期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Study on the detection of abnormal sounding data based on LS-SVM 被引量:3
1
作者 HUANG Xianyuan ZHAI Guojun +1 位作者 SUI Lifen CHAI Hongzhou 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2010年第6期115-120,共6页
A new method of detecting abnormal sounding data based on LS-SVM is presented.The theorem proves that the trend surface filter is the especial result of LS-SVM.In order to depict the relationship of trend surface filt... A new method of detecting abnormal sounding data based on LS-SVM is presented.The theorem proves that the trend surface filter is the especial result of LS-SVM.In order to depict the relationship of trend surface filter and LS-SVM,a contrast is given.The example shows that abnormal sounding data could be detected effectively by LS-SVM when the training samples and kernel function are reasonable. 展开更多
关键词 LS-SVM trend surface filter kernel function abnormal sounding data
下载PDF
Fog Computing Architecture-Based Data Acquisition for WSN Applications 被引量:2
2
作者 Guangwei Zhang Ruifan Li 《China Communications》 SCIE CSCD 2017年第11期69-81,共13页
Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and erro... Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and error, missing values or inconsistent data. Motivated by fog computing, which focuses on how to effectively offload computation-intensive tasks from resource-constrained devices, this paper proposes a simple but yet effective data acquisition approach with the ability of filtering abnormal data and meeting the real-time requirement. Our method uses a cooperation mechanism by leveraging on both an architectural and algorithmic approach. Firstly, the sensor node with the limited computing resource only accomplishes detecting and marking the suspicious data using a light weight algorithm. Secondly, the cluster head evaluates suspicious data by referring to the data from the other sensor nodes in the same cluster and discard the abnormal data directly. Thirdly, the sink node fills up the discarded data with an approximate value using nearest neighbor data supplement method. Through the architecture, each node only consumes a few computational resources and distributes the heavily computing load to several nodes. Simulation results show that our data acquisition method is effective considering the real-time outlier filtering and the computing overhead. 展开更多
关键词 WSN fog computing abnormal data data filtering intrusion tolerance
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
3
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
Real-Time Anomaly Detection in Packaged Food X-Ray Images Using Supervised Learning
4
作者 Kangjik Kim Hyunbin Kim +3 位作者 Junchul Chun Mingoo Kang Min Hong Byungseok Min 《Computers, Materials & Continua》 SCIE EI 2021年第5期2547-2568,共22页
Physical contamination of food occurs when it comes into contact with foreign objects.Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as bro... Physical contamination of food occurs when it comes into contact with foreign objects.Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as broken teeth or choking.Therefore,a preventive method that can detect and remove foreign objects in advance is required.Several studies have attempted to detect defective products using deep learning networks.Because it is difficult to obtain foreign object-containing food data from industry,most studies on industrial anomaly detection have used unsupervised learning methods.This paper proposes a new method for real-time anomaly detection in packaged food products using a supervised learning network.In this study,a realistic X-ray image training dataset was constructed by augmenting foreign objects with normal product images in a cut-paste manner.Based on the augmented training dataset,we trained YOLOv4,a real-time object detection network,and detected foreign objects in the test data.We evaluated this method on images of pasta,snacks,pistachios,and red beans under the same conditions.The results show that the normal and defective products were classified with an accuracy of at least 94%for all packaged foods.For detecting foreign objects that are typically difficult to detect using the unsupervised learning and traditional methods,the proposed method achieved high-performance realtime anomaly detection.In addition,to eliminate the loss in high-resolution X-ray images,the false positive rate and accuracy could be lowered to 5%with patch-based training and a new post-processing algorithm. 展开更多
关键词 Deep-learning anomaly detection packaged food X-ray detection foreign substances detection abnormal data augmentation
下载PDF
Technical methods of national security supervision:Grain storage security as an example 被引量:1
5
作者 Yudie Jianyao Qi Zhang +1 位作者 Liang Ge Jianguo Chen 《Journal of Safety Science and Resilience》 CSCD 2023年第1期61-74,共14页
Grain security guarantees national security.China has many widely distributed grain depots to supervise grain storage security.However,this has led to a lack of regulatory capacity and manpower.Amid the development of... Grain security guarantees national security.China has many widely distributed grain depots to supervise grain storage security.However,this has led to a lack of regulatory capacity and manpower.Amid the development of reserve-level information technology,big data supervision of grain storage security should be improved.This study proposes big data research architecture and an analysis model for grain storage security;as an example,it illustrates the supervision of the grain loss problem in storage security.The statistical analysis model and the prediction and clustering-based model for grain loss supervision were used to mine abnormal data.A combination of feature extraction and feature selection reduction methods were chosen for dimensionality.A comparative analysis showed that the nonlinear prediction model performed better on the grain loss data set,with R2 of 87.21%,87.83%,91.97%,and 89.40%for Gradient Boosting Regressor(GBR),Random Forest,Decision Tree,XGBoost regression on test sets,respectively.Nineteen abnormal data were filtered out by GBR combined with residuals as an example.The deep learning model had the best performance on the mean absolute error,with an R2 of 85.14%on the test set and only one abnormal data identified.This is contrary to the original intention of finding as many anomalies as possible for supervisory purposes.Five classes were generated using principal component analysis dimensionality reduction combined with Density-Based Spatial Clustering of Applications with Noise(DBSCAN)clustering,with 11 anomalous data points screened by adding the amount of normalized grain loss.Based on the existing grain information system,this paper provides a supervision model for grain storage that can help mine abnormal data.Unlike the current post-event supervision model,this study proposes a pre-event supervision model.This study provides a framework of ideas for subsequent scholarly research;the addition of big data technology will help improve efficient supervisory capacity in the field of grain supervision. 展开更多
关键词 Grain storage security Supervision model abnormal data mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部