期刊文献+
共找到19,433篇文章
< 1 2 250 >
每页显示 20 50 100
Assessment of earthquake location uncertainties for the design of local seismic networks
1
作者 Antonio Fuggi Simone Re +3 位作者 Giorgio Tango Sergio Del Gaudio Alessandro Brovelli Giorgio Cassiani 《Earthquake Science》 2024年第5期415-433,共19页
The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network m... The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network must be designed to minimize the location errors introduced by geometrically unbalanced networks.In this study,we first review different sources of errors relevant to the localization of seismic events,how they propagate through localization algorithms,and their impact on outcomes.We then propose a quantitative method,based on a Monte Carlo approach,to estimate the uncertainty in earthquake locations that is suited to the design,optimization,and assessment of the performance of a local seismic monitoring network.To illustrate the performance of the proposed approach,we analyzed the distribution of the localization uncertainties and their related dispersion for a highly dense grid of theoretical hypocenters in both the horizontal and vertical directions using an actual monitoring network layout.The results expand,quantitatively,the qualitative indications derived from purely geometrical parameters(azimuthal gap(AG))and classical detectability maps.The proposed method enables the systematic design,optimization,and evaluation of local seismic monitoring networks,enhancing monitoring accuracy in areas proximal to hydrocarbon production,geothermal fields,underground natural gas storage,and other subsurface activities.This approach aids in the accurate estimation of earthquake source locations and their associated uncertainties,which are crucial for assessing and mitigating seismic risks,thereby enabling the implementation of proactive measures to minimize potential hazards.From an operational perspective,reliably estimating location accuracy is crucial for evaluating the position of seismogenic sources and assessing possible links between well activities and the onset of seismicity. 展开更多
关键词 network design earthquake localization DETECTABILITY localization uncertainties local seismic network
下载PDF
A Framework for Driver DrowsinessMonitoring Using a Convolutional Neural Network and the Internet of Things
2
作者 Muhamad Irsan Rosilah Hassan +3 位作者 Anwar Hassan Ibrahim Mohamad Khatim Hasan Meng Chun Lam Wan Mohd Hirwani Wan Hussain 《Intelligent Automation & Soft Computing》 2024年第2期157-174,共18页
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri... One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility. 展开更多
关键词 Drowsy drivers convolutional neural network OPENCV MICROPROCESSOR face detection
下载PDF
Community detection on elite mathematicians’collaboration network
3
作者 Yurui Huang Zimo Wang +1 位作者 Chaolin Tian Yifang Ma 《Journal of Data and Information Science》 CSCD 2024年第4期1-23,共23页
Purpose:This study focuses on understanding the collaboration relationships among mathematicians,particularly those esteemed as elites,to reveal the structures of their communities and evaluate their impact on the fie... Purpose:This study focuses on understanding the collaboration relationships among mathematicians,particularly those esteemed as elites,to reveal the structures of their communities and evaluate their impact on the field of mathematics.Design/methodology/approach:Two community detection algorithms,namely Greedy Modularity Maximization and Infomap,are utilized to examine collaboration patterns among mathematicians.We conduct a comparative analysis of mathematicians’centrality,emphasizing the influence of award-winning individuals in connecting network roles such as Betweenness,Closeness,and Harmonic centrality.Additionally,we investigate the distribution of elite mathematicians across communities and their relationships within different mathematical sub-fields.Findings:The study identifies the substantial influence exerted by award-winning mathematicians in connecting network roles.The elite distribution across the network is uneven,with a concentration within specific communities rather than being evenly dispersed.Secondly,the research identifies a positive correlation between distinct mathematical sub-fields and the communities,indicating collaborative tendencies among scientists engaged in related domains.Lastly,the study suggests that reduced research diversity within a community might lead to a higher concentration of elite scientists within that specific community.Research limitations:The study’s limitations include its narrow focus on mathematicians,which may limit the applicability of the findings to broader scientific fields.Issues with manually collected data affect the reliability of conclusions about collaborative networks.Practical implications:This study offers valuable insights into how elite mathematicians collaborate and how knowledge is disseminated within mathematical circles.Understanding these collaborative behaviors could aid in fostering better collaboration strategies among mathematicians and institutions,potentially enhancing scientific progress in mathematics.Originality/value:The study adds value to understanding collaborative dynamics within the realm of mathematics,offering a unique angle for further exploration and research. 展开更多
关键词 Greedy modularity maximization Infomap Collaboration network Community detection Mathematical awardees
下载PDF
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
4
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 Wireless Sensor network(WSN) Node authentication Blockchain TANGLE Worm detection
下载PDF
A Study on Enhancing Chip Detection Efficiency Using the Lightweight Van-YOLOv8 Network
5
作者 Meng Huang Honglei Wei Xianyi Zhai 《Computers, Materials & Continua》 SCIE EI 2024年第4期531-547,共17页
In pursuit of cost-effective manufacturing,enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips.To ensure consistent chip orientation during packaging,a circular marker on the f... In pursuit of cost-effective manufacturing,enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips.To ensure consistent chip orientation during packaging,a circular marker on the front side is employed for pin alignment following successful functional testing.However,recycled chips often exhibit substantial surface wear,and the identification of the relatively small marker proves challenging.Moreover,the complexity of generic target detection algorithms hampers seamless deployment.Addressing these issues,this paper introduces a lightweight YOLOv8s-based network tailored for detecting markings on recycled chips,termed Van-YOLOv8.Initially,to alleviate the influence of diminutive,low-resolution markings on the precision of deep learning models,we utilize an upscaling approach for enhanced resolution.This technique relies on the Super-Resolution Generative Adversarial Network with Extended Training(SRGANext)network,facilitating the reconstruction of high-fidelity images that align with input specifications.Subsequently,we replace the original YOLOv8smodel’s backbone feature extraction network with the lightweight VanillaNetwork(VanillaNet),simplifying the branch structure to reduce network parameters.Finally,a Hybrid Attention Mechanism(HAM)is implemented to capture essential details from input images,improving feature representation while concurrently expediting model inference speed.Experimental results demonstrate that the Van-YOLOv8 network outperforms the original YOLOv8s on a recycled chip dataset in various aspects.Significantly,it demonstrates superiority in parameter count,computational intricacy,precision in identifying targets,and speed when compared to certain prevalent algorithms in the current landscape.The proposed approach proves promising for real-time detection of recycled chips in practical factory settings. 展开更多
关键词 Lightweight neural networks attention mechanisms image super-resolution enhancement feature extraction small object detection
下载PDF
Monitoring Sea Fog over the Yellow Sea and Bohai Bay Based on Deep Convolutional Neural Network
6
作者 HUANG Bin GAO Shi-bo +2 位作者 YU Run-ling ZHAO Wei ZHOU Guan-bo 《Journal of Tropical Meteorology》 SCIE 2024年第3期223-229,共7页
In this paper,we utilized the deep convolutional neural network D-LinkNet,a model for semantic segmentation,to analyze the Himawari-8 satellite data captured from 16 channels at a spatial resolution of 0.5 km,with a f... In this paper,we utilized the deep convolutional neural network D-LinkNet,a model for semantic segmentation,to analyze the Himawari-8 satellite data captured from 16 channels at a spatial resolution of 0.5 km,with a focus on the area over the Yellow Sea and the Bohai Sea(32°-42°N,117°-127°E).The objective was to develop an algorithm for fusing and segmenting multi-channel images from geostationary meteorological satellites,specifically for monitoring sea fog in this region.Firstly,the extreme gradient boosting algorithm was adopted to evaluate the data from the 16 channels of the Himawari-8 satellite for sea fog detection,and we found that the top three channels in order of importance were channels 3,4,and 14,which were fused into false color daytime images,while channels 7,13,and 15 were fused into false color nighttime images.Secondly,the simple linear iterative super-pixel clustering algorithm was used for the pixel-level segmentation of false color images,and based on super-pixel blocks,manual sea-fog annotation was performed to obtain fine-grained annotation labels.The deep convolutional neural network D-LinkNet was built on the ResNet backbone and the dilated convolutional layers with direct connections were added in the central part to form a string-and-combine structure with five branches having different depths and receptive fields.Results show that the accuracy rate of fog area(proportion of detected real fog to detected fog)was 66.5%,the recognition rate of fog zone(proportion of detected real fog to real fog or cloud cover)was 51.9%,and the detection accuracy rate(proportion of samples detected correctly to total samples)was 93.2%. 展开更多
关键词 deep convolutional neural network satellite images sea fog detection multi-channel image fusion
下载PDF
Advancing critical care recovery:The pivotal role of machine learning in early detection of intensive care unit-acquired weakness
7
作者 Georges Khattar Elie Bou Sanayeh 《World Journal of Clinical Cases》 SCIE 2024年第21期4455-4459,共5页
This editorial explores the significant challenge of intensive care unit-acquiredweakness(ICU-AW),a prevalent condition affecting critically ill patients,characterizedby profound muscle weakness and complicating patie... This editorial explores the significant challenge of intensive care unit-acquiredweakness(ICU-AW),a prevalent condition affecting critically ill patients,characterizedby profound muscle weakness and complicating patient recovery.Highlightingthe paradox of modern medical advances,it emphasizes the urgent needfor early identification and intervention to mitigate ICU-AW's impact.Innovatively,the study by Wang et al is showcased for employing a multilayer perceptronneural network model,achieving high accuracy in predicting ICU-AWrisk.This advancement underscores the potential of neural network models inenhancing patient care but also calls for continued research to address limitationsand improve model applicability.The editorial advocates for the developmentand validation of sophisticated predictive tools,aiming for personalized carestrategies to reduce ICU-AW incidence and severity,ultimately improving patientoutcomes in critical care settings. 展开更多
关键词 Critical illness myopathy Critical illness polyneuropathy Early detection Intensive care unit-acquired weakness Neural network models Patient outcomes Personalized intervention strategies Predictive modeling
下载PDF
Real Time Thermal Image Based Machine Learning Approach for Early Collision Avoidance System of Snowplows
8
作者 Fletcher Wadsworth Suresh S. Muknahallipatna Khaled Ksaibati 《Journal of Intelligent Learning Systems and Applications》 2024年第2期107-142,共36页
In an effort to reduce vehicle collisions with snowplows in poor weather conditions, this paper details the development of a real time thermal image based machine learning approach to an early collision avoidance syst... In an effort to reduce vehicle collisions with snowplows in poor weather conditions, this paper details the development of a real time thermal image based machine learning approach to an early collision avoidance system for snowplows, which intends to detect and estimate the distance of trailing vehicles. Due to the operational conditions of snowplows, which include heavy-blowing snow, traditional optical sensors like LiDAR and visible spectrum cameras have reduced effectiveness in detecting objects in such environments. Thus, we propose using a thermal infrared camera as the primary sensor along with machine learning algorithms. First, we curate a large dataset of thermal images of vehicles in heavy snow conditions. Using the curated dataset, two machine-learning models based on the modified ResNet architectures were trained to detect and estimate the trailing vehicle distance using real-time thermal images. The trained detection network was capable of detecting trailing vehicles 99.0% of the time at 1500.0 ft distance from the snowplow. The trained trailing distance network was capable of estimating distance with an average estimation error of 10.70 ft. The inference performance of the trained models is discussed, along with the interpretation of the performance. 展开更多
关键词 Convolutional Neural networks Residual networks Object Detection Image Processing thermal Imaging
下载PDF
Benchmark on the accuracy and efficiency of several neural network based phase pickers using datasets from China Seismic Network 被引量:4
9
作者 Ziye Yu Weitao Wang Yini Chen 《Earthquake Science》 2023年第2期113-131,共19页
Seismic phase pickers based on deep neural networks have been extensively used recently,demonstrating their advantages on both performance and efficiency.However,these pickers are trained with and applied to different... Seismic phase pickers based on deep neural networks have been extensively used recently,demonstrating their advantages on both performance and efficiency.However,these pickers are trained with and applied to different data.A comprehensive benchmark based on a single dataset is therefore lacking.Here,using the recently released DiTing dataset,we analyzed performances of seven phase pickers with different network structures,the efficiencies are also evaluated using both CPU and GPU devices.Evaluations based on F1-scores reveal that the recurrent neural network(RNN)and EQTransformer exhibit the best performance,likely owing to their large receptive fields.Similar performances are observed among PhaseNet(UNet),UNet++,and the lightweight phase picking network(LPPN).However,the LPPN models are the most efficient.The RNN and EQTransformer have similar speeds,which are slower than those of the LPPN and PhaseNet.UNet++requires the most computational effort among the pickers.As all of the pickers perform well after being trained with a large-scale dataset,users may choose the one suitable for their applications.For beginners,we provide a tutorial on training and validating the pickers using the DiTing dataset.We also provide two sets of models trained using datasets with both 50 Hz and 100 Hz sampling rates for direct application by end-users.All of our models are open-source and publicly accessible. 展开更多
关键词 neural network deep learning seismic phase picking earthquake detection open-source science
下载PDF
Line Fault Detection of DC Distribution Networks Using the Artificial Neural Network
10
作者 Xunyou Zhang Chuanyang Liu Zuo Sun 《Energy Engineering》 EI 2023年第7期1667-1683,共17页
ADC distribution network is an effective solution for increasing renewable energy utilization with distinct benefits,such as high efficiency and easy control.However,a sudden increase in the current after the occurren... ADC distribution network is an effective solution for increasing renewable energy utilization with distinct benefits,such as high efficiency and easy control.However,a sudden increase in the current after the occurrence of faults in the network may adversely affect network stability.This study proposes an artificial neural network(ANN)-based fault detection and protection method for DC distribution networks.The ANN is applied to a classifier for different faults ontheDC line.The backpropagationneuralnetwork is used to predict the line current,and the fault detection threshold is obtained on the basis of the difference between the predicted current and the actual current.The proposed method only uses local signals,with no requirement of a strict communication link.Simulation experiments are conducted for the proposed algorithm on a two-terminal DC distribution network modeled in the PSCAD/EMTDC and developed on the MATLAB platform.The results confirm that the proposed method can accurately detect and classify line faults within a few milliseconds and is not affected by fault locations,fault resistance,noise,and communication delay. 展开更多
关键词 Artificial neural network DC distribution network fault detection
下载PDF
A method of convolutional neural network based on frequency segmentation for monitoring the state of wind turbine blades
11
作者 Weijun Zhu Yunan Wu +3 位作者 Zhenye Sun Wenzhong Shen Guangxing Guo Jianwei Lin 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2023年第6期465-480,共16页
Wind turbine blades are prone to failure due to high tip speed,rain,dust and so on.A surface condition detecting approach based on wind turbine blade aerodynamic noise is proposed.On the experimental measurement data,... Wind turbine blades are prone to failure due to high tip speed,rain,dust and so on.A surface condition detecting approach based on wind turbine blade aerodynamic noise is proposed.On the experimental measurement data,variational mode decomposition filtering and Mel spectrogram drawing are conducted first.The Mel spectrogram is divided into two halves based on frequency characteristics and then sent into the convolutional neural network.Gaussian white noise is superimposed on the original signal and the output results are assessed based on score coefficients,considering the complexity of the real environment.The surfaces of Wind turbine blades are classified into four types:standard,attachments,polishing,and serrated trailing edge.The proposed method is evaluated and the detection accuracy in complicated background conditions is found to be 99.59%.In addition to support the differentiation of trained models,utilizing proper score coefficients also permit the screening of unknown types. 展开更多
关键词 Wind turbine aerodynamic noise Surface condition detection Mel spectrogram Image segmentation Convolution neural network(CNN)
下载PDF
BP neural network model on the forecast for blasting vibrating parameters in the course of hole-by-hole detonation 被引量:4
12
作者 DUAN Bao-fu LI Jun-meng ZHANG Meng 《Journal of Coal Science & Engineering(China)》 2010年第3期249-255,共7页
According to the neural network theory, combined with the technical characteristicsof the hole-by-hole detonation technology, a BP network model on the forecast forblasting vibration parameters was built.Taking the de... According to the neural network theory, combined with the technical characteristicsof the hole-by-hole detonation technology, a BP network model on the forecast forblasting vibration parameters was built.Taking the deep hole stair demolition in a mine asan experimental object and using the raw information and the blasting vibration monitoringdata collected in the process of the hole-by-hole detonation, carried out some training andapplication work on the established BP network model through the Matlab software, andachieved good effect.Also computed the vibration parameter with the empirical formulaand the BP network model separately.After comparing with the actual value, it is discoveredthat the forecasting result by the BP network model is close to the actual value. 展开更多
关键词 blasting vibration BP neural network detonation hole-by-hole prediction model
下载PDF
Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections 被引量:1
13
作者 Dmitry Gura Bo Dong +1 位作者 Duaa Mehiar Nidal Al Said 《Computers, Materials & Continua》 SCIE EI 2024年第5期1995-2014,共20页
The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method in... The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos. 展开更多
关键词 Deep fake detection video analysis convolutional neural network machine learning video dataset collection facial landmark prediction accuracy models
下载PDF
A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions
14
作者 Monirah Al-Ajlan Mourad Ykhlef 《Computers, Materials & Continua》 SCIE EI 2024年第11期2053-2076,共24页
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener... The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps. 展开更多
关键词 Intrusion detection systems network security generative networks deep learning DATASET
下载PDF
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
15
作者 Deema Alsekait Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第11期2395-2436,共42页
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t... The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats. 展开更多
关键词 Obfuscated malware detection IoT devices Wide Residual network(WRN) malware detection machine learning
下载PDF
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things
16
作者 Mengmeng Zhao Haipeng Peng +1 位作者 Lixiang Li Yeqing Ren 《Computers, Materials & Continua》 SCIE EI 2024年第8期2815-2837,共23页
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A... In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods. 展开更多
关键词 Multivariate time series anomaly detection spatial-temporal network TRANSFORMER
下载PDF
Detection of Oscillations in Process Control Loops From Visual Image Space Using Deep Convolutional Networks
17
作者 Tao Wang Qiming Chen +3 位作者 Xun Lang Lei Xie Peng Li Hongye Su 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期982-995,共14页
Oscillation detection has been a hot research topic in industries due to the high incidence of oscillation loops and their negative impact on plant profitability.Although numerous automatic detection techniques have b... Oscillation detection has been a hot research topic in industries due to the high incidence of oscillation loops and their negative impact on plant profitability.Although numerous automatic detection techniques have been proposed,most of them can only address part of the practical difficulties.An oscillation is heuristically defined as a visually apparent periodic variation.However,manual visual inspection is labor-intensive and prone to missed detection.Convolutional neural networks(CNNs),inspired by animal visual systems,have been raised with powerful feature extraction capabilities.In this work,an exploration of the typical CNN models for visual oscillation detection is performed.Specifically,we tested MobileNet-V1,ShuffleNet-V2,Efficient Net-B0,and GhostNet models,and found that such a visual framework is well-suited for oscillation detection.The feasibility and validity of this framework are verified utilizing extensive numerical and industrial cases.Compared with state-of-theart oscillation detectors,the suggested framework is more straightforward and more robust to noise and mean-nonstationarity.In addition,this framework generalizes well and is capable of handling features that are not present in the training data,such as multiple oscillations and outliers. 展开更多
关键词 Convolutional neural networks(CNNs) deep learning image processing oscillation detection process industries
下载PDF
Model Agnostic Meta-Learning(MAML)-Based Ensemble Model for Accurate Detection of Wheat Diseases Using Vision Transformer and Graph Neural Networks
18
作者 Yasir Maqsood Syed Muhammad Usman +3 位作者 Musaed Alhussein Khursheed Aurangzeb Shehzad Khalid Muhammad Zubair 《Computers, Materials & Continua》 SCIE EI 2024年第5期2795-2811,共17页
Wheat is a critical crop,extensively consumed worldwide,and its production enhancement is essential to meet escalating demand.The presence of diseases like stem rust,leaf rust,yellow rust,and tan spot significantly di... Wheat is a critical crop,extensively consumed worldwide,and its production enhancement is essential to meet escalating demand.The presence of diseases like stem rust,leaf rust,yellow rust,and tan spot significantly diminishes wheat yield,making the early and precise identification of these diseases vital for effective disease management.With advancements in deep learning algorithms,researchers have proposed many methods for the automated detection of disease pathogens;however,accurately detectingmultiple disease pathogens simultaneously remains a challenge.This challenge arises due to the scarcity of RGB images for multiple diseases,class imbalance in existing public datasets,and the difficulty in extracting features that discriminate between multiple classes of disease pathogens.In this research,a novel method is proposed based on Transfer Generative Adversarial Networks for augmenting existing data,thereby overcoming the problems of class imbalance and data scarcity.This study proposes a customized architecture of Vision Transformers(ViT),where the feature vector is obtained by concatenating features extracted from the custom ViT and Graph Neural Networks.This paper also proposes a Model AgnosticMeta Learning(MAML)based ensemble classifier for accurate classification.The proposedmodel,validated on public datasets for wheat disease pathogen classification,achieved a test accuracy of 99.20%and an F1-score of 97.95%.Compared with existing state-of-the-art methods,this proposed model outperforms in terms of accuracy,F1-score,and the number of disease pathogens detection.In future,more diseases can be included for detection along with some other modalities like pests and weed. 展开更多
关键词 Wheat disease detection deep learning vision transformer graph neural network model agnostic meta learning
下载PDF
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder
19
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 Intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
20
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部