A Bayesian Framework for Digital Twin-Based Control, Monitoring, and
Data Collection in Wireless Systems
- URL: http://arxiv.org/abs/2212.01351v3
- Date: Tue, 29 Aug 2023 15:42:35 GMT
- Title: A Bayesian Framework for Digital Twin-Based Control, Monitoring, and
Data Collection in Wireless Systems
- Authors: Clement Ruah, Osvaldo Simeone, Bashir Al-Hashimi
- Abstract summary: Digital twin (DT) platforms are seen as a promising paradigm to control, monitor, and analyze software-based, "open", communication systems.
A key challenge in the deployment of DT systems is to ensure that virtual control optimization, monitoring, and analysis at the DT are safe and reliable.
This paper presents a general Bayesian framework with the aim of quantifying and accounting for model uncertainty at the DT.
- Score: 35.59201763567714
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Commonly adopted in the manufacturing and aerospace sectors, digital twin
(DT) platforms are increasingly seen as a promising paradigm to control,
monitor, and analyze software-based, "open", communication systems. Notably, DT
platforms provide a sandbox in which to test artificial intelligence (AI)
solutions for communication systems, potentially reducing the need to collect
data and test algorithms in the field, i.e., on the physical twin (PT). A key
challenge in the deployment of DT systems is to ensure that virtual control
optimization, monitoring, and analysis at the DT are safe and reliable,
avoiding incorrect decisions caused by "model exploitation". To address this
challenge, this paper presents a general Bayesian framework with the aim of
quantifying and accounting for model uncertainty at the DT that is caused by
limitations in the amount and quality of data available at the DT from the PT.
In the proposed framework, the DT builds a Bayesian model of the communication
system, which is leveraged to enable core DT functionalities such as control
via multi-agent reinforcement learning (MARL), monitoring of the PT for anomaly
detection, prediction, data-collection optimization, and counterfactual
analysis. To exemplify the application of the proposed framework, we
specifically investigate a case-study system encompassing multiple sensing
devices that report to a common receiver. Experimental results validate the
effectiveness of the proposed Bayesian framework as compared to standard
frequentist model-based solutions.
Related papers
- AAD-LLM: Adaptive Anomaly Detection Using Large Language Models [35.286105732902065]
The research aims to improve the transferability of anomaly detection models by leveraging Large Language Models (LLMs)
The research also seeks to enable more collaborative decision-making between the model and plant operators.
arXiv Detail & Related papers (2024-11-01T13:43:28Z) - A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications [0.0]
Cybersecurity breaches in digital substations pose significant challenges to the stability and reliability of power system operations.
This paper proposes a task-oriented dialogue system for anomaly detection (AD) in datasets of multicast messages.
It has a lower potential error and better scalability and adaptability than a process that considers the cybersecurity guidelines recommended by humans.
arXiv Detail & Related papers (2024-06-08T13:28:50Z) - DA-Flow: Dual Attention Normalizing Flow for Skeleton-based Video Anomaly Detection [52.74152717667157]
We propose a lightweight module called Dual Attention Module (DAM) for capturing cross-dimension interaction relationships in-temporal skeletal data.
It employs the frame attention mechanism to identify the most significant frames and the skeleton attention mechanism to capture broader relationships across fixed partitions with minimal parameters and flops.
arXiv Detail & Related papers (2024-06-05T06:18:03Z) - Decision Transformer as a Foundation Model for Partially Observable Continuous Control [5.453548045211778]
Decision Transformer (DT) architecture is used to predict optimal action based on past observations, actions, and rewards.
DT exhibits remarkable zero-shot generalization abilities for completely new tasks.
These findings highlight the potential of DT as a foundational controller for general control applications.
arXiv Detail & Related papers (2024-04-03T02:17:34Z) - Causal Semantic Communication for Digital Twins: A Generalizable
Imitation Learning Approach [74.25870052841226]
A digital twin (DT) leverages a virtual representation of the physical world, along with communication (e.g., 6G), computing, and artificial intelligence (AI) technologies to enable many connected intelligence services.
Wireless systems can exploit the paradigm of semantic communication (SC) for facilitating informed decision-making under strict communication constraints.
A novel framework called causal semantic communication (CSC) is proposed for DT-based wireless systems.
arXiv Detail & Related papers (2023-04-25T00:15:00Z) - Digital Twin-Based Multiple Access Optimization and Monitoring via
Model-Driven Bayesian Learning [30.62844128870099]
Digital twin (DT) platforms are seen as a promising paradigm to control and monitor software-based, "open", communication systems.
In this work, the DT builds a Bayesian model of the communication system, which is leveraged to enable core DT functionalities.
We specifically investigate the application of the proposed framework to a simple case-study system encompassing multiple sensing devices.
arXiv Detail & Related papers (2022-10-11T16:14:43Z) - DAE : Discriminatory Auto-Encoder for multivariate time-series anomaly
detection in air transportation [68.8204255655161]
We propose a novel anomaly detection model called Discriminatory Auto-Encoder (DAE)
It uses the baseline of a regular LSTM-based auto-encoder but with several decoders, each getting data of a specific flight phase.
Results show that the DAE achieves better results in both accuracy and speed of detection.
arXiv Detail & Related papers (2021-09-08T14:07:55Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - Real-World Anomaly Detection by using Digital Twin Systems and
Weakly-Supervised Learning [3.0100975935933567]
We present novel weakly-supervised approaches to anomaly detection for industrial settings.
The approaches make use of a Digital Twin to generate a training dataset which simulates the normal operation of the machinery.
The performance of the proposed methods is compared against various state-of-the-art anomaly detection algorithms on an application to a real-world dataset.
arXiv Detail & Related papers (2020-11-12T10:15:56Z) - SUOD: Accelerating Large-Scale Unsupervised Heterogeneous Outlier
Detection [63.253850875265115]
Outlier detection (OD) is a key machine learning (ML) task for identifying abnormal objects from general samples.
We propose a modular acceleration system, called SUOD, to address it.
arXiv Detail & Related papers (2020-03-11T00:22:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.