期刊文献+

基于斥力平衡SOM的可信故障诊断

Trusted Fault Diagnosis Based on Repulsive Equilibrium SOM
在线阅读 下载PDF
导出
摘要 自组织映射(SOM)神经网络存在训练结果不稳定、识别率低的问题。为此,提出一种斥力平衡SOM神经网络方法(RESOM)。该方法使用斥力原理,根据SOM模式区域在斥力场中迁移到的斥力平衡位置进行模式识别。比较普通SOM神经网络、SVM、RESOM对故障模式的识别结果表明,该方法训练时间少、识别正确率高、识别结果稳定。 For the problems of the instable training results and low rate of pattern recognition in Self-Organizing Mapping(SOM),a novel Repulsive Equilibrium SOM(RESOM) is proposed in this paper.Theory of repulsive force is used in this method,pattern recognition based on the cluster regions of SOM,these regions move to repulsive equilibrium position in repulsion field.Experimental results show that RESOM method outperforms the normal SOM and SVM.It can improve stability and recognition rate of pattern recognition and reduce training time
出处 《计算机工程》 CAS CSCD 北大核心 2011年第13期199-201,共3页 Computer Engineering
基金 重庆万州区科委基金资助项目(20084033) 重庆三峡学院基金资助项目(2008-sxxyqn-027)
关键词 自组织映射 斥力平衡 可信故障诊断 聚类迁移 神经网络 Self-Organizing Mapping(SOM) repulsive equilibrium trusted fault diagnosis clustering migration neural net
  • 相关文献

参考文献7

  • 1Maki Y, Loparo K A. Neural-network Approach to Fault Detectionand Diagnosis in Industrial Processes[J]. IEEE Trans. on ControlSystems Technology, 1997, 5(6): 529-541.
  • 2Kohonen T. Self-organizing Maps[M]. New York, USA: Springer Verlag, 1997.
  • 3Su M C, Chang H T. A New Model of Self-organizing NeuralNetworks and Its Application in Data Projection[J]. IEEE Trans.on Neural Networks, 2001, 12(1): 153-158.
  • 4Lirn Y W, Lee S U. On the Color Image Segmentation AlgorithmBased on the Thresholding and the Fuzzy C-means Technique[J].Pattern Recognition, 1999, 23(9): 935-952.
  • 5王飞,钱玉文,王执铨.基于混合AIS/SOM的入侵检测模型[J].计算机工程,2010,36(12):164-166. 被引量:2
  • 6Khatib O. Real Time Obstacle Avoidance for Manipulators andMobile Robots[C]//Proc. of IEEE International Conference onRobotics and Automation. St. Louis, Missouri, USA: [s. n.], 1985:500-505.
  • 7冼广铭,曾碧卿,唐华,肖应旺.小波包结合支持向量机的故障诊断方法[J].计算机工程,2009,35(4):212-214. 被引量:11

二级参考文献11

  • 1何学文,赵海鸣.支持向量机及其在机械故障诊断中的应用[J].中南大学学报(自然科学版),2005,36(1):97-101. 被引量:48
  • 2Mcavoy T J, Ye N. Base Control for the Tennessee Eastman Problem[J]. Computers and Chemical Engineering, 1994, 18(5): 383-413.
  • 3Denning D E.An Intrusion Detection Model[J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
  • 4Shon T,Moon J.A Hybrid Machine Learning Approach to Network Anomaly Detection[J].Information Sciences,2007,177(18):3799-3821.
  • 5Gonzalez F,Dasgupta D.An Immunity-based Technique to Characterize Intrusions in Computer Networks[J].IEEE Transactions on Evolutionary Computation,2002,6(3):281-291.
  • 6Gonzalez F,Dasgupta D.Anomaly Detection Using Real-valued Negative Selection[J].Genetic Programming and Evolvable Machines,2003,4(4):383-403.
  • 7Pfahringer B.Winning Entry of the KDDCUP99 Classifier Learning Contest[Z].[1999-10-23].http://www.acm.org/sigkdd/kddcup/.
  • 8HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 9白琳.基于免疫遗传聚类的异常检测系统[J].西安邮电学院学报,2008,13(1):103-108. 被引量:2
  • 10马笑潇,黄席樾,柴毅.基于SVM的二叉树多类分类算法及其在故障诊断中的应用[J].控制与决策,2003,18(3):272-276. 被引量:77

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部