期刊文献+
共找到24,613篇文章
< 1 2 250 >
每页显示 20 50 100
Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments
1
作者 Boram Kim Guebin Choi 《Computers, Materials & Continua》 2026年第4期1771-1787,共17页
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen... Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios. 展开更多
关键词 Anomaly detection credit card transactions fraud detection graph convolutional networks non-euclidean data
在线阅读 下载PDF
Big Data-Driven Federated Learning Model for Scalable and Privacy-Preserving Cyber Threat Detection in IoT-Enabled Healthcare Systems
2
作者 Noura Mohammed Alaskar Muzammil Hussain +3 位作者 Saif Jasim Almheiri Atta-ur-Rahman Adnan Khan Khan M.Adnan 《Computers, Materials & Continua》 2026年第4期793-816,共24页
The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threa... The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threats is both necessary and complex,yet these interconnected healthcare settings generate enormous amounts of heterogeneous data.Traditional Intrusion Detection Systems(IDS),which are generally centralized and machine learning-based,often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy.Moreover,traditional AI-driven IDS usually face challenges in handling large-scale,heterogeneous healthcare data while ensuring data privacy and operational efficiency.To address these issues,emerging technologies such as Big Data Analytics(BDA)and Federated Learning(FL)provide a hybrid framework for scalable,adaptive intrusion detection in IoT-driven healthcare systems.Big data techniques enable processing large-scale,highdimensional healthcare data,and FL can be used to train a model in a decentralized manner without transferring raw data,thereby maintaining privacy between institutions.This research proposes a privacy-preserving Federated Learning–based model that efficiently detects cyber threats in connected healthcare systems while ensuring distributed big data processing,privacy,and compliance with ethical regulations.To strengthen the reliability of the reported findings,the resultswere validated using cross-dataset testing and 95%confidence intervals derived frombootstrap analysis,confirming consistent performance across heterogeneous healthcare data distributions.This solution takes a significant step toward securing next-generation healthcare infrastructure by combining scalability,privacy,adaptability,and earlydetection capabilities.The proposed global model achieves a test accuracy of 99.93%±0.03(95%CI)and amiss-rate of only 0.07%±0.02,representing state-of-the-art performance in privacy-preserving intrusion detection.The proposed FL-driven IDS framework offers an efficient,privacy-preserving,and scalable solution for securing next-generation healthcare infrastructures by combining adaptability,early detection,and ethical data management. 展开更多
关键词 Intrusion detection systems cyber threat detection explainable AI big data analytics federated learning
在线阅读 下载PDF
Advances in Machine Learning for Explainable Intrusion Detection Using Imbalance Datasets in Cybersecurity with Harris Hawks Optimization
3
作者 Amjad Rehman Tanzila Saba +2 位作者 Mona M.Jamjoom Shaha Al-Otaibi Muhammad I.Khan 《Computers, Materials & Continua》 2026年第1期1804-1818,共15页
Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness a... Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively.This study introduces an advanced,explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets,which reflects real-world network behavior through a blend of normal and diverse attack classes.The methodology begins with sophisticated data preprocessing,incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions,ensuring standardized and model-ready inputs.Critical dimensionality reduction is achieved via the Harris Hawks Optimization(HHO)algorithm—a nature-inspired metaheuristic modeled on hawks’hunting strategies.HHO efficiently identifies the most informative features by optimizing a fitness function based on classification performance.Following feature selection,the SMOTE is applied to the training data to resolve class imbalance by synthetically augmenting underrepresented attack types.The stacked architecture is then employed,combining the strengths of XGBoost,SVM,and RF as base learners.This layered approach improves prediction robustness and generalization by balancing bias and variance across diverse classifiers.The model was evaluated using standard classification metrics:precision,recall,F1-score,and overall accuracy.The best overall performance was recorded with an accuracy of 99.44%for UNSW-NB15,demonstrating the model’s effectiveness.After balancing,the model demonstrated a clear improvement in detecting the attacks.We tested the model on four datasets to show the effectiveness of the proposed approach and performed the ablation study to check the effect of each parameter.Also,the proposed model is computationaly efficient.To support transparency and trust in decision-making,explainable AI(XAI)techniques are incorporated that provides both global and local insight into feature contributions,and offers intuitive visualizations for individual predictions.This makes it suitable for practical deployment in cybersecurity environments that demand both precision and accountability. 展开更多
关键词 Intrusion detection XAI machine learning ensemble method CYBERSECURITY imbalance data
在线阅读 下载PDF
Point-of-care antigen detection for porcine deltacoronavirus:Colloidal gold and fluorescent immunochromatographic test strips
4
作者 Zezhao Cao Junchao Shi +9 位作者 Ruijie Hu Jun Xue Gaili Wang Zi Li Huabo Yu Wei Liu Wenqi He Hualei Wang Haili Zhang Yungang Lan 《Journal of Integrative Agriculture》 2026年第1期394-397,共4页
Highlights By conjugating the same anti-N monoclonal antibody(mAb4-mAb1)with colloidal gold or fluorescent microspheres,this study developed two rapid point-of-care antigen immunochromatographic strips for the detecti... Highlights By conjugating the same anti-N monoclonal antibody(mAb4-mAb1)with colloidal gold or fluorescent microspheres,this study developed two rapid point-of-care antigen immunochromatographic strips for the detection of porcine deltacoronavirus.The fluorescent microsphere-based lateral flow test strip demonstrated a sensitivity of 10^(1.7)TCID_(50)/0.1 mL,which is fourfold higher than that of the colloidal gold-based assay.Porcine deltacoronavirus(PDCoV)is a recently identified enteric coronavirus that causes an acute infectious disease in piglets,leading to diarrhea,vomiting,dehydration,and mortality(Hu et al.2015). 展开更多
关键词 enteric coronavirus point care antigen detection fluorescent microspheresthis immunochromatographic strips porcine deltacoronavirusthe fluorescent immunochromatographic test strips colloidal gold porcine deltacoronavirus
在线阅读 下载PDF
Enhancing IoT Resilience at the Edge:A Resource-Efficient Framework for Real-Time Anomaly Detection in Streaming Data
5
作者 Kirubavathi G. Arjun Pulliyasseri +5 位作者 Aswathi Rajesh Amal Ajayan Sultan Alfarhood Mejdl Safran Meshal Alfarhood Jungpil Shin 《Computer Modeling in Engineering & Sciences》 2025年第6期3005-3031,共27页
The exponential expansion of the Internet of Things(IoT),Industrial Internet of Things(IIoT),and Transportation Management of Things(TMoT)produces vast amounts of real-time streaming data.Ensuring system dependability... The exponential expansion of the Internet of Things(IoT),Industrial Internet of Things(IIoT),and Transportation Management of Things(TMoT)produces vast amounts of real-time streaming data.Ensuring system dependability,operational efficiency,and security depends on the identification of anomalies in these dynamic and resource-constrained systems.Due to their high computational requirements and inability to efficiently process continuous data streams,traditional anomaly detection techniques often fail in IoT systems.This work presents a resource-efficient adaptive anomaly detection model for real-time streaming data in IoT systems.Extensive experiments were carried out on multiple real-world datasets,achieving an average accuracy score of 96.06%with an execution time close to 7.5 milliseconds for each individual streaming data point,demonstrating its potential for real-time,resourceconstrained applications.The model uses Principal Component Analysis(PCA)for dimensionality reduction and a Z-score technique for anomaly detection.It maintains a low computational footprint with a sliding window mechanism,enabling incremental data processing and identification of both transient and sustained anomalies without storing historical data.The system uses a Multivariate Linear Regression(MLR)based imputation technique that estimates missing or corrupted sensor values,preserving data integrity prior to anomaly detection.The suggested solution is appropriate for many uses in smart cities,industrial automation,environmental monitoring,IoT security,and intelligent transportation systems,and is particularly well-suited for resource-constrained edge devices. 展开更多
关键词 Anomaly detection streaming data IOT IIoT TMoT REAL-TIME LIGHTWEIGHT modeling
在线阅读 下载PDF
Determinants of high sessile serrated lesion detection:Role of faecal occult blood test and colonoscopy quality indicators
6
作者 Harry Williams Natalie R Dierick +2 位作者 Christina Lee Praka Sundaralingam Stuart N Kostalas 《World Journal of Gastrointestinal Endoscopy》 2025年第8期79-90,共12页
BACKGROUND Sessile serrated lesions(SSLs)are premalignant polyps implicated in up to 30%of colorectal cancers.Australia reports high SSL detection rates(SSL-DRs),yet with marked variability(3.1%-24%).This substantial ... BACKGROUND Sessile serrated lesions(SSLs)are premalignant polyps implicated in up to 30%of colorectal cancers.Australia reports high SSL detection rates(SSL-DRs),yet with marked variability(3.1%-24%).This substantial variation raises concerns about missed lesions and post-colonoscopy colorectal cancer.This study investigates determinants associated with SSL-DR variation in regional Australia.AIM To study how patient,clinical,and colonoscopy factors are associated with SSL detection in a regional Australian practice.We aimed to contribute high-detection data to the literature by analyzing the association of SSL detection with various determinants.METHODS This retrospective,cross-sectional analysis examined 1450 colonoscopies performed at Port Macquarie Gastroenterology during 2023.Sigmoidoscopies and repeat procedures were excluded.Multivariate logistic regression analyzed associations between SSL detection and patient demographics,clinical indications,procedural factors,and comorbidities.RESULTS The overall SSL-DR was 30.7%.Multivariate analysis identified several independent predictors:Clinical indication,bowel preparation quality,inflammatory bowel disease status,and serrated polyposis syndrome.The faecal occult blood test positive(FOBT)(+)cohort showed the highest predicted SSL detection probability(39.8%),while clinical symptoms showed the lowest(22.3%).After adjustment,SSL detection odds were 2.3 times greater among FOBT(+)patients than those with clinical symptoms(adjusted odds ratio=2.30,95%confidence interval:1.20-4.40,P=0.004).CONCLUSION SSL-DR as a quality indicator requires contextualization regarding clinical indications,bowel preparation quality,and comorbidities.There was a significantly higher prevalence of SSLs in FOBT(+)patients.Despite comprehensive adjustment,this study cannot fully explain the wide SSL-DR variation in Australia,highlighting the need for standardized detection protocols and further research to ensure optimal cancer prevention outcomes. 展开更多
关键词 Sessile serrated lesion Adenoma detection rate Faecal occult blood test Polyp detection rate DYSPLASIA COLONOSCOPY PREVALENCE
暂未订购
SA-WGAN Based Data Enhancement Method for Industrial Internet Intrusion Detection
7
作者 Yuan Feng Yajie Si +2 位作者 Jianwei Zhang Zengyu Cai Hongying Zhao 《Computers, Materials & Continua》 2025年第9期4431-4449,共19页
With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control... With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model. 展开更多
关键词 data enhancement intrusion detection industrial internet WGAN
在线阅读 下载PDF
A review of test methods for uniaxial compressive strength of rocks:Theory,apparatus and data processing
8
作者 Wei-Qiang Xie Xiao-Li Liu +2 位作者 Xiao-Ping Zhang Quan-Sheng Liu En-ZhiWang 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第3期1889-1905,共17页
The uniaxial compressive strength(UCS)of rocks is a vital geomechanical parameter widely used for rock mass classification,stability analysis,and engineering design in rock engineering.Various UCS testing methods and ... The uniaxial compressive strength(UCS)of rocks is a vital geomechanical parameter widely used for rock mass classification,stability analysis,and engineering design in rock engineering.Various UCS testing methods and apparatuses have been proposed over the past few decades.The objective of the present study is to summarize the status and development in theories,test apparatuses,data processing of the existing testing methods for UCS measurement.It starts with elaborating the theories of these test methods.Then the test apparatus and development trends for UCS measurement are summarized,followed by a discussion on rock specimens for test apparatus,and data processing methods.Next,the method selection for UCS measurement is recommended.It reveals that the rock failure mechanism in the UCS testing methods can be divided into compression-shear,compression-tension,composite failure mode,and no obvious failure mode.The trends of these apparatuses are towards automation,digitization,precision,and multi-modal test.Two size correction methods are commonly used.One is to develop empirical correlation between the measured indices and the specimen size.The other is to use a standard specimen to calculate the size correction factor.Three to five input parameters are commonly utilized in soft computation models to predict the UCS of rocks.The selection of the test methods for the UCS measurement can be carried out according to the testing scenario and the specimen size.The engineers can gain a comprehensive understanding of the UCS testing methods and its potential developments in various rock engineering endeavors. 展开更多
关键词 Uniaxial compressive strength(UCS) UCS testing methods test apparatus data processing
在线阅读 下载PDF
Robust Anomaly Detection of Rotating Machinery with Contaminated Data
9
作者 Jingcheng Wen Jiaxin Ren +1 位作者 Zhibin Zhao Xuefeng Chen 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第3期170-182,共13页
Rotating machinery is critical to industrial systems,necessitating robust anomaly detection(AD)to ensure operational safety and prevent failures.However,in real-world scenarios,monitoring data is typically unlabeled a... Rotating machinery is critical to industrial systems,necessitating robust anomaly detection(AD)to ensure operational safety and prevent failures.However,in real-world scenarios,monitoring data is typically unlabeled and often consists of normal samples contaminated with a small proportion of unknown anomalies.To address this,this paper proposes a diffusion-based AD method,Anomaly Detection Denoising Diffusion Probabilistic Model(AD-DDPM)for robust AD.The method employs a U-attention-net to capture local and global features and introduces a filtered contrastive mechanism to mitigate the impact of contaminated training data.By leveraging the probabilistic nature of diffusion models,AD-DDPM effectively models normal data distributions,achieving superior AD even with polluted samples.Experimental validation on fault simulation datasets demonstrates the method’s exceptional performance,outperforming traditional machine learning and deep learning baselines.The proposed approach offers a promising solution for reliable health monitoring in industrial settings. 展开更多
关键词 anomaly detection contaminated data diffusion model rotating machinery
在线阅读 下载PDF
Syn-Aug:An Effective and General Synchronous Data Augmentation Framework for 3D Object Detection
10
作者 Huaijin Liu Jixiang Du +2 位作者 Yong Zhang Hongbo Zhang Jiandian Zeng 《CAAI Transactions on Intelligence Technology》 2025年第3期912-928,共17页
Data augmentation plays an important role in boosting the performance of 3D models,while very few studies handle the 3D point cloud data with this technique.Global augmentation and cut-paste are commonly used augmenta... Data augmentation plays an important role in boosting the performance of 3D models,while very few studies handle the 3D point cloud data with this technique.Global augmentation and cut-paste are commonly used augmentation techniques for point clouds,where global augmentation is applied to the entire point cloud of the scene,and cut-paste samples objects from other frames into the current frame.Both types of data augmentation can improve performance,but the cut-paste technique cannot effectively deal with the occlusion relationship between the foreground object and the background scene and the rationality of object sampling,which may be counterproductive and may hurt the overall performance.In addition,LiDAR is susceptible to signal loss,external occlusion,extreme weather and other factors,which can easily cause object shape changes,while global augmentation and cut-paste cannot effectively enhance the robustness of the model.To this end,we propose Syn-Aug,a synchronous data augmentation framework for LiDAR-based 3D object detection.Specifically,we first propose a novel rendering-based object augmentation technique(Ren-Aug)to enrich training data while enhancing scene realism.Second,we propose a local augmentation technique(Local-Aug)to generate local noise by rotating and scaling objects in the scene while avoiding collisions,which can improve generalisation performance.Finally,we make full use of the structural information of 3D labels to make the model more robust by randomly changing the geometry of objects in the training frames.We verify the proposed framework with four different types of 3D object detectors.Experimental results show that our proposed Syn-Aug significantly improves the performance of various 3D object detectors in the KITTI and nuScenes datasets,proving the effectiveness and generality of Syn-Aug.On KITTI,four different types of baseline models using Syn-Aug improved mAP by 0.89%,1.35%,1.61%and 1.14%respectively.On nuScenes,four different types of baseline models using Syn-Aug improved mAP by 14.93%,10.42%,8.47%and 6.81%respectively.The code is available at https://github.com/liuhuaijjin/Syn-Aug. 展开更多
关键词 3D object detection data augmentation DIVERSITY GENERALIZATION point cloud ROBUSTNESS
在线阅读 下载PDF
Surprisal-based algorithm for detecting anomalies in categorical data
11
作者 Ossama Cherkaoui Houda Anoun Abderrahim Maizate 《Data Science and Management》 2025年第2期185-195,共11页
Anomaly detection is an important research area in a diverse range of real-world applications.Although many algorithms have been proposed to address anomaly detection for numerical datasets,categorical and mixed datas... Anomaly detection is an important research area in a diverse range of real-world applications.Although many algorithms have been proposed to address anomaly detection for numerical datasets,categorical and mixed datasets remain a significant challenge,primarily because a natural distance metric is lacking.Consequently,the methods proposed in the literature implement entirely different assumptions regarding the definition of cate-gorical anomalies.This paper presents a novel categorical anomaly detection approach,offering two key con-tributions to existing methods.First,a novel surprisal-based anomaly score is introduced,which provides a more accurate assessment of anomalies by considering the full distribution of categorical values.Second,the proposed method considers complex correlations in the data beyond the pairwise interactions of features.This study proposed and tested the novel categorical surprisal anomaly detection algorithm(CSAD)by comparing and evaluating it against six competitors.The experimental results indicate that CSAD produced the best overall performance,achieving the highest average ROC-AUC and PR-AUC values of 0.8 and 0.443,respectively.Furthermore,CSAD's execution time is satisfactory even when processing large,high-dimensional datasets. 展开更多
关键词 Unsupervised learning Anomaly detection Categorical data Surprisal anomaly score
在线阅读 下载PDF
Optimal fault detection from seismic data using intelligent techniques:A comprehensive review of methods
12
作者 Bhaktishree Nayak Pallavi Nayak 《Journal of Groundwater Science and Engineering》 2025年第2期193-208,共16页
Seismic data plays a pivotal role in fault detection,offering critical insights into subsurface structures and seismic hazards.Understanding fault detection from seismic data is essential for mitigating seismic risks ... Seismic data plays a pivotal role in fault detection,offering critical insights into subsurface structures and seismic hazards.Understanding fault detection from seismic data is essential for mitigating seismic risks and guiding land-use plans.This paper presents a comprehensive review of existing methodologies for fault detection,focusing on the application of Machine Learning(ML)and Deep Learning(DL)techniques to enhance accuracy and efficiency.Various ML and DL approaches are analyzed with respect to fault segmentation,adaptive learning,and fault detection models.These techniques,benchmarked against established seismic datasets,reveal significant improvements over classical methods in terms of accuracy and computational efficiency.Additionally,this review highlights emerging trends,including hybrid model applications and the integration of real-time data processing for seismic fault detection.By providing a detailed comparative analysis of current methodologies,this review aims to guide future research and foster advancements in the effectiveness and reliability of seismic studies.Ultimately,the study seeks to bridge the gap between theoretical investigations and practical implementations in fault detection. 展开更多
关键词 Seismic data Fault detection Fault Segmentation Machine learning Deep learning Adaptive learning
在线阅读 下载PDF
Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN
13
作者 Lun Tang Yuchen Zhao +4 位作者 Chengcheng Xue Zhiwei Jiang Wei Zou Yanping Liang Qianbin Chen 《Digital Communications and Networks》 2025年第6期1883-1896,共14页
Anomaly detection is an important task for maintaining the performance of cloud data center.Traditional anomaly detection primarily examines individual Virtual Machine(VM)behavior,neglecting the impact of interactions... Anomaly detection is an important task for maintaining the performance of cloud data center.Traditional anomaly detection primarily examines individual Virtual Machine(VM)behavior,neglecting the impact of interactions among multiple VMs on Key Performance Indicator(KPI)data,e.g.,memory utilization.Furthermore,the nonstationarity,high complexity,and uncertain periodicity of KPI data in VM also bring difficulties to deep learningbased anomaly detection tasks.To settle these challenges,this paper proposes MCBiWGAN-GTN,a multi-channel semi-supervised time series anomaly detection algorithm based on the Bidirectional Wasserstein Generative Adversarial Network with Graph-Time Network(BiWGAN-GTN)and the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise(CEEMDAN).(a)The BiWGAN-GTN algorithm is proposed to extract spatiotemporal information from data.(b)The loss function of BiWGAN-GTN is redesigned to solve the abnormal data intrusion problem during the training process.(c)MCBiWGAN-GTN is designed to reduce data complexity through CEEMDAN for time series decomposition and utilizes BiWGAN-GTN to train different components.(d)To adapt the proposed algorithm for the entire cloud data center,a cloud data center anomaly detection framework based on Swarm Learning(SL)is designed.The evaluation results on a real-world cloud data center dataset show that MCBiWGAN-GTN outperforms the baseline,with an F1-score of 0.96,an accuracy of 0.935,a precision of 0.954,a recall of 0.967,and an FPR of 0.203.The experiments also verify the stability of MCBiWGAN-GTN,the impact of parameter configurations,and the effectiveness of the proposed SL framework. 展开更多
关键词 Cloud data center Anomaly detection Bi WGAN-GTN Time series decomposition Swarm learning
在线阅读 下载PDF
Interpretable Data-Driven Learning With Fast Ultrasonic Detection for Battery Health Estimation
14
作者 Kailong Liu Yuhang Liu +2 位作者 Qiao Peng Naxin Cui Chenghui Zhang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期267-269,共3页
Dear Editor,Health management is essential to ensure battery performance and safety, while data-driven learning system is a promising solution to enable efficient state of health(SoH) estimation of lithium-ion(Liion) ... Dear Editor,Health management is essential to ensure battery performance and safety, while data-driven learning system is a promising solution to enable efficient state of health(SoH) estimation of lithium-ion(Liion) batteries. However, the time-consuming signal data acquisition and the lack of interpretability of model still hinder its efficient deployment. Motivated by this, this letter proposes a novel and interpretable data-driven learning strategy through combining the benefits of explainable AI and non-destructive ultrasonic detection for battery SoH estimation. Specifically, after equipping battery with advanced ultrasonic sensor to promise fast real-time ultrasonic signal measurement, an interpretable data-driven learning strategy named generalized additive neural decision ensemble(GANDE) is designed to rapidly estimate battery SoH and explain the effects of the involved ultrasonic features of interest. 展开更多
关键词 ultrasonic detection interpretable data driven learning signal data acquisition battery health estimation lithium ion batteries generalized additive neural decision ensemble state health
在线阅读 下载PDF
A Residual Convolutional Autoencoder-Based Structural Damage Detection Approach for Deep-Sea Mining Riser Considering Data Fusion
15
作者 JIANG Yufeng ZHENG Zepeng +4 位作者 LIU Yu WANG Shuqing LIU Yuchi YANG Zeyun YANG Yuan 《Journal of Ocean University of China》 2025年第6期1657-1669,共13页
A deep-sea riser is a crucial component of the mining system used to lift seafloor mineral resources to the vessel.Even minor damage to the riser can lead to substantial financial losses,environmental impacts,and safe... A deep-sea riser is a crucial component of the mining system used to lift seafloor mineral resources to the vessel.Even minor damage to the riser can lead to substantial financial losses,environmental impacts,and safety hazards.However,identifying modal parameters for structural health monitoring remains a major challenge due to its large deformations and flexibility.Vibration signal-based methods are essential for detecting damage and enabling timely maintenance to minimize losses.However,accurately extracting features from one-dimensional(1D)signals is often hindered by various environmental factors and measurement noises.To address this challenge,a novel approach based on a residual convolutional auto-encoder(RCAE)is proposed for detecting damage in deep-sea mining risers,incorporating a data fusion strategy.First,principal component analysis(PCA)is applied to reduce environmental fluctuations and fuse multisensor strain readings.Subsequently,a 1D-RCAE is used to extract damage-sensitive features(DSFs)from the fused dataset.A Mahalanobis distance indicator is established to compare the DSFs of the testing and healthy risers.The specific threshold for these distances is determined using the 3σcriterion,which is employed to assess whether damage has occurred in the testing riser.The effectiveness and robustness of the proposed approach are verified through numerical simulations of a 500-m riser and experimental tests on a 6-m riser.Moreover,the impact of contaminated noise and environmental fluctuations is examined.Results show that the proposed PCA-1D-RCAE approach can effectively detect damage and is resilient to measurement noise and environmental fluctuations.The accuracy exceeds 98%under noise-free conditions and remains above 90%even with 10 dB noise.This novel approach has the potential to establish a new standard for evaluating the health and integrity of risers during mining operations,thereby reducing the high costs and risks associated with failures.Maintenance activities can be scheduled more efficiently by enabling early and accurate detection of riser damage,minimizing downtime and avoiding catastrophic failures. 展开更多
关键词 deep-sea mining riser structural damage detection residual convolutional auto-encoder data fusion principal component analysis
在线阅读 下载PDF
Topology Data Analysis-Based Error Detection for Semantic Image Transmission with Incremental Knowledge-Based HARQ
16
作者 Ni Fei Li Rongpeng +1 位作者 Zhao Zhifeng Zhang Honggang 《China Communications》 2025年第1期235-255,共21页
Semantic communication(SemCom)aims to achieve high-fidelity information delivery under low communication consumption by only guaranteeing semantic accuracy.Nevertheless,semantic communication still suffers from unexpe... Semantic communication(SemCom)aims to achieve high-fidelity information delivery under low communication consumption by only guaranteeing semantic accuracy.Nevertheless,semantic communication still suffers from unexpected channel volatility and thus developing a re-transmission mechanism(e.g.,hybrid automatic repeat request[HARQ])becomes indispensable.In that regard,instead of discarding previously transmitted information,the incremental knowledge-based HARQ(IK-HARQ)is deemed as a more effective mechanism that could sufficiently utilize the information semantics.However,considering the possible existence of semantic ambiguity in image transmission,a simple bit-level cyclic redundancy check(CRC)might compromise the performance of IK-HARQ.Therefore,there emerges a strong incentive to revolutionize the CRC mechanism,thus more effectively reaping the benefits of both SemCom and HARQ.In this paper,built on top of swin transformer-based joint source-channel coding(JSCC)and IK-HARQ,we propose a semantic image transmission framework SC-TDA-HARQ.In particular,different from the conventional CRC,we introduce a topological data analysis(TDA)-based error detection method,which capably digs out the inner topological and geometric information of images,to capture semantic information and determine the necessity for re-transmission.Extensive numerical results validate the effectiveness and efficiency of the proposed SC-TDA-HARQ framework,especially under the limited bandwidth condition,and manifest the superiority of TDA-based error detection method in image transmission. 展开更多
关键词 error detection incremental knowledgebased HARQ joint source-channel coding semantic communication swin transformer topological data analysis
在线阅读 下载PDF
Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)
17
作者 Jitendra Kumar Samriya Virendra Singh +4 位作者 Gourav Bathla Meena Malik Varsha Arya Wadee Alhalabi Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3893-3910,共18页
The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated cha... The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated challenges,such as data security,interoperability,and ethical concerns,is crucial to realizing the full potential of IoT in healthcare.Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems.In this context,this paper presents a novelmethod for healthcare data privacy analysis.The technique is based on the identification of anomalies in cloud-based Internet of Things(IoT)networks,and it is optimized using explainable artificial intelligence.For anomaly detection,the Radial Boltzmann Gaussian Temporal Fuzzy Network(RBGTFN)is used in the process of doing information privacy analysis for healthcare data.Remora Colony SwarmOptimization is then used to carry out the optimization of the network.The performance of the model in identifying anomalies across a variety of healthcare data is evaluated by an experimental study.This evaluation suggested that themodel measures the accuracy,precision,latency,Quality of Service(QoS),and scalability of themodel.A remarkable 95%precision,93%latency,89%quality of service,98%detection accuracy,and 96%scalability were obtained by the suggested model,as shown by the subsequent findings. 展开更多
关键词 Healthcare data privacy analysis anomaly detection cloud IoT network explainable artificial intelligence temporal fuzzy network
在线阅读 下载PDF
A two-sample KS test with m out of n bootstrap for massive data
18
作者 XIE Xiaoyue TIAN Xinyu SHI Jian 《纯粹数学与应用数学》 2025年第4期744-760,共17页
In the era of big data,traditional statistical inference methods are faced with great challenges.Taking the two-sample distribution test scenario of big data as an example,this paper proposes the BB-KS test based on m... In the era of big data,traditional statistical inference methods are faced with great challenges.Taking the two-sample distribution test scenario of big data as an example,this paper proposes the BB-KS test based on m out of n bootstrap for solving a single-machine memory and computing constraints.It is verified to the feasibility and effectiveness of the proposed test method through theoretical analysis and numerical simulation.The results show that the BB-KS test can improve the calculation efficiency of the test to a certain extent in the single machine scenario. 展开更多
关键词 massive data two sample test the BB-KS method m out of n bootstrap
在线阅读 下载PDF
MAID:making accurate transmission line icing detector by enhancing inaccurate dataset
19
作者 SUN Wei WANG Yu +3 位作者 GAO Bo ZHANG Shujuan WANG Xiaojin XING Lu 《Optoelectronics Letters》 2025年第10期606-611,共6页
Power transmission lines are a critical component of the entire power system,and ice accretion incidents caused by various types of power systems can result in immeasurable harm.Currently,network models used for ice d... Power transmission lines are a critical component of the entire power system,and ice accretion incidents caused by various types of power systems can result in immeasurable harm.Currently,network models used for ice detection on power transmission lines require a substantial amount of sample data to support their training,and their drawback is that detection accuracy is significantly affected by the inaccurate annotation among training dataset.Therefore,we propose a transformer-based detection model,structured into two stages to collectively address the impact of inaccurate datasets on model training.In the first stage,a spatial similarity enhancement(SSE)module is designed to leverage spatial information to enhance the construction of the detection framework,thereby improving the accuracy of the detector.In the second stage,a target similarity enhancement(TSE)module is introduced to enhance object-related features,reducing the impact of inaccurate data on model training,thereby expanding global correlation.Additionally,by incorporating a multi-head adaptive attention window(MAAW),spatial information is combined with category information to achieve information interaction.Simultaneously,a quasi-wavelet structure,compatible with deep learning,is employed to highlight subtle features at different scales.Experimental results indicate that the proposed model in this paper outperforms existing mainstream detection models,demonstrating superior performance and stability. 展开更多
关键词 power transmission lines ice detection ice accretion sample data spatial similarity enhancement power systemand transformer based model power systems
原文传递
DAMAGE DETECTION IN BUILDINGS USING A TWO-STAGE SENSITIVITY-BASED METHOD FROM MODAL TEST DATA
20
作者 ZhuHongping ChenXiaozhen ChenChuanyao 《Acta Mechanica Solida Sinica》 SCIE EI 2005年第2期150-156,共7页
Many multi-story or highrise buildings consisting of a number of identical stories are usually considered as periodic spring-mass systems. The general expressions of natural frequencies, mode shapes, slopes and curvat... Many multi-story or highrise buildings consisting of a number of identical stories are usually considered as periodic spring-mass systems. The general expressions of natural frequencies, mode shapes, slopes and curvatures of mode shapes of the periodic spring-mass system by utilizing the periodic structure theory are derived in this paper. The sensitivities of these mode parameters with respect to structural damages, which do not depend on the physical parameters of the original structures, are obtained. Based on the sensitivity analysis of these mode parameters, a two-stage method is proposed to localize and quantify damages of multi-story or highrise buildings. The slopes and curvatures of mode shapes, which are highly sensitive to local damages, are used to localize the damages. Subsequently, the limited measured natural frequencies, which have a better accuracy than the other mode parameters, are used to quantify the extent of damages within the potential damaged locations. The experimental results of a 3-story experimental building demonstrate that the single or multiple damages of buildings, either slight or severe, can be correctly localized by using only the slope or curvature of mode shape in one of the lower modes, in which the change of natural frequency is the largest, and can be accurately quantified by the limited measured natural frequencies with noise pollution. 展开更多
关键词 damage localization damage quantification sensitivity modal test data
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部