期刊文献+

基于机器视觉深度学习的电站渗水检测识别技术研究 被引量:6

Research on power plant water penetration detection and identification technology based on machine vision deep learning
下载PDF
导出
摘要 针对传统的人工检测水库库底排水巡检区域渗水、裂缝的方法存在对工作人员要求过高,检测结果误差过大,检测区域限制过大等缺点,文中提出了一种基于Canny算法与卷积神经网络的裂缝检测识别技术。首先,利用轮式机器人对水电站中可能存在的裂缝进行图像采集,接着借助Canny算法对图像进行预处理并制作成对比数据库,通过数据库训练出能够识别含有裂缝图像的卷积神经网络。最终,将卷积神经网络迁移至机器人的微主板中,使得机器人在巡检过程中可以对渗水、裂缝等异常现象及时报警。实验结果表明,基于本方案的裂缝图像识别率达98.33%,在实际巡检工作中能够发现绝大多数的渗漏危险并给予报警。 In view of the shortcomings of the traditional method of artificial detection of water seepage and cracks in the inspection area of reservoir bottom drainage,such as too high requirements for the staff,too large error in the detection results,and too large limit in the detection area,this paper proposes a crack detection and recognition technology based on Canny algorithm and convolution neural network.Firstly,the wheel robot is used to image mining the possible cracks in the hydropower station Then,the image is preprocessed by Canny algorithm,and a contrast database is made.The convolution neural network which can recognize the image with cracks is trained by the database.Finally,the convolutional neural network is transferred to the micro main board of the robot,which makes the robot alarm the abnormal phenomena such as water seepage and cracks in the process of inspection.The experimental results show that the crack image recognition rate based on this scheme is up to 98.33%.In the actual inspection work,most of the leakage risks can be found and alarm can be given.
作者 田伟 姜泽界 郭志鹏 TIAN Wei;JIANG Zejie;GUO Zhipeng(East China Tianhuangping Pumped Storage Co.,Ltd.,Huzhou 313302,China)
出处 《电子设计工程》 2020年第20期66-70,共5页 Electronic Design Engineering
基金 国网新能源控股有限公司科研项目(SGXYTP00JHJS1800108)。
关键词 CANNY算子 深度学习 水库渗漏监测 卷积神经网络 Canny operator deep learning reservoir leakage monitoring CNN
  • 相关文献

参考文献12

二级参考文献47

  • 1吴铤,王金荣,戎笑.第二型优化正规基Lambda矩阵的快速计算[J].计算机工程与应用,2005,41(28):75-77. 被引量:1
  • 2Dahab R,Hankerson D,Fei H.Software multiplication using Gaussian normal bases[J].IEEE Transactions on Computers,2006,55 (8) : 974-984.
  • 3Rosing M.Implementing elliptic curve cryptography[M].USA:Manning Publications Company, 1998.
  • 4Ning P,Yin Y L.Efficient software implementation for finite field multiplication in normal basis[C]//Information and Communications Security(ICICS 2001 ) ,2001 : 177-181.
  • 5Mullin R C,Onyszchuk I M,Vanstone S A.Optimal normal bases in GF(p^n )[J].Discrete Applied Mathematics, 1989,22:149-161.
  • 6Ash D W,Blake I F,Vanstone S A.Low complexity normal bases[J]. Discrete Applied Math, 1989,25(3) : 191-210.
  • 7Digital Signature Standard(DSS ).PUB 186-2[S].FIPS, 2000.
  • 8雷超阳,刘军华,张敏.一种基于自适应的新型中值滤波算法[J].计算机工程与应用,2008,44(12):60-62. 被引量:14
  • 9金良海,李德华.基于噪声检测的图像去噪算法[J].模式识别与人工智能,2008,21(3):298-302. 被引量:17
  • 10贺志国,陆军,匡纲要.SAR图像特征提取与选择研究[J].信号处理,2008,24(5):813-823. 被引量:24

共引文献189

同被引文献47

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部