期刊文献+

基于动态阈值的稳态模拟量异常预警方法

A Method for Abnormal Warning of Steady-state Analog Based on Dynamic Thresholds
下载PDF
导出
摘要 在对生产生活中常见的电压、电流、温度等稳态模拟量进行异常预警分析时,当前监测类系统存在阈值维护工作量大、算法模型技术复杂和因单点异常判定导致了频繁预警和漏预警等问题。针对上述问题,本文提出了一种基于动态阈值和滑动窗口式分析的稳态模拟量异常预警方法。该方法能提高监测类系统预警功能的易维护性和预警有效性。 For warning analysis of steady-state analog data such as voltage,current,and temperature,which are common in production and life,the current monitoring system have problems of large threshold maintenance workload,complex algorithm model technology,and frequent or missed warnings caused by single point anomaly recognition.In order to overcome these problems,this paper proposes a method for steady-state analog abnormal warning based on dynamic threshold and sliding window analysis,which could enhance the maintainability and effectiveness of the warning function in the monitoring system.
作者 张吉亮 陈姝凡 曹浩 ZHANG Ji-liang;CHEN Shu-fan;CAO Hao(China Academy of Industrial Internet,Beijing100020,China;Jiangsu Development Research Center of Industrial Internet,Suzhou Jiangsu215000,China)
出处 《机电产品开发与创新》 2024年第3期169-171,共3页 Development & Innovation of Machinery & Electrical Products
关键词 稳态模拟量 动态阈值 滑动窗口 异常预警 Steady-state analog Dynamic threshold Sliding window Abnormal warning
  • 相关文献

参考文献10

二级参考文献47

  • 1刘树林,黄文虎,夏松波,陈业生.基于免疫机理的往复压缩机气阀故障检测方法[J].机械工程学报,2004,40(7):156-160. 被引量:20
  • 2李盼池,许少华.支持向量机在模式识别中的核函数特性分析[J].计算机工程与设计,2005,26(2):302-304. 被引量:98
  • 3刘树林,黄文虎,夏松波,丛蕊.活塞压缩机气阀故障检测的免疫神经网络方法研究[J].中国机械工程,2005,16(15):1384-1387. 被引量:5
  • 4唐玉华,杨晓元,张敏情,韩鹏.多超球面OC-SVM算法在隐秘图像检测中的应用[J].计算机应用,2006,26(12):2887-2889. 被引量:1
  • 5安海君.25Hz轨道电路[M].中国铁道出版社,2001.10.
  • 6PAN Yuna, CHEN Jin, GUO Lei. Robust bearingperformance degradation assessment method based onimproved wavelet packet-support vector datadescriptionfJ]. Mechanical Systems and Signal Processing,2009, 23(10): 669-681.
  • 7MARKOU D,SINGH S. Novelty detection : Areview-part 2 : Neural network based approaches[J].Signal Processing, 2003, 83(12): 2499-2521.
  • 8DASGUPTA D,GONZALEZ F. An immunity-basedtechnique to characterize intrusions in computernetworks[J]. IEEE Translation on EvolutionaryCompution, 2002,6(6) : 281 -291.
  • 9GONZALEZ F,GOMEZ J,KANIGANTI M, et al.An evolutionary approach to generate fuzzy anomalysignatures[C]//Information Assurance Workshop,June18-20,2003, United States Military Academy, WestPoint, New York: IEEE, 2003: 18-20.
  • 10ZHOU J, DAGUPTA D. Real-valued negative selectionalgorithm with variable-sized detectorsfC]// Genetic andEvolutionary Compution(GECCO 2004), June 26-30,2004,Seattle, WA. Berlin: Springer, 2004: 287-298.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部