期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Scour Below Pipelines and Around Single Vertical Piles for Bichromatic and Bidirectional Waves
1
作者 Dag Myrhaug Muk Chen Ong Lars Erik Holmedal 《哈尔滨工程大学学报(英文版)》 2025年第6期1115-1121,共7页
This article provides a method by which the scour depth and scour width below pipelines,and the scour depth around single vertical piles as well as the time scales of scour for both structures due to bichromatic and b... This article provides a method by which the scour depth and scour width below pipelines,and the scour depth around single vertical piles as well as the time scales of scour for both structures due to bichromatic and bidirectional waves are calculated.The scour and time scale formulae summarized by Sumer and Fredsøe(2002)as well as the bottom shear stress formulae under bichromatic and bidirectional waves by Myrhaug et al.(2023)are used.Results for unidirectional bichromatic waves and symmetrically bidirectional monochromatic waves are provided,showing qualitative agreement with what is expected physically.Qualitative comparisons are made with the data from Schendel et al.’s(2020)small scale laboratory tests on scour around a monopile induced by directionally spread waves.Applications to related cases for pipelines are also suggested.In order to conclude regarding the validity of the method for pipelines and vertical piles,it is required to compare with data in its validity range. 展开更多
关键词 Scour depth and width Time scales Seabed pipeline Vertical pile Shear stress Bichromatic and bidirectional waves qualitative comparison with data
在线阅读 下载PDF
Compared Insights on Machine-Learning Anomaly Detection for Process Control Feature 被引量:1
2
作者 Ming Wan Quanliang Li +3 位作者 Jiangyuan Yao Yan Song Yang Liu Yuxin Wan 《Computers, Materials & Continua》 SCIE EI 2022年第11期4033-4049,共17页
Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to succes... Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases. 展开更多
关键词 Anomaly detection machine-learning algorithm process control feature qualitative and quantitative comparisons
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部