期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A method for cleaning wind power anomaly data by combining image processing with community detection algorithms
1
作者 Qiaoling Yang Kai Chen +2 位作者 Jianzhang Man Jiaheng Duan Zuoqi Jin 《Global Energy Interconnection》 EI CSCD 2024年第3期293-312,共20页
Current methodologies for cleaning wind power anomaly data exhibit limited capabilities in identifying abnormal data within extensive datasets and struggle to accommodate the considerable variability and intricacy of ... Current methodologies for cleaning wind power anomaly data exhibit limited capabilities in identifying abnormal data within extensive datasets and struggle to accommodate the considerable variability and intricacy of wind farm data.Consequently,a method for cleaning wind power anomaly data by combining image processing with community detection algorithms(CWPAD-IPCDA)is proposed.To precisely identify and initially clean anomalous data,wind power curve(WPC)images are converted into graph structures,which employ the Louvain community recognition algorithm and graph-theoretic methods for community detection and segmentation.Furthermore,the mathematical morphology operation(MMO)determines the main part of the initially cleaned wind power curve images and maps them back to the normal wind power points to complete the final cleaning.The CWPAD-IPCDA method was applied to clean datasets from 25 wind turbines(WTs)in two wind farms in northwest China to validate its feasibility.A comparison was conducted using density-based spatial clustering of applications with noise(DBSCAN)algorithm,an improved isolation forest algorithm,and an image-based(IB)algorithm.The experimental results demonstrate that the CWPAD-IPCDA method surpasses the other three algorithms,achieving an approximately 7.23%higher average data cleaning rate.The mean value of the sum of the squared errors(SSE)of the dataset after cleaning is approximately 6.887 lower than that of the other algorithms.Moreover,the mean of overall accuracy,as measured by the F1-score,exceeds that of the other methods by approximately 10.49%;this indicates that the CWPAD-IPCDA method is more conducive to improving the accuracy and reliability of wind power curve modeling and wind farm power forecasting. 展开更多
关键词 Wind turbine power curve Abnormal data cleaning Community detection Louvain algorithm Mathematical morphology operation
下载PDF
Study on the detection of abnormal sounding data based on LS-SVM 被引量:3
2
作者 HUANG Xianyuan ZHAI Guojun +1 位作者 SUI Lifen CHAI Hongzhou 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2010年第6期115-120,共6页
A new method of detecting abnormal sounding data based on LS-SVM is presented.The theorem proves that the trend surface filter is the especial result of LS-SVM.In order to depict the relationship of trend surface filt... A new method of detecting abnormal sounding data based on LS-SVM is presented.The theorem proves that the trend surface filter is the especial result of LS-SVM.In order to depict the relationship of trend surface filter and LS-SVM,a contrast is given.The example shows that abnormal sounding data could be detected effectively by LS-SVM when the training samples and kernel function are reasonable. 展开更多
关键词 LS-SVM trend surface filter kernel function abnormal sounding data
下载PDF
Fog Computing Architecture-Based Data Acquisition for WSN Applications 被引量:2
3
作者 Guangwei Zhang Ruifan Li 《China Communications》 SCIE CSCD 2017年第11期69-81,共13页
Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and erro... Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and error, missing values or inconsistent data. Motivated by fog computing, which focuses on how to effectively offload computation-intensive tasks from resource-constrained devices, this paper proposes a simple but yet effective data acquisition approach with the ability of filtering abnormal data and meeting the real-time requirement. Our method uses a cooperation mechanism by leveraging on both an architectural and algorithmic approach. Firstly, the sensor node with the limited computing resource only accomplishes detecting and marking the suspicious data using a light weight algorithm. Secondly, the cluster head evaluates suspicious data by referring to the data from the other sensor nodes in the same cluster and discard the abnormal data directly. Thirdly, the sink node fills up the discarded data with an approximate value using nearest neighbor data supplement method. Through the architecture, each node only consumes a few computational resources and distributes the heavily computing load to several nodes. Simulation results show that our data acquisition method is effective considering the real-time outlier filtering and the computing overhead. 展开更多
关键词 WSN fog computing abnormal data data filtering intrusion tolerance
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
4
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
Research on Real-time Monitoring of Abnormal Seismic Noise 被引量:1
5
作者 Lin Binhua Jin Xing +3 位作者 Liao Shirong Li Jun Huang Linzhu Chen Huifang 《Earthquake Research in China》 CSCD 2016年第2期224-232,共9页
The noise data in vertical component records of 85 seismic stations in Fujian Province during 2012 is used as the research object in this paper. The noise data is divided into fiveminute segments to calculate the powe... The noise data in vertical component records of 85 seismic stations in Fujian Province during 2012 is used as the research object in this paper. The noise data is divided into fiveminute segments to calculate the power spectra. The high reference line and low reference line of station are then identified by drawing a probability density function graph( PDF)using the power spectral probability density function. Moreover, according to the anomalies of PDF graphs in 85 seismic stations,the abnormal noise is divided into four categories: dropped packet, low noise, high noise, and median noise anomalies.Afterwards,four selection methods are found by the high or low noise reference line of the stations,and the system of real-time monitoring of seismic noise is formed by combining the four selection methods. Noise records of 85 seismic stations in Fujian Province in July2013 are selected for verification,and the results show that the anomalous noise-recognition system could reach a 90% success rate at most stations and the effect of selection are very good. Therefore,it could be applied to the seismic noise real-time monitoring in stations. 展开更多
关键词 Seismic noise Power spectral density Probability density function Powerspectrum Abnormity data quality
下载PDF
Real-Time Anomaly Detection in Packaged Food X-Ray Images Using Supervised Learning
6
作者 Kangjik Kim Hyunbin Kim +3 位作者 Junchul Chun Mingoo Kang Min Hong Byungseok Min 《Computers, Materials & Continua》 SCIE EI 2021年第5期2547-2568,共22页
Physical contamination of food occurs when it comes into contact with foreign objects.Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as bro... Physical contamination of food occurs when it comes into contact with foreign objects.Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as broken teeth or choking.Therefore,a preventive method that can detect and remove foreign objects in advance is required.Several studies have attempted to detect defective products using deep learning networks.Because it is difficult to obtain foreign object-containing food data from industry,most studies on industrial anomaly detection have used unsupervised learning methods.This paper proposes a new method for real-time anomaly detection in packaged food products using a supervised learning network.In this study,a realistic X-ray image training dataset was constructed by augmenting foreign objects with normal product images in a cut-paste manner.Based on the augmented training dataset,we trained YOLOv4,a real-time object detection network,and detected foreign objects in the test data.We evaluated this method on images of pasta,snacks,pistachios,and red beans under the same conditions.The results show that the normal and defective products were classified with an accuracy of at least 94%for all packaged foods.For detecting foreign objects that are typically difficult to detect using the unsupervised learning and traditional methods,the proposed method achieved high-performance realtime anomaly detection.In addition,to eliminate the loss in high-resolution X-ray images,the false positive rate and accuracy could be lowered to 5%with patch-based training and a new post-processing algorithm. 展开更多
关键词 Deep-learning anomaly detection packaged food X-ray detection foreign substances detection abnormal data augmentation
下载PDF
Technical methods of national security supervision:Grain storage security as an example 被引量:1
7
作者 Yudie Jianyao Qi Zhang +1 位作者 Liang Ge Jianguo Chen 《Journal of Safety Science and Resilience》 CSCD 2023年第1期61-74,共14页
Grain security guarantees national security.China has many widely distributed grain depots to supervise grain storage security.However,this has led to a lack of regulatory capacity and manpower.Amid the development of... Grain security guarantees national security.China has many widely distributed grain depots to supervise grain storage security.However,this has led to a lack of regulatory capacity and manpower.Amid the development of reserve-level information technology,big data supervision of grain storage security should be improved.This study proposes big data research architecture and an analysis model for grain storage security;as an example,it illustrates the supervision of the grain loss problem in storage security.The statistical analysis model and the prediction and clustering-based model for grain loss supervision were used to mine abnormal data.A combination of feature extraction and feature selection reduction methods were chosen for dimensionality.A comparative analysis showed that the nonlinear prediction model performed better on the grain loss data set,with R2 of 87.21%,87.83%,91.97%,and 89.40%for Gradient Boosting Regressor(GBR),Random Forest,Decision Tree,XGBoost regression on test sets,respectively.Nineteen abnormal data were filtered out by GBR combined with residuals as an example.The deep learning model had the best performance on the mean absolute error,with an R2 of 85.14%on the test set and only one abnormal data identified.This is contrary to the original intention of finding as many anomalies as possible for supervisory purposes.Five classes were generated using principal component analysis dimensionality reduction combined with Density-Based Spatial Clustering of Applications with Noise(DBSCAN)clustering,with 11 anomalous data points screened by adding the amount of normalized grain loss.Based on the existing grain information system,this paper provides a supervision model for grain storage that can help mine abnormal data.Unlike the current post-event supervision model,this study proposes a pre-event supervision model.This study provides a framework of ideas for subsequent scholarly research;the addition of big data technology will help improve efficient supervisory capacity in the field of grain supervision. 展开更多
关键词 Grain storage security Supervision model Abnormal data mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部