期刊文献+
共找到5,320篇文章
< 1 2 250 >
每页显示 20 50 100
Defect Detection Model Using Time Series Data Augmentation and Transformation
1
作者 Gyu-Il Kim Hyun Yoo +1 位作者 Han-Jin Cho Kyungyong Chung 《Computers, Materials & Continua》 SCIE EI 2024年第2期1713-1730,共18页
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende... Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight. 展开更多
关键词 Defect detection time series deep learning data augmentation data transformation
下载PDF
Digital Transformation of Enterprise Human Resource Management Enabled by Big Data
2
作者 Zhefan Zhuang 《Proceedings of Business and Economic Studies》 2024年第2期60-65,共6页
With the continuous development of big data technology,the digital transformation of enterprise human resource management has become a development trend.Human resources is one of the most important resources of enterp... With the continuous development of big data technology,the digital transformation of enterprise human resource management has become a development trend.Human resources is one of the most important resources of enterprises,which is crucial to the competitiveness of enterprises.Enterprises need to attract,retain,and motivate excellent employees,thereby enhancing the innovation ability of enterprises and improving competitiveness and market share in the market.To maintain advantages in the fierce market competition,enterprises need to adopt more scientific and effective human resource management methods to enhance organizational efficiency and competitiveness.At the same time,this paper analyzes the dilemma faced by enterprise human resource management,points out the new characteristics of enterprise human resource management enabled by big data,and puts forward feasible suggestions for enterprise digital transformation. 展开更多
关键词 Big data Digital transformation Enterprise management Human resource management
下载PDF
A Real-time Lithological Identification Method based on SMOTE-Tomek and ICSA Optimization
3
作者 DENG Song PAN Haoyu +5 位作者 LI Chaowei YAN Xiaopeng WANG Jiangshuai SHI Lin PEI Chunyu CAI Meng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2024年第2期518-530,共13页
In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on ... In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process. 展开更多
关键词 mud logging data real-time lithological identification improved crow search algorithm petroleum geological exploration SMOTE-Tomek
下载PDF
Real-time prediction of mechanical behaviors of underwater shield tunnel structure using machine learning method based on structural health monitoring data 被引量:1
4
作者 Xuyan Tan Weizhong Chen +2 位作者 Tao Zou Jianping Yang Bowen Du 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2023年第4期886-895,共10页
Predicting the mechanical behaviors of structure and perceiving the anomalies in advance are essential to ensuring the safe operation of infrastructures in the long run.In addition to the incomplete consideration of i... Predicting the mechanical behaviors of structure and perceiving the anomalies in advance are essential to ensuring the safe operation of infrastructures in the long run.In addition to the incomplete consideration of influencing factors,the prediction time scale of existing studies is rough.Therefore,this study focuses on the development of a real-time prediction model by coupling the spatio-temporal correlation with external load through autoencoder network(ATENet)based on structural health monitoring(SHM)data.An autoencoder mechanism is performed to acquire the high-level representation of raw monitoring data at different spatial positions,and the recurrent neural network is applied to understanding the temporal correlation from the time series.Then,the obtained temporal-spatial information is coupled with dynamic loads through a fully connected layer to predict structural performance in next 12 h.As a case study,the proposed model is formulated on the SHM data collected from a representative underwater shield tunnel.The robustness study is carried out to verify the reliability and the prediction capability of the proposed model.Finally,the ATENet model is compared with some typical models,and the results indicate that it has the best performance.ATENet model is of great value to predict the realtime evolution trend of tunnel structure. 展开更多
关键词 Shied tunnel Machine learning MONITORING real-time prediction data analysis
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
5
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience real-time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT
6
作者 Muhammad Tahir Mingchu Li +4 位作者 Irfan Khan Salman AAl Qahtani Rubia Fatima Javed Ali Khan Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第11期2529-2544,共16页
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the eff... Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems.We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this.This strategy is devised to streamline the data retrieval path,subsequently diminishing network strain.Crafting an adept cache processing scheme poses its own set of challenges,especially given the transient nature of monitoring data and the imperative for swift data transmission,intertwined with resource allocation tactics.This paper unveils a novel mobile healthcare solution that harnesses the power of our collaborative caching approach,facilitating nuanced health monitoring via edge devices.The system capitalizes on cloud computing for intricate health data analytics,especially in pinpointing health anomalies.Given the dynamic locational shifts and possible connection disruptions,we have architected a hierarchical detection system,particularly during crises.This system caches data efficiently and incorporates a detection utility to assess data freshness and potential lag in response times.Furthermore,we introduce the Cache-Assisted Real-Time Detection(CARD)model,crafted to optimize utility.Addressing the inherent complexity of the NP-hard CARD model,we have championed a greedy algorithm as a solution.Simulations reveal that our collaborative caching technique markedly elevates the Cache Hit Ratio(CHR)and data freshness,outshining its contemporaneous benchmark algorithms.The empirical results underscore the strength and efficiency of our innovative IoHT-based health monitoring solution.To encapsulate,this paper tackles the nuances of real-time health data monitoring in the IoHT landscape,presenting a joint edge-cloud caching strategy paired with a hierarchical detection system.Our methodology yields enhanced cache efficiency and data freshness.The corroborative numerical data accentuates the feasibility and relevance of our model,casting a beacon for the future trajectory of real-time health data monitoring systems. 展开更多
关键词 real-time health data monitoring Cache-Assisted real-time Detection(CARD) edge-cloud collaborative caching scheme hierarchical detection Internet of Health Things(IoHT)
下载PDF
基于生成对抗Transformer的电力负荷数据异常检测 被引量:1
7
作者 陆旦宏 范文尧 +3 位作者 杨婷 倪敏珏 李思琦 朱晓 《电力工程技术》 北大核心 2024年第1期157-164,共8页
电力负荷异常数据将给电力系统规划、负荷预测以及用能分析等带来较大的负面影响,因此亟须对负荷数据异常进行检测与识别。首先,针对电力负荷数据异常分类、原因及其特征开展分析。其次,改进传统Transformer编码器结构,采用多头注意力... 电力负荷异常数据将给电力系统规划、负荷预测以及用能分析等带来较大的负面影响,因此亟须对负荷数据异常进行检测与识别。首先,针对电力负荷数据异常分类、原因及其特征开展分析。其次,改进传统Transformer编码器结构,采用多头注意力层代替掩码多头注意力层,同时移除前馈网络,以提高模型对负荷时序序列的全局注意力。基于生成对抗网络(generative adversarial networks,GAN)生成器与判别器的博弈结构,提出一种改进的GAN-Transformer模型,以更好地捕捉趋势性特征并加速模型收敛。然后,引入多阶段映射与训练方法,综合焦点分数打分机制,通过分阶段负荷序列重构帮助模型更好地提取负荷数据异常特征。最后,算例分析结果表明,GAN-Transformer模型在负荷数据异常检测精确率、召回率、F_(1)值以及训练时间方面均具有更优的性能,验证了所提方法的有效性和优越性。文中研究工作为基于深度学习进一步实现电力负荷数据异常分类与数据修复提供了有益参考。 展开更多
关键词 电力负荷数据 数据异常检测 生成对抗网络(GAN)-transformer 多阶段训练与映射 焦点分数 序列重构
下载PDF
CNN-Transformer结合对比学习的高光谱与LiDAR数据协同分类
8
作者 吴海滨 戴诗语 +2 位作者 王爱丽 岩堀祐之 于效宇 《光学精密工程》 EI CAS CSCD 北大核心 2024年第7期1087-1100,共14页
针对高光谱图像(hyperspectral images,HSI)与LiDAR数据多模态分类任务中的跨模态信息表达和特征对齐等问题,提出一种基于对比学习CNN-Transformer高光谱和LiDAR数据协同分类网络(Contrastive Learning based CNNTransformer Network,CL... 针对高光谱图像(hyperspectral images,HSI)与LiDAR数据多模态分类任务中的跨模态信息表达和特征对齐等问题,提出一种基于对比学习CNN-Transformer高光谱和LiDAR数据协同分类网络(Contrastive Learning based CNNTransformer Network,CLCT-Net)。CLCT-Net通过由ConvNeXt V2 Block构成的共有特征提取模块,获得不同模态间的共性特征,解决异构传感器数据之间语义对齐的问题。构建了包含空间-通道分支和光谱上下文分支的双分支HSI编码器,以及结合频域自注意力机制的LiDAR编码器,以获取更丰富的特征表示。利用集成对比学习进行分类,进一步提升多模态数据协同分类的精度。在Houston 2013和Trento数据集上的实验结果表明,相较于其他高光谱图像和Li‐DAR数据分类模型,本文所提模型获得了更高的地物分类精度,分别达到了92.01%和98.90%,实现了跨模态数据特征的深度挖掘和协同提取。 展开更多
关键词 高光谱图像 激光雷达数据 transformER 卷积神经网络 对比学习
下载PDF
基于Transformer的司法文书命名实体识别方法
9
作者 王颖洁 张程烨 +1 位作者 白凤波 汪祖民 《计算机科学》 CSCD 北大核心 2024年第S01期113-121,共9页
命名实体识别是自然语言处理领域的关键任务之一,是实现下游任务的基础。目前针对司法领域的相关研究相对较少,司法系统的信息化和智能化转型仍有许多问题亟需解决。相比其他领域的文本,司法文书存在专业性强、语料资源少等局限,导致现... 命名实体识别是自然语言处理领域的关键任务之一,是实现下游任务的基础。目前针对司法领域的相关研究相对较少,司法系统的信息化和智能化转型仍有许多问题亟需解决。相比其他领域的文本,司法文书存在专业性强、语料资源少等局限,导致现有的司法文书识别结果较低。因此,从以下3方面开展研究:首先,提出了一种多标签层级迭代的文本标注方式,可以对原始司法文书文本进行自动化标注,同时有效地提升司法文书命名实体识别任务的实体识别效果;其次,提出了一种交融式的Transformer神经网络模型,对汉字固有属性的深层特征进行了充分利用,用于对司法文书进行命名实体识别;最后,对所提出的标注方法和模型与其他神经网络模型进行了对比实验。所提出的文本标注方式可以较为准确地实现司法文书的标注任务;同时,所提出的模型在通用数据集中相对于对照模型有较大的提高,并在司法领域数据集中取得了良好的效果。 展开更多
关键词 自然语言处理 数据标注 transformer模型 深度学习 司法信息化
下载PDF
融合Transformer和卷积LSTM的轨迹分类网络
10
作者 夏英 陈航 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2024年第1期29-38,共10页
为了减少原始轨迹数据的噪声,充分提取轨迹的时空特征,提高基于轨迹数据的交通模式分类精度,提出一种融合堆叠降噪自编码器、Transformer和卷积长短期记忆网络的轨迹分类网络(networks fusing stacked denoising auto-encoder, Transfor... 为了减少原始轨迹数据的噪声,充分提取轨迹的时空特征,提高基于轨迹数据的交通模式分类精度,提出一种融合堆叠降噪自编码器、Transformer和卷积长短期记忆网络的轨迹分类网络(networks fusing stacked denoising auto-encoder, Transformer and ConvLSTM,SDAETC)。通过堆叠降噪自编码器减少原始轨迹数据中的噪声;利用结合了Transformer的递归图自编码器,提取到更为丰富的时间特征,同时利用特征图自编码器提取空间特征;改进卷积长短期记忆网络,充分提取轨迹中的时空特征,并与提取到的时间特征和空间特征相融合,从而实现交通模式分类。实验结果表明,提出的SDAETC与基线模型相比,在GeoLife和SHL数据集上的准确率分别提升了1.8%和2%。此外,消融实验结果和模型训练时间分析表明,引入堆叠降噪自编码器、Transfomer和ConvLSTM虽然增加了时间消耗,但是对分类精度有积极贡献。 展开更多
关键词 轨迹数据 交通方式分类 时空特征 堆叠降噪自编码器 transformER 卷积长短期记忆网络
下载PDF
Quality control of marine big data——a case study of real-time observation station data in Qingdao 被引量:6
11
作者 QIAN Chengcheng LIU Aichao +4 位作者 HUANG Rui LIU Qingrong XU Wenkun ZHONG Shan YU Le 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2019年第6期1983-1993,共11页
Offshore waters provide resources for human beings,while on the other hand,threaten them because of marine disasters.Ocean stations are part of offshore observation networks,and the quality of their data is of great s... Offshore waters provide resources for human beings,while on the other hand,threaten them because of marine disasters.Ocean stations are part of offshore observation networks,and the quality of their data is of great significance for exploiting and protecting the ocean.We used hourly mean wave height,temperature,and pressure real-time observation data taken in the Xiaomaidao station(in Qingdao,China)from June 1,2017,to May 31,2018,to explore the data quality using eight quality control methods,and to discriminate the most effective method for Xiaomaidao station.After using the eight quality control methods,the percentages of the mean wave height,temperature,and pressure data that passed the tests were 89.6%,88.3%,and 98.6%,respectively.With the marine disaster(wave alarm report)data,the values failed in the test mainly due to the influence of aging observation equipment and missing data transmissions.The mean wave height is often affected by dynamic marine disasters,so the continuity test method is not effective.The correlation test with other related parameters would be more useful for the mean wave height. 展开更多
关键词 quality control real-time STATION data MARINE BIG data Xiaomaidao STATION MARINE DISASTER
下载PDF
A multi-sensor-based distributed real-time measurement system for glacier deformation
12
作者 DONG Han-chuan LIU Shuang +4 位作者 PANG Li-li TAO Zhi-gang FANG Li-de ZHANG Zhong-hua LI Xiao-ting 《Journal of Mountain Science》 SCIE CSCD 2023年第10期2913-2927,共15页
Glacier disasters occur frequently in alpine regions around the world,but the current conventional geological disaster measurement technology cannot be directly used for glacier disaster measurement.Hence,in this stud... Glacier disasters occur frequently in alpine regions around the world,but the current conventional geological disaster measurement technology cannot be directly used for glacier disaster measurement.Hence,in this study,a distributed multi-sensor measurement system for glacier deformation was established by integrating piezoelectric sensing,coded sensing,attitude sensing technology and wireless communication technology.The traditional Modbus protocol was optimized to solve the problem of data identification confusion of different acquisition nodes.Through indoor wireless transmission,adaptive performance analysis,error measurement experiment and landslide simulation experiment,the performance of the measurement system was analyzed and evaluated.Using unmanned aerial vehicle technology,the reliability and effectiveness of the measurement system were verified on the site of Galongla glacier in southeastern Tibet,China.The results show that the mean absolute percentage errors were only 1.13%and 2.09%for the displacement and temperature,respectively.The distributed glacier deformation real-time measurement system provides a new means for the assessment of the development process of glacier disasters and disaster prevention and mitigation. 展开更多
关键词 Glacier disasters Distributed deformation measurement MULTI-SENSOR real-time LoRa data adaptive.
下载PDF
Data network traffic analysis and optimization strategy of real-time power grid dynamic monitoring system for wide-frequency measurements 被引量:3
13
作者 Jinsong Li Hao Liu +2 位作者 Wenzhuo Li Tianshu Bi Mingyang Zhao 《Global Energy Interconnection》 EI CAS CSCD 2022年第2期131-142,共12页
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ... The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests. 展开更多
关键词 Power system data network Wide-frequency information real-time system Traffic analysis Optimization strategy
下载PDF
A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation
14
作者 Abid Mahboob Muhammad Asif +3 位作者 Rana Muhammad Zulqarnain Imran Saddique Hijaz Ahmad Sameh Askar 《Computers, Materials & Continua》 SCIE EI 2023年第11期2565-2578,共14页
Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illeg... Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults.Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase.For the designing of a secure substitution box(S-box),non-linearity(NL)which is an algebraic property of the S-box has great importance.Consequently,the main focus of cryptographers is to achieve the S-box with a high value of non-linearity.In this suggested study,an algebraic approach for the construction of 16×16 S-boxes is provided which is based on the fractional transformation Q(z)=1/α(z)^(m)+β(mod257)and finite field.This technique is only applicable for the even number exponent in the range(2-254)that are not multiples of 4.Firstly,we choose a quadratic fractional transformation,swap each missing element with repeating elements,and acquire the initial S-box.In the second stage,a special permutation of the symmetric group S256 is utilized to construct the final S-box,which has a higher NL score of 112.75 than the Advanced Encryption Standard(AES)S-box and a lower linear probability score of 0.1328.In addition,a tabular and graphical comparison of various algebraic features of the created S-box with many other S-boxes from the literature is provided which verifies that the created S-box has the ability and is good enough to withstand linear and differential attacks.From different analyses,it is ensured that the proposed S-boxes are better than as compared to the existing S-boxes.Further these S-boxes can be utilized in the security of the image data and the text data. 展开更多
关键词 Block cipher S-BOX data security fractional transformation
下载PDF
A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform
15
作者 Amishi Mahesh Kapadia P.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期537-552,共16页
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs... Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well. 展开更多
关键词 Reversible data hiding(RDH) integer wavelet transforms(IWT) arnold transform PAYLOAD embedding and extraction
下载PDF
Fault Diagnosis of Power Transformer Based on Improved ACGAN Under Imbalanced Data
16
作者 Tusongjiang.Kari Lin Du +3 位作者 Aisikaer.Rouzi Xiaojing Ma Zhichao Liu Bo Li 《Computers, Materials & Continua》 SCIE EI 2023年第5期4573-4592,共20页
The imbalance of dissolved gas analysis(DGA)data will lead to over-fitting,weak generalization and poor recognition performance for fault diagnosis models based on deep learning.To handle this problem,a novel transfor... The imbalance of dissolved gas analysis(DGA)data will lead to over-fitting,weak generalization and poor recognition performance for fault diagnosis models based on deep learning.To handle this problem,a novel transformer fault diagnosis method based on improved auxiliary classifier generative adversarial network(ACGAN)under imbalanced data is proposed in this paper,which meets both the requirements of balancing DGA data and supplying accurate diagnosis results.The generator combines one-dimensional convolutional neural networks(1D-CNN)and long short-term memories(LSTM),which can deeply extract the features from DGA samples and be greatly beneficial to ACGAN’s data balancing and fault diagnosis.The discriminator adopts multilayer perceptron networks(MLP),which prevents the discriminator from losing important features of DGA data when the network is too complex and the number of layers is too large.The experimental results suggest that the presented approach can effectively improve the adverse effects of DGA data imbalance on the deep learning models,enhance fault diagnosis performance and supply desirable diagnosis accuracy up to 99.46%.Furthermore,the comparison results indicate the fault diagnosis performance of the proposed approach is superior to that of other conventional methods.Therefore,the method presented in this study has excellent and reliable fault diagnosis performance for various unbalanced datasets.In addition,the proposed approach can also solve the problems of insufficient and imbalanced fault data in other practical application fields. 展开更多
关键词 Power transformer dissolved gas analysis imbalanced data auxiliary classifier generative adversarial network
下载PDF
Weld extraction from real-time radiograph based on bidirectional accumulator Hough Transform 被引量:2
17
作者 邵家鑫 都东 +2 位作者 石涵 常保华 王力 《China Welding》 EI CAS 2011年第3期6-11,共6页
An effective approach is presented to extract welds from real-time radiographs, Firstly an algorithm based on an adaptive bidirectional threshold was proposed to segment the gradient image into ternary image, and then... An effective approach is presented to extract welds from real-time radiographs, Firstly an algorithm based on an adaptive bidirectional threshold was proposed to segment the gradient image into ternary image, and then the bidirectional accumulator Hough Transform was developed to extract weld edges from the ternary image. Different values of the coefficient proposed in the threshold algorithm were tested, and the proposed approach was applied to extract welds from real-time radiographic images of different types of welds with defects. Results show that the proposed method is adaptive and effective to extract welds from real-time radiographs of linear welds. 展开更多
关键词 real-time radiographic image weld extraction adaptive threshold bidirectional accumulator Hough transform
下载PDF
Web-based GIS System for Real-time Field Data Collection Using Personal Mobile Phone 被引量:2
18
作者 Ko Ko Lwin Yuji Murayama 《Journal of Geographic Information System》 2011年第4期382-389,共8页
Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accura... Recently, use of mobile communicational devices in field data collection is increasing such as smart phones and cellular phones due to emergence of embedded Global Position System GPS and Wi-Fi Internet access. Accurate timely and handy field data collection is required for disaster management and emergency quick responses. In this article, we introduce web-based GIS system to collect the field data by personal mobile phone through Post Office Protocol POP3 mail server. The main objective of this work is to demonstrate real-time field data collection method to the students using their mobile phone to collect field data by timely and handy manners, either individual or group survey in local or global scale research. 展开更多
关键词 WEB-BASED GIS System real-time Field data Collection PERSONAL Mobile PHONE POP3 MAIL Server
下载PDF
基于Vision Transformer的小麦病害图像识别算法
19
作者 白玉鹏 冯毅琨 +3 位作者 李国厚 赵明富 周浩宇 侯志松 《中国农机化学报》 北大核心 2024年第2期267-274,共8页
小麦白粉病、赤霉病和锈病是危害小麦产量的三大病害。为提高小麦病害图像的识别准确率,构建一种基于Vision Transformer的小麦病害图像识别算法。首先,通过田间拍摄的方式收集包含小麦白粉病、赤霉病和锈病3种病害在内的小麦病害图像,... 小麦白粉病、赤霉病和锈病是危害小麦产量的三大病害。为提高小麦病害图像的识别准确率,构建一种基于Vision Transformer的小麦病害图像识别算法。首先,通过田间拍摄的方式收集包含小麦白粉病、赤霉病和锈病3种病害在内的小麦病害图像,并对原始图像进行预处理,建立小麦病害图像识别数据集;然后,基于改进的Vision Transformer构建小麦病害图像识别算法,分析不同迁移学习方式和数据增强对模型识别效果的影响。试验可知,全参数迁移学习和数据增强能明显提高Vision Transformer模型的收敛速度和识别精度。最后,在相同时间条件下,对比Vision Transformer、AlexNet和VGG16算法在相同数据集上的表现。试验结果表明,Vision Transformer模型对3种小麦病害图像的平均识别准确率为96.81%,相较于AlexNet和VGG16模型识别准确率分别提高6.68%和4.94%。 展开更多
关键词 小麦病害 Vision transformer 迁移学习 图像识别 数据增强
下载PDF
基于变量选择与Transformer模型的中长期电力负荷预测方法
20
作者 黄文琦 梁凌宇 +3 位作者 王鑫 赵翔宇 宗珂 孙凌云 《浙江大学学报(理学版)》 CAS CSCD 北大核心 2024年第4期483-491,500,共10页
准确且有效的负荷预测对于电力系统的实时运行和调度非常重要。提出了一种融合变量选择与稀疏Transformer模型的预测方法,将静态变量和时序变量作为输入,充分发挥静态变量在全局时间范围内的信息增强作用,基于门控机制设计变量分权组件... 准确且有效的负荷预测对于电力系统的实时运行和调度非常重要。提出了一种融合变量选择与稀疏Transformer模型的预测方法,将静态变量和时序变量作为输入,充分发挥静态变量在全局时间范围内的信息增强作用,基于门控机制设计变量分权组件,根据变量与预测结果的相关性,赋予变量不同的权重。设计了双层编码结构,进行时序特征提取,对注意力进行稀疏处理,通过多变量输入对未来时刻负荷进行预测。基于真实电力负荷数据的实验表明,本文模型能够提高中长期负荷预测精度和效率。 展开更多
关键词 电力时序数据 transformER 中长期负荷预测 多变量 变量选择
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部