scispace - formally typeset
Search or ask a question
Author

Jinhui Jeanne Huang

Bio: Jinhui Jeanne Huang is an academic researcher from Nankai University. The author has contributed to research in topics: Environmental science & Evapotranspiration. The author has an hindex of 13, co-authored 58 publications receiving 1068 citations. Previous affiliations of Jinhui Jeanne Huang include Tianjin University & Chinese Academy of Sciences.


Papers
More filters
Journal ArticleDOI
TL;DR: The Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Distillery Safety Week, which explored how design algorithms compare to the efforts of human designers for practical design of sensor networks.
Abstract: Following the events of September 11, 2001, in the United States, world public awareness for possible terrorist attacks on water supply systems has increased dramatically. Among the different threats for a water distribution system, the most difficult to address is a deliberate chemical or biological contaminant injection, due to both the uncertainty of the type of injected contaminant and its consequences, and the uncertainty of the time and location of the injection. An online contaminant monitoring system is considered as a major opportunity to protect against the impacts of a deliberate contaminant intrusion. However, although optimization models and solution algorithms have been developed for locating sensors, little is known about how these design algorithms compare to the efforts of human designers, and thus, the advantages they propose for practical design of sensor networks. To explore these issues, the Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Dist...

551 citations

Journal ArticleDOI
TL;DR: In this article, a robust super-hydrophobic membrane PDMS-3 was developed via electrospinning followed by electrospray to enhance membrane anti-wetting properties caused by scaling and fouling.

106 citations

Journal ArticleDOI
TL;DR: In this paper, a porous bead-on-string filter with nanobeads along the nanofiber axis has been successfully fabricated by optimizing the polyacrylonitrile (PAN) concentration of electrospun dopes and ambient humidity condition during the electrospinning process.

63 citations

Journal ArticleDOI
TL;DR: In this article, a precipitation driven correlation based mapping method (PCM) was proposed, which can reduce the impact of uncertain spatialtemporal distribution of precipitation and identify the critical source areas (CSAs) of NPS pollution with a better coverage.

57 citations

Proceedings ArticleDOI
13 Mar 2008
TL;DR: A multiple-objective optimization method employing genetic algorithms (GA) in conjunction with data mining, is developed capable of identifying an optimal set of monitoring stations based on three objectives: detection delay time, detection probability, and the affected population prior to detection.
Abstract: As water distribution systems are vulnerable to a variety of accidental or deliberate contaminant intrusion events, efficient in-situ water quality monitoring is important in providing a robust water supply. To identify optimal placements of monitoring sensors in water distribution systems, a multiple-objective optimization method employing genetic algorithms (GA) in conjunction with data mining, is developed. The proposed methodology is capable of identifying an optimal set of monitoring stations based on three objectives: detection delay time, detection probability, and the affected population prior to detection. To apply the method, a database which stores data for intrusion events at each node, and the classified consequences of these intrusions at each node, is prepared. The initial solutions for multi-objective optimization are obtained from the database based on sensor coverage criteria. Pareto ranking is performed during the GA optimization. The effectiveness of the proposed method is illustrated by applying the methodology to the two networks, Networks 1 and 2, provided by the Battle of the Water Sensor Networks design competition. The final results in application to Networks 1 and 2 are also provided.

54 citations


Cited by
More filters
Proceedings ArticleDOI
12 Aug 2007
TL;DR: This work exploits submodularity to develop an efficient algorithm that scales to large problems, achieving near optimal placements, while being 700 times faster than a simple greedy algorithm and achieving speedups and savings in storage of several orders of magnitude.
Abstract: Given a water distribution network, where should we place sensors toquickly detect contaminants? Or, which blogs should we read to avoid missing important stories?.These seemingly different problems share common structure: Outbreak detection can be modeled as selecting nodes (sensor locations, blogs) in a network, in order to detect the spreading of a virus or information asquickly as possible. We present a general methodology for near optimal sensor placement in these and related problems. We demonstrate that many realistic outbreak detection objectives (e.g., detection likelihood, population affected) exhibit the property of "submodularity". We exploit submodularity to develop an efficient algorithm that scales to large problems, achieving near optimal placements, while being 700 times faster than a simple greedy algorithm. We also derive online bounds on the quality of the placements obtained by any algorithm. Our algorithms and bounds also handle cases where nodes (sensor locations, blogs) have different costs.We evaluate our approach on several large real-world problems,including a model of a water distribution network from the EPA, andreal blog data. The obtained sensor placements are provably near optimal, providing a constant fraction of the optimal solution. We show that the approach scales, achieving speedups and savings in storage of several orders of magnitude. We also show how the approach leads to deeper insights in both applications, answering multicriteria trade-off, cost-sensitivity and generalization questions.

2,413 citations

Journal ArticleDOI
TL;DR: The Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Distillery Safety Week, which explored how design algorithms compare to the efforts of human designers for practical design of sensor networks.
Abstract: Following the events of September 11, 2001, in the United States, world public awareness for possible terrorist attacks on water supply systems has increased dramatically. Among the different threats for a water distribution system, the most difficult to address is a deliberate chemical or biological contaminant injection, due to both the uncertainty of the type of injected contaminant and its consequences, and the uncertainty of the time and location of the injection. An online contaminant monitoring system is considered as a major opportunity to protect against the impacts of a deliberate contaminant intrusion. However, although optimization models and solution algorithms have been developed for locating sensors, little is known about how these design algorithms compare to the efforts of human designers, and thus, the advantages they propose for practical design of sensor networks. To explore these issues, the Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Dist...

551 citations

Journal ArticleDOI
TL;DR: A survey of data stream clustering algorithms is presented, providing a thorough discussion of the main design components of state-of-the-art algorithms and an overview of the usually employed experimental methodologies.
Abstract: Data stream mining is an active research area that has recently emerged to discover knowledge from large amounts of continuously generated data. In this context, several data stream clustering algorithms have been proposed to perform unsupervised learning. Nevertheless, data stream clustering imposes several challenges to be addressed, such as dealing with nonstationary, unbounded data that arrive in an online fashion. The intrinsic nature of stream data requires the development of algorithms capable of performing fast and incremental processing of data objects, suitably addressing time and memory limitations. In this article, we present a survey of data stream clustering algorithms, providing a thorough discussion of the main design components of state-of-the-art algorithms. In addition, this work addresses the temporal aspects involved in data stream clustering, and presents an overview of the usually employed experimental methodologies. A number of references are provided that describe applications of data stream clustering in different domains, such as network intrusion detection, sensor networks, and stock market analysis. Information regarding software packages and data repositories are also available for helping researchers and practitioners. Finally, some important issues and open questions that can be subject of future research are discussed.

479 citations

Journal ArticleDOI
TL;DR: It is shown how the method presented here can be extended to multicriteria optimization, selecting placements robust to sensor failures and optimizing minimax criteria.
Abstract: The problem of deploying sensors in a large water distribution network is considered, in order to detect the malicious introduction of contaminants. It is shown that a large class of realistic objective functions—such as reduction of detection time and the population protected from consuming contaminated water—exhibits an important diminishing returns effect called submodularity. The submodularity of these objectives is exploited in order to design efficient placement algorithms with provable performance guarantees. The algorithms presented in this paper do not rely on mixed integer programming, and scale well to networks of arbitrary size. The problem instances considered in the approach presented in this paper are orders of magnitude (a factor of 72) larger than the largest problems solved in the literature. It is shown how the method presented here can be extended to multicriteria optimization, selecting placements robust to sensor failures and optimizing minimax criteria. Extensive empirical evidence ...

425 citations

Book
01 Nov 2013
TL;DR: A detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena are described as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others.
Abstract: Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications. Table of Contents: Acknowledgments / Introduction / Stochastic Diffusion Models / Influence Maximization / Extensions to Diffusion Modeling and Influence Maximization / Learning Propagation Models / Data and Software for Information/Influence: Propagation Research / Conclusion and Challenges / Bibliography / Authors' Biographies / Index

358 citations