期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Comparative study on isolation forest, extended isolation forest and generalized isolation forest in detection of multivariate geochemical anomalies
1
作者 ZHENG Chenyi ZHAO Qingying +2 位作者 FAN Guoyu ZHAO Keyu PIAO Taisheng 《Global Geology》 2023年第3期167-176,共10页
It is not easy to construct a model to describe the geochemical background in geochemical anomaly detection due to the complexity of the geological setting.Isolation forest and its improved algorithms can detect geoch... It is not easy to construct a model to describe the geochemical background in geochemical anomaly detection due to the complexity of the geological setting.Isolation forest and its improved algorithms can detect geochemical anomalies without modeling the complex geochemical background.These methods can effec-tively extract multivariate anomalies from large volume of high-dimensional geochemical data with unknown population distribution.To test the performance of these algorithms in the detection of mineralization-related geochemical anomalies,the isolation forest,extended isolation forest and generalized isolation forest models were established to detect multivariate anomalies from the stream sediment survey data collected in the Wu-laga area in Heilongjiang Province.The geochemical anomalies detected by the generalized isolation forest model account for 40%of the study area,and contain 100%of the known gold deposits.The geochemical anomalies detected by the isolation forest model account for 20%of the study area,and contain 71%of the known gold deposits.The geochemical anomalies detected by the extended isolation forest algorithm account for 34%of the study area,and contain 100%of the known gold deposits.Therefore,the isolation forest mo-del,extended isolation fo-rest model and generalized isolation forest model are comparable in geochemical anomaly detection. 展开更多
关键词 isolation forest extended isolation forest generalized isolation forest Youden index geochemi-cal anomaly identification
下载PDF
基于Isolation Forest和Random Forest相结合的智能电网时间序列数据异常检测算法 被引量:8
2
作者 杨永娇 肖建毅 +1 位作者 赵创业 周开东 《计算机与现代化》 2020年第3期99-102,126,共5页
智能电网的信息系统是保障电力行业正常运行的基础,而智能电网中各种时间序列数据的分析结果是衡量信息系统稳定运行的重要依据。传统的时间序列数据异常检测算法很难同时兼顾准确性和实时性。本文引入基于Isolation Forest和Random For... 智能电网的信息系统是保障电力行业正常运行的基础,而智能电网中各种时间序列数据的分析结果是衡量信息系统稳定运行的重要依据。传统的时间序列数据异常检测算法很难同时兼顾准确性和实时性。本文引入基于Isolation Forest和Random Forest相结合的智能电网时间序列数据异常检测算法,结合无监督学习算法和有监督学习算法的优点,实现机器自动标注和自动学习阈值,人工标注少量特征值,从一定程度上提高了时间序列数据异常检查准确性和实时性,可以满足智能电网时间序列数据异常检测需求,从而达到提升智能电网信息安全的目的。 展开更多
关键词 isolation forest算法 Random forest算法 异常检测算法 时间序列数据 智能电网
下载PDF
Improved Isolation Forest Algorithm for Anomaly Test Data Detection 被引量:1
3
作者 Yupeng Xu Hao Dong +3 位作者 Mingzhu Zhou Jun Xing Xiaohui Li Jian Yu 《Journal of Computer and Communications》 2021年第8期48-60,共13页
The cigarette detection data contains a large amount of true sample data and a small amount of false sample data. The false sample data is regarded as abnormal data, and anomaly detection is performed to realize the i... The cigarette detection data contains a large amount of true sample data and a small amount of false sample data. The false sample data is regarded as abnormal data, and anomaly detection is performed to realize the identification of real and fake cigarettes. Binary particle swarm optimization algorithm is used to improve the isolation forest construction process, and isolation trees with high precision and large differences are selected, which improves the accuracy and efficiency of the algorithm. The distance between the obtained anomaly score and the clustering center of the k-means algorithm is used as the threshold for anomaly judgment. The experimental results show that the accuracy of the BPSO-iForest algorithm is improved compared with the standard iForest algorithm. The experimental results of multiple brand samples also show that the method in this paper can accurately use the detection data for authenticity identification. 展开更多
关键词 isolation forest BPSO K-Means Cluster Anomaly Detection
下载PDF
Data cleaning method for the process of acid production with flue gas based on improved random forest 被引量:1
4
作者 Xiaoli Li Minghua Liu +2 位作者 Kang Wang Zhiqiang Liu Guihai Li 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2023年第7期72-84,共13页
Acid production with flue gas is a complex nonlinear process with multiple variables and strong coupling.The operation data is an important basis for state monitoring,optimal control,and fault diagnosis.However,the op... Acid production with flue gas is a complex nonlinear process with multiple variables and strong coupling.The operation data is an important basis for state monitoring,optimal control,and fault diagnosis.However,the operating environment of acid production with flue gas is complex and there is much equipment.The data obtained by the detection equipment is seriously polluted and prone to abnormal phenomena such as data loss and outliers.Therefore,to solve the problem of abnormal data in the process of acid production with flue gas,a data cleaning method based on improved random forest is proposed.Firstly,an outlier data recognition model based on isolation forest is designed to identify and eliminate the outliers in the dataset.Secondly,an improved random forest regression model is established.Genetic algorithm is used to optimize the hyperparameters of the random forest regression model.Then the optimal parameter combination is found in the search space and the trend of data is predicted.Finally,the improved random forest data cleaning method is used to compensate for the missing data after eliminating abnormal data and the data cleaning is realized.Results show that the proposed method can accurately eliminate and compensate for the abnormal data in the process of acid production with flue gas.The method improves the accuracy of compensation for missing data.With the data after cleaning,a more accurate model can be established,which is significant to the subsequent temperature control.The conversion rate of SO_(2) can be further improved,thereby improving the yield of sulfuric acid and economic benefits. 展开更多
关键词 Acid production Data cleaning isolation forest Random forest Data compensation
下载PDF
Detection of Multivariate Geochemical Anomalies Using the Bat-Optimized Isolation Forest and Bat-Optimized Elliptic Envelope Models
5
作者 Yongliang Chen Shicheng Wang +1 位作者 Qingying Zhao Guosheng Sun 《Journal of Earth Science》 SCIE CAS CSCD 2021年第2期415-426,共12页
Isolation forest and elliptic envelope are used to detect geochemical anomalies,and the bat algorithm was adopted to optimize the parameters of the two models.The two bat-optimized models and their default-parameter c... Isolation forest and elliptic envelope are used to detect geochemical anomalies,and the bat algorithm was adopted to optimize the parameters of the two models.The two bat-optimized models and their default-parameter counterparts were used to detect multivariate geochemical anomalies from the stream sediment survey data of 1:50000 scale collected from the Helong district,Jilin Province,China.Based on the data modeling results,the receiver operating characteristic(ROC)curve analysis was performed to evaluate the performance of the two bat-optimized models and their default-parameter counterparts.The results show that the bat algorithm can improve the performance of the two models by optimizing their parameters in geochemical anomaly detection.The optimal threshold determined by the Youden index was used to identify geochemical anomalies from the geochemical data points.Compared with the anomalies detected by the elliptic envelope models,the anomalies detected by the isolation forest models have higher spatial relationship with the mineral occurrences discovered in the study area.According to the results of this study and previous work,it can be inferred that the background population of the study area is complex,which is not suitable for the establishment of elliptic envelope model. 展开更多
关键词 bat algorithm isolation forest elliptic envelope receiver operating characteristic curve analysis geochemical anomaly detection
原文传递
GA-iForest: An Efficient Isolated Forest Framework Based on Genetic Algorithm for Numerical Data Outlier Detection 被引量:4
6
作者 LI Kexin LI Jing +3 位作者 LIU Shuji LI Zhao BO Jue LIU Biqi 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2019年第6期1026-1038,共13页
With the development of data age,data quality has become one of the problems that people pay much attention to.As a field of data mining,outlier detection is related to the quality of data.The isolated forest algorith... With the development of data age,data quality has become one of the problems that people pay much attention to.As a field of data mining,outlier detection is related to the quality of data.The isolated forest algorithm is one of the more prominent numerical data outlier detection algorithms in recent years.In the process of constructing the isolation tree by the isolated forest algorithm,as the isolation tree is continuously generated,the difference of isolation trees will gradually decrease or even no difference,which will result in the waste of memory and reduced efficiency of outlier detection.And in the constructed isolation trees,some isolation trees cannot detect outlier.In this paper,an improved iForest-based method GA-iForest is proposed.This method optimizes the isolated forest by selecting some better isolation trees according to the detection accuracy and the difference of isolation trees,thereby reducing some duplicate,similar and poor detection isolation trees and improving the accuracy and stability of outlier detection.In the experiment,Ubuntu system and Spark platform are used to build the experiment environment.The outlier datasets provided by ODDS are used as test.According to indicators such as the accuracy,recall rate,ROC curves,AUC and execution time,the performance of the proposed method is evaluated.Experimental results show that the proposed method can not only improve the accuracy and stability of outlier detection,but also reduce the number of isolation trees by 20%-40%compared with the original iForest method. 展开更多
关键词 outlier detection isolation tree isolated forest genetic algorithm feature selection
下载PDF
基于特征分析的HPC失败作业的检测和根因分析
7
作者 危婷 彭亮 +1 位作者 牛铁 张宏海 《数据与计算发展前沿》 CSCD 2023年第6期94-103,共10页
【背景】在高性能计算系统中,更早、更快地发现计算作业异常及其退出原因,可以帮助用户缩短纠错时间,更有效地使用价格不菲的计算资源。【目的】为了实现对计算作业异常的预警,快速定位作业失败根因,提高用户使用体验。【方法】本文基... 【背景】在高性能计算系统中,更早、更快地发现计算作业异常及其退出原因,可以帮助用户缩短纠错时间,更有效地使用价格不菲的计算资源。【目的】为了实现对计算作业异常的预警,快速定位作业失败根因,提高用户使用体验。【方法】本文基于某超大型超级计算集群的监控数据,针对特定应用分析了运行特征与计算作业运行成败的关系。采用Isolation Forest算法对作业运行时所在计算节点的运行状态进行异常检测,并对作业是否失败进行预测;通过特征分析,同时结合日志和其他故障数据构建HPC作业失败根因图谱。【结果】通过对算法的数值分析,发现Isolation Forest能够较准确地预测作业失败。基于应用运行特征关联分析构造的根因图谱,可较好地融汇作业运行和资源使用情况的所有影响因子,并展现所有因子的因果关系。【结论】本文的研究可以帮助高性能计算系统,特别是超大型超级计算系统的管理人员、用户尽早发现计算作业异常,并快速提供问题定位依据,对减少计算资源浪费、提高计算效率具有重要意义。 展开更多
关键词 高性能计算 特征分析 机器学习 isolation forest 检测 根因分析
下载PDF
Blockchain‑oriented approach for detecting cyber‑attack transactions
8
作者 Zhiqi Feng Yongli Li Xiaochen Ma 《Financial Innovation》 2023年第1期2190-2227,共38页
With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial secu... With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial security has become a top priority with the sustainable development of blockchain-based platforms because of an increasing number of cyber attacks,which have resulted in a huge loss of crypto assets in recent years.Therefore,it is imperative to study the real-time detection of cyber attacks to facilitate effective supervision and regulation.To this end,this paper proposes the weighted and extended isolation forest algorithms and designs a novel framework for the real-time detection of cyber-attack transactions by thoroughly studying and summarizing real-world examples.Furthermore,this study develops a new detection approach for locating the compromised address of a cyber attack to resolve the data scarcity of hack addresses and reduce time consumption.Moreover,three experiments are carried out not only to apply on different types of cyber attacks but also to compare the proposed approach with the widely used existing methods.The results demonstrate the high efficiency and generality of the proposed approach.Finally,the lower time consumption and robustness of our method were validated through additional experiments.In conclusion,the proposed blockchain-oriented approach in this study can handle real-time detection of cyber attacks and has significant scope for applications. 展开更多
关键词 Blockchain Cyber-attack detection Extended isolation forest Decentralized application Financial security Fintech
下载PDF
IOT Based Smart Parking System Using Ensemble Learning
9
作者 Walaa H.Elashmawi Ahmad Akram +4 位作者 Mohammed Yasser Menna Hisham Manar Mohammed Noha Ihab Ahmed Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3637-3656,共20页
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver frustration.Existing car parking systems tend to tackle parking issues in a non-digitized m... Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver frustration.Existing car parking systems tend to tackle parking issues in a non-digitized manner.These systems require the drivers to search for an empty parking space with no guaran-tee of finding any wasting time,resources,and causing unnecessary congestion.To address these issues,this paper proposes a digitized parking system with a proof-of-concept implementation that combines multiple technological concepts into one solution with the advantages of using IoT for real-time tracking of park-ing availability.User authentication and automated payments are handled using a quick response(QR)code on entry and exit.Some experiments were done on real data collected for six different locations in Cairo via a live popular times library.Several machine learning models were investigated in order to estimate the occu-pancy rate of certain places.Moreover,a clear analysis of the differences in per-formance is illustrated with the final model deployed being XGboost.It has achieved the most efficient results with a R^(2) score of 85.7%. 展开更多
关键词 IOT XGBoost linear regression random forest ensemble learning isolation forest
下载PDF
异常数据识别与修复机制在区域供水预测方案中的应用 被引量:3
10
作者 张凯 崔光亮 《水电能源科学》 北大核心 2021年第7期53-56,64,共5页
为进一步提升区域供水预测模型的准确度与泛化能力,从应用场景分析、数据预处理、特征选取等角度,建立循环神经网络并引入数据异常识别和修复机制,在数据处理过程中对基于K-means聚类和Isolation Forest的异常点检测进行比较,并依据时... 为进一步提升区域供水预测模型的准确度与泛化能力,从应用场景分析、数据预处理、特征选取等角度,建立循环神经网络并引入数据异常识别和修复机制,在数据处理过程中对基于K-means聚类和Isolation Forest的异常点检测进行比较,并依据时间序列特性,提出区别近邻均值的时序均值修复方法。深度学习框架下,采用LSTM学习算法,以拟合效果、泛化损失作为评估指标,针对区域供水进行小时级预测。分析结果表明,数据异常识别和修复的预处理机制的引入,使得区域供水预测模型拟合及泛化能力进一步提升,且方法可行、有效。 展开更多
关键词 异常识别 数据修复 时间序列 K-MEANS isolation forest LSTM
下载PDF
Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment
11
作者 Shumaila Shahzadi Fahad Ahmad +5 位作者 Asma Basharat Madallah Alruwaili Saad Alanazi Mamoona Humayun Muhammad Rizwan Shahid Naseem 《Computers, Materials & Continua》 SCIE EI 2021年第3期2723-2749,共27页
With the rising demand for data access,network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for a... With the rising demand for data access,network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access.To increase efficacy of Software Defined Network(SDN)and Network Function Virtualization(NFV)framework,we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency,reduce network performance,and increase maintenance cost.The existing frameworks lack in security,and computer systems face few abnormalities,which prompts the need for different recognition and mitigation methods to keep the system in the operational state proactively.The fundamental concept behind SDN-NFV is the encroachment from specific resource execution to the programming-based structure.This research is around the combination of SDN and NFV for rational decision making to control and monitor traffic in the virtualized environment.The combination is often seen as an extra burden in terms of resources usage in a heterogeneous network environment,but as well as it provides the solution for critical problems specially regarding massive network traffic issues.The attacks have been expanding step by step;therefore,it is hard to recognize and protect by conventional methods.To overcome these issues,there must be an autonomous system to recognize and characterize the network traffic’s abnormal conduct if there is any.Only four types of assaults,including HTTP Flood,UDP Flood,Smurf Flood,and SiDDoS Flood,are considered in the identified dataset,to optimize the stability of the SDN-NFVenvironment and security management,through several machine learning based characterization techniques like Support Vector Machine(SVM),K-Nearest Neighbors(KNN),Logistic Regression(LR)and Isolation Forest(IF).Python is used for simulation purposes,including several valuable utilities like the mine package,the open-source Python ML libraries Scikit-learn,NumPy,SciPy,Matplotlib.Few Flood assaults and Structured Query Language(SQL)injections anomalies are validated and effectively-identified through the anticipated procedure.The classification results are promising and show that overall accuracy lies between 87%to 95%for SVM,LR,KNN,and IF classifiers in the scrutiny of traffic,whether the network traffic is normal or anomalous in the SDN-NFV environment. 展开更多
关键词 Software defined network network function virtualization machine learning support vector machine K-nearest neighbors logistic regression isolation forest anomaly detection ATTACKS
下载PDF
Early COVID-19 Symptoms Identification Using Hybrid Unsupervised Machine Learning Techniques
12
作者 Omer Ali Mohamad Khairi Ishak Muhammad Kamran Liaquat Bhatti 《Computers, Materials & Continua》 SCIE EI 2021年第10期747-766,共20页
The COVID-19 virus exhibits pneumonia-like symptoms,including fever,cough,and shortness of breath,and may be fatal.Many COVID-19 contraction experiments require comprehensive clinical procedures at medical facilities.... The COVID-19 virus exhibits pneumonia-like symptoms,including fever,cough,and shortness of breath,and may be fatal.Many COVID-19 contraction experiments require comprehensive clinical procedures at medical facilities.Clinical studies help to make a correct diagnosis of COVID-19,where the disease has already spread to the organs in most cases.Prompt and early diagnosis is indispensable for providing patients with the possibility of early clinical diagnosis and slowing down the disease spread.Therefore,clinical investigations in patients with COVID-19 have revealed distinct patterns of breathing relative to other diseases such as flu and cold,which are worth investigating.Current supervised Machine Learning(ML)based techniques mostly investigate clinical reports such as X-Rays and Computerized Tomography(CT)for disease detection.This strategy relies on a larger clinical dataset and does not focus on early symptom identification.Towards this end,an innovative hybrid unsupervised ML technique is introduced to uncover the probability of COVID-19 occurrence based on the breathing patterns and commonly reported symptoms,fever,and cough.Specifically,various metrics,including body temperature,breathing and cough patterns,and physical activity,were considered in this study.Finally,a lightweight ML algorithm based on the K-Means and Isolation Forest technique was implemented on relatively small data including 40 individuals.The proposed technique shows an outlier detection with an accuracy of 89%,on average. 展开更多
关键词 COVID-19 symptoms identification machine learning isolation forest K-MEANS
下载PDF
基于机器学习的越权漏洞检测方法
13
作者 李帅华 孙庆贺 赵明宇 《中国安全防范技术与应用》 2021年第2期67-72,共6页
为解决Web、App应用越权逻辑漏洞造成的信息泄露、财产损失等问题,可以采用基于Isolation Forest、XGBoost(Extreme Gradient Boosting)、余弦相似度相结合方法实现越权逻辑漏洞检测。本文针对漏洞应用响应内容相似度相同的问题,提出了... 为解决Web、App应用越权逻辑漏洞造成的信息泄露、财产损失等问题,可以采用基于Isolation Forest、XGBoost(Extreme Gradient Boosting)、余弦相似度相结合方法实现越权逻辑漏洞检测。本文针对漏洞应用响应内容相似度相同的问题,提出了一种新的解决方法。该方法通过获取A、B两个用户对某页面的响应内容并采用Isolation Forest、XGBoost算法相结合的方式判断漏洞的具体场景,最后使用余弦相似度算法判断响应内容相似度,以检测应用存在的越权逻辑漏洞,提高了企业内部Web、App应用的安全性。通过对企业内部相关应用进行实例测试分析,验证了该方法的有效性。 展开更多
关键词 isolation forest XGBoost 余弦相似度 越权逻辑漏洞
下载PDF
Anomaly Detection and Pattern Differentiation in Monitoring Data from Power Transformers
14
作者 Jun Zhao Shuguo Gao +4 位作者 Yunpeng Liu QuanWang Ziqiang Xu Yuan Tian Lu Sun 《Energy Engineering》 EI 2022年第5期1811-1828,共18页
Aiming at the problem of abnormal data generated by a power transformer on-line monitoring system due to the influences of transformer operation state change,external environmental interference,communication interrupt... Aiming at the problem of abnormal data generated by a power transformer on-line monitoring system due to the influences of transformer operation state change,external environmental interference,communication interruption,and other factors,a method of anomaly recognition and differentiation for monitoring data was proposed.Firstly,the empirical wavelet transform(EWT)and the autoregressive integrated moving average(ARIMA)model were used for time series modelling of monitoring data to obtain the residual sequence reflecting the anomaly monitoring data value,and then the isolation forest algorithm was used to identify the abnormal information,and the monitoring sequence was segmented according to the recognition results.Secondly,the segmented sequence was symbolised by the improved multi-dimensional SAX vector representation method,and the assessment of the anomaly pattern was made by calculating the similarity score of the adjacent symbol vectors,and the monitoring sequence correlation was further used to verify the assessment.Finally,the case study result shows that the proposed method can reliably recognise abnormal data and accurately distinguish between invalid and valid anomaly patterns. 展开更多
关键词 Abnormal detection empirical wavelet transform autoregressive integrated moving average isolated forest
下载PDF
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
15
作者 Mouaad Mohy-Eddine Azidine Guezzaz +2 位作者 Said Benkirane Mourade Azrour Yousef Farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期273-287,共15页
Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.How... Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.However,IIoT involves some security vulnerabilities that are more damaging than those of IoT.Accordingly,Intrusion Detection Systems(IDSs)have been developed to forestall inevitable harmful intrusions.IDSs survey the environment to identify intrusions in real time.This study designs an intrusion detection model exploiting feature engineering and machine learning for IIoT security.We combine Isolation Forest(IF)with Pearson’s Correlation Coefficient(PCC)to reduce computational cost and prediction time.IF is exploited to detect and remove outliers from datasets.We apply PCC to choose the most appropriate features.PCC and IF are applied exchangeably(PCCIF and IFPCC).The Random Forest(RF)classifier is implemented to enhance IDS performances.For evaluation,we use the Bot-IoT and NF-UNSW-NB15-v2 datasets.RF-PCCIF and RF-IFPCC show noteworthy results with 99.98%and 99.99%Accuracy(ACC)and 6.18 s and 6.25 s prediction time on Bot-IoT,respectively.The two models also score 99.30%and 99.18%ACC and 6.71 s and 6.87 s prediction time on NF-UNSW-NB15-v2,respectively.Results prove that our designed model has several advantages and higher performance than related models. 展开更多
关键词 Industrial Internet of Things(IIoT) isolation forest Intrusion Detection Dystem(IDS) INTRUSION Pearson’s Correlation Coefficient(PCC) random forest
原文传递
Visual Perception-Based Fault Diagnosis in Froth Flotation Using Statistical Approaches
16
作者 Jin Zhang Zhaohui Tang +2 位作者 Yongfang Xie Mingxi Ai Weihua Gui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第2期172-184,共13页
Froth flotation is an important mineral concentration technique.Faulty conditions in flotation processes may cause the huge waste of mineral resources and reagents,and consequently,may lead to deterioration in terms o... Froth flotation is an important mineral concentration technique.Faulty conditions in flotation processes may cause the huge waste of mineral resources and reagents,and consequently,may lead to deterioration in terms of benefits of flotation plants.In this paper,we propose a computer vision-aided fault detection and diagnosis approach for froth flotation.Specifically,a joint Gabor texture feature based on the Copula model is designed to describe froth images;a rejection sampling technique is developed to generate training sets from the quality distribution of real flotation products,and then an isolation forest-based fault detector is learned;and a fault diagnosis model based on spline regression is developed for root cause identification.Simulation experiments conducted on the historical industry data show that the proposed strategy has better performance than the alternative methods.Thereafter,the entire framework has been tested on a lead-zinc flotation plant in China.Experimental results have demonstrated the effectiveness of the proposed method. 展开更多
关键词 fault diagnosis GABOR copula model isolation forest rejection sampling
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部