | 0.523 | 1.057 | 1.527 | ||
Factory_9 | 2.830 | 1.196 | 1.268 | 0.904 | 1.666 | ||
FedAvg | Factory_0 | 2.760 | 0.276 | 3.096 | 1.994 | 1.896 | |
Factory_1 | 2.626 | 1.062 | 1.944 | 1.137 | 1.271 | ||
Factory_2 | 2.683 | 1.303 | 3.588 | 1.273 | 2.037 | ||
Factory_3 | 1.415 | 2.944 | 1.911 | 0.994 | 1.199 | ||
Factory_4 | 3.185 | 2.477 | 1.042 | 1.810 | 0.301 | ||
Factory_5 | 1.688 | 2.420 | 1.038 | 2.294 | 3.023 | ||
Factory_6 | 2.151 | 2.709 | 2.737 | 1.252 | 2.332 | ||
Factory_7 | 0.444 | 2.344 | 2.365 | 0.966 | 0.942 | ||
Factory_8 | 0.499 | 1.463 | 2.148 | 0.167 | 2.233 | ||
Factory_9 | 2.947 | 2.710 | 2.616 | 2.350 | 1.277 | ||
1.0 | FedAvg | Factory_0 | 0.357 | 1.789 | 2.212 | 2.352 | 0.738 |
Factory_1 | 2.352 | 0.598 | 2.570 | 1.657 | 2.679 | ||
Factory_2 | 0.766 | 1.832 | 1.408 | 1.253 | 2.489 | ||
Factory_3 | 2.594 | 0.495 | 0.458 | 1.632 | 2.829 | ||
Factory_4 | 0.403 | 2.411 | 2.549 | 2.964 | 1.682 | ||
Factory_5 | 1.386 | 1.394 | 2.096 | 1.823 | 2.205 | ||
Factory_6 | 0.411 | 3.620 | 1.230 | 1.489 | 2.806 | ||
Factory_7 | 2.235 | 1.879 | 1.745 | 0.861 | 0.859 | ||
Factory_8 | 0.641 | 3.447 | 3.177 | 0.630 | 1.399 | ||
Factory_9 | 2.587 | 2.300 | 2.871 | 1.981 | 2.778 |
F 值 | 方法 | 训练集准确率 | 测试集准确率 | 时间/s |
---|---|---|---|---|
1.0 | FedAvg | 0.968 7 | 0.944 2 | 754 |
0.3 | FedAvg | 0.933 6 | 0.917 7 | 353 |
FIL-IIOT | 0.955 6 | 0.931 8 | 362 |
Tab. 5 Performance comparison of federal optimization algorithm
F 值 | 方法 | 训练集准确率 | 测试集准确率 | 时间/s |
---|---|---|---|---|
1.0 | FedAvg | 0.968 7 | 0.944 2 | 754 |
0.3 | FedAvg | 0.933 6 | 0.917 7 | 353 |
FIL-IIOT | 0.955 6 | 0.931 8 | 362 |
方法 | 训练精度 | 训练时间/s | 测试精度 | 测试时间/s |
---|---|---|---|---|
FedAvg | 0.882 2 | 722 | 0.869 7 | 83 |
FIL-IIOT-NI | 0.921 4 | 746 | 0.905 6 | 68 |
FIL-IIOT | 0.945 6 | 478 | 0.931 5 | 65 |
Tab. 6 Comparison of incremental failure classification results
方法 | 训练精度 | 训练时间/s | 测试精度 | 测试时间/s |
---|---|---|---|---|
FedAvg | 0.882 2 | 722 | 0.869 7 | 83 |
FIL-IIOT-NI | 0.921 4 | 746 | 0.905 6 | 68 |
FIL-IIOT | 0.945 6 | 478 | 0.931 5 | 65 |
1 | 李明时,马跃,尹震宇,等.一种多重冗余的工业物联网智能产线安全通信模型设计[J].小型微型计算机系统,2021,42(3):621-626. 10.3969/j.issn.1000-1220.2021.03.030 |
LI M S, MA Y, YIN Z Y, et al. Design of a multi-redundant secure communication model for intelligent production line of industrial Internet of things[J]. Journal of Chinese Computer Systems, 2021, 42(3):621-626. 10.3969/j.issn.1000-1220.2021.03.030 | |
2 | 张君如,赵晓焱,袁培燕.面向用户隐私保护的联邦安全树算法[J]. 计算机应用,2020,40(10):2980-2985. |
ZHANG J R, ZHAO X Y, YUAN P Y. Federated security tree algorithm for user privacy protection[J]. Journal of Computer Applications, 2020, 40(10):2980-2985. | |
3 | 罗长银,陈学斌,马春地,等.面向区块链的在线联邦增量学习算法[J].计算机应用,2021,41(2):363-371. 10.11772/j.issn.1001-9081.2020050609 |
LUO C Y, CHEN X B, MA C D, et al. Online federated incremental learning algorithm for blockchain[J]. Journal of Computer Applications, 2021, 41(2):363-371. 10.11772/j.issn.1001-9081.2020050609 | |
4 | 芦效峰,廖钰盈,LIO P,等.一种面向边缘计算的高效异步联邦学习机制[J].计算机研究与发展,2020,57(12):2571-2582. 10.7544/issn1000-1239.2020.20190754 |
LU X F, LIAO Y Y, LIO P, et al. An asynchronous federated learning mechanism for edge network computing[J]. Journal of Computer Research and Development, 2020, 57(12):2571-2582. 10.7544/issn1000-1239.2020.20190754 | |
5 | HU B X, GAO Y J, LIU L, et al. Federated region-learning: an edge computing based framework for urban environment sensing[C]// Proceedings of the 2018 IEEE Global Communications Conference. Piscataway: IEEE, 2018:1-7. 10.1109/glocom.2018.8647649 |
6 | YANG W S, ZHANG Y H, YE K J, et al. FFD: a federated learning based method for credit card fraud detection[C]// Proceedings of the 2019 International Conference on Big Data, LNCS 11514. Cham: Springer, 2019:18-32. |
7 | HU Y, SUN X Y, CHEN Y, et al. Model and feature aggregation based federated learning for multi-sensor time series trend following[C]// Proceedings of the 2019 International Work-Conference on Artificial Neural Networks, LNCS 11506. Cham: Springer, 2019:233-246. |
8 | 王蓉,马春光,武朋.基于联邦学习和卷积神经网络的入侵检测方法[J].信息网络安全,2020,20(4):47-54. 10.3969/j.issn.1671-1122.2020.04.006 |
WANG R, MA C G, WU P. An intrusion detection method based on federated learning and convolutional neural network[J]. Netinfo Security, 2020, 20(4):47-54. 10.3969/j.issn.1671-1122.2020.04.006 | |
9 | CHEN Y, SUN X Y, JIN Y C. Communication-efficient federated deep learning with layerwise asynchronous model update and temporally weighted aggregation[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 31(10):4229-4238. 10.1109/tnnls.2019.2953131 |
10 | House White. Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy[R]. Washington, DC: White House, 2012. |
11 | McMAHAN H B, MOORE E, RAMAGE D, et al. Communication-efficient learning of deep networks from decentralized data[C]// Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. New York: JMLR.org, 2017:1273-1282. |
12 | KONEČNÝ J, McMAHAN H B, YU F X, et al. Federated learning: strategies for improving communication efficiency[EB/OL]. (2017-10-30) [2020-07-12].. |
13 | LU Y L, HUANG X H, ZHANG K, et al. Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles[J]. IEEE Transactions on Vehicular Technology, 2020, 69(4):4298-4311. 10.1109/tvt.2020.2973651 |
14 | FedAI. Utilization of FATE in risk management of credit in small and micro enterprises[EB/OL]. [2020-07-12].. 10.14738/abr.49.872 |
15 | OWKIN, Inc. Federated learning to accelerate medical research[EB/OL]. [2020-07-12].. 10.53347/rid-81590 |
16 | QIU J, CHAI Y H, TIAN Z H, et al. Automatic concept extraction based on semantic graphs from big data in smart city[J]. IEEE Transactions on Computational Social Systems, 2020, 7(1):225-233. 10.1109/tcss.2019.2946181 |
17 | ZHENG Y, LIU F R, HSIEH H P. U-Air: when urban air quality inference meets big data[C]// Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2013:1436-1444. 10.1145/2487575.2488188 |
18 | KONEČNÝ J, McMAHAN B, RAMAGE D, et al. Federated optimization: distributed machine learning for on-device intelligence[EB/OL]. (2016-10-08) [2020-08-15].. |
19 | PREUVENEERS D, RIMMER V, TSINGENOPOULOS I, et al. Chained anomaly detection models for federated learning: an intrusion detection case study[J]. Applied Sciences, 2018, 8(12):No.2663. 10.3390/app8122663 |
20 | 林毅,吉鸿江,韩佳佳,等.一种基于马氏距离的系统故障诊断方法[J]. 计算机科学,2020,47(S2):57-63. |
LIN Y, JI H J, HAN J J, et al. System fault diagnosis method based on mahalanobis distance metric[J]. Computer Science, 2020, 47(S2):57-63. | |
21 | 毛文涛,杨超,刘亚敏,等.面向轴承早期故障检测的多尺度残差注意力深度领域适配模型[J].计算机应用,2020,40(10):2890-2898. |
MAO W T, YANG C, LIU Y M, et al. Deep domain adaptation model with multi-scale residual attention for incipient fault detection of bearings[J]. Journal of Computer Applications, 2020, 40(10):2890-2898. | |
22 | LIU J, AN Y C, DOU R L, et al. Helical fault diagnosis model based on data-driven incremental mergence[J]. Computers and Industrial Engineering, 2018, 125:517-532. 10.1016/j.cie.2018.02.002 |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Zheyuan SHEN, Keke YANG, Jing LI. Personalized federated learning method based on dual stream neural network [J]. Journal of Computer Applications, 2024, 44(8): 2319-2325. |
[3] | Wei LUO, Jinquan LIU, Zheng ZHANG. Dual vertical federated learning framework incorporating secret sharing technology [J]. Journal of Computer Applications, 2024, 44(6): 1872-1879. |
[4] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
[5] | Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG. Network abnormal traffic detection based on port attention and convolutional block attention module [J]. Journal of Computer Applications, 2024, 44(4): 1027-1034. |
[6] | Xue LI, Guangle YAO, Honghui WANG, Jun LI, Haoran ZHOU, Shaoze YE. Remote sensing image classification based on sample incremental learning [J]. Journal of Computer Applications, 2024, 44(3): 732-736. |
[7] | Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI. Incentive mechanism for federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(2): 344-352. |
[8] | Jianli DING, Hui HUANG, Weidong CAO. Dynamic monitoring method of flight chain operation status [J]. Journal of Computer Applications, 2024, 44(12): 3941-3948. |
[9] | Zucuan ZHANG, Xuebin CHEN, Rui GAO, Yuanhuai ZOU. Federated learning client selection method based on label classification [J]. Journal of Computer Applications, 2024, 44(12): 3759-3765. |
[10] | Xuebin CHEN, Changsheng QU. Overview of backdoor attacks and defense in federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. |
[11] | Shuaihua ZHANG, Shufen ZHANG, Mingchuan ZHOU, Chao XU, Xuebin CHEN. Malicious traffic detection model based on semi-supervised federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3487-3494. |
[12] | Jie WU, Xuezhong QIAN, Wei SONG. Personalized federated learning based on similarity clustering and regularization [J]. Journal of Computer Applications, 2024, 44(11): 3345-3353. |
[13] | Chunyong YIN, Yongcheng ZHOU. Automatically adjusted clustered federated learning for double-ended clustering [J]. Journal of Computer Applications, 2024, 44(10): 3011-3020. |
[14] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. Deep shadow defense scheme of federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(1): 223-232. |
[15] | Mengjie LAN, Jianping CAI, Lan SUN. Self-regularization optimization methods for Non-IID data in federated learning [J]. Journal of Computer Applications, 2023, 43(7): 2073-2081. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||