Semi supervised inspection algorithm of automatic packaging curve based on deep learning

Author(s):  
Yong He

The current automatic packaging process is complex, requires high professional knowledge, poor universality, and difficult to apply in multi-objective and complex background. In view of this problem, automatic packaging optimization algorithm has been widely paid attention to. However, the traditional automatic packaging detection accuracy is low, the practicability is poor. Therefore, a semi-supervised detection method of automatic packaging curve based on deep learning and semi-supervised learning is proposed. Deep learning is used to extract features and posterior probability to classify unlabeled data. KDD CUP99 data set was used to verify the accuracy of the algorithm. Experimental results show that this method can effectively improve the performance of automatic packaging curve semi-supervised detection system.

Sensors ◽  
2019 ◽  
Vol 19 (17) ◽  
pp. 3768 ◽  
Author(s):  
Kong ◽  
Chen ◽  
Wang ◽  
Chen ◽  
Meng ◽  
...  

Vision-based fall-detection methods have been previously studied but many have limitations in terms of practicality. Due to differences in rooms, users do not set the camera or sensors at the same height. However, few studies have taken this into consideration. Moreover, some fall-detection methods are lacking in terms of practicality because only standing, sitting and falling are taken into account. Hence, this study constructs a data set consisting of various daily activities and fall events and studies the effect of camera/sensor height on fall-detection accuracy. Each activity in the data set is carried out by eight participants in eight directions and taken with the depth camera at five different heights. Many related studies heavily depended on human segmentation by using Kinect SDK but this is not reliable enough. To address this issue, this study proposes Enhanced Tracking and Denoising Alex-Net (ETDA-Net) to improve tracking and denoising performance and classify fall and non-fall events. Experimental results indicate that fall-detection accuracy is affected by camera height, against which ETDA-Net is robust, outperforming traditional deep learning based fall-detection methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Ihtisham Ullah ◽  
Basit Raza ◽  
Sikandar Ali ◽  
Irshad Ahmed Abbasi ◽  
Samad Baseer ◽  
...  

Software Defined Network (SDN) is a next-generation networking architecture and its power lies in centralized control intelligence. The control plane of SDN can be extended to many underlying networks such as fog to Internet of Things (IoT). The fog-to-IoT is currently a promising architecture to manage a real-time large amount of data. However, most of the fog-to-IoT devices are resource-constrained and devices are widespread that can be potentially targeted with cyber-attacks. The evolving cyber-attacks are still an arresting challenge in the fog-to-IoT environment such as Denial of Service (DoS), Distributed Denial of Service (DDoS), Infiltration, malware, and botnets attacks. They can target varied fog-to-IoT agents and the whole network of organizations. The authors propose a deep learning (DL) driven SDN-enabled architecture for sophisticated cyber-attacks detection in fog-to-IoT environment to identify new attacks targeting IoT devices as well as other threats. The extensive simulations have been carried out using various DL algorithms and current state-of-the-art Coburg Intrusion Detection Data Set (CIDDS-001) flow-based dataset. For better analysis five DL models are compared including constructed hybrid DL models to distinguish the DL model with the best performance. The results show that proposed Long Short-Term Memory (LSTM) hybrid model outperforms other DL models in terms of detection accuracy and response time. To show unbiased results 10-fold cross-validation is performed. The proposed framework is so effective that it can detect several types of cyber-attacks with 99.92% accuracy rate in multiclass classification.


2021 ◽  
Vol 11 (15) ◽  
pp. 7050
Author(s):  
Zeeshan Ahmad ◽  
Adnan Shahid Khan ◽  
Kashif Nisar ◽  
Iram Haider ◽  
Rosilah Hassan ◽  
...  

The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate and exchange sensitive data over the traditional internet, security has become a prime concern due to the generation of zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide the much-needed efficient security solution to the IoT network by protecting the network entry points through constant network traffic monitoring. Recent NIDS have a high false alarm rate (FAR) in detecting the anomalies, including the novel and zero-day anomalies. This paper proposes an efficient anomaly detection mechanism using mutual information (MI), considering a deep neural network (DNN) for an IoT network. A comparative analysis of different deep-learning models such as DNN, Convolutional Neural Network, Recurrent Neural Network, and its different variants, such as Gated Recurrent Unit and Long Short-term Memory is performed considering the IoT-Botnet 2020 dataset. Experimental results show the improvement of 0.57–2.6% in terms of the model’s accuracy, while at the same time reducing the FAR by 0.23–7.98% to show the effectiveness of the DNN-based NIDS model compared to the well-known deep learning models. It was also observed that using only the 16–35 best numerical features selected using MI instead of 80 features of the dataset result in almost negligible degradation in the model’s performance but helped in decreasing the overall model’s complexity. In addition, the overall accuracy of the DL-based models is further improved by almost 0.99–3.45% in terms of the detection accuracy considering only the top five categorical and numerical features.


2020 ◽  
Vol 10 (23) ◽  
pp. 8625
Author(s):  
Yali Song ◽  
Yinghong Wen

In the positioning process of a high-speed train, cumulative error may result in a reduction in the positioning accuracy. The assisted positioning technology based on kilometer posts can be used as an effective method to correct the cumulative error. However, the traditional detection method of kilometer posts is time-consuming and complex, which greatly affects the correction efficiency. Therefore, in this paper, a kilometer post detection model based on deep learning is proposed. Firstly, the Deep Convolutional Generative Adversarial Networks (DCGAN) algorithm is introduced to construct an effective kilometer post data set. This greatly reduces the cost of real data acquisition and provides a prerequisite for the construction of the detection model. Then, by using the existing optimization as a reference and further simplifying the design of the Single Shot multibox Detector (SSD) model according to the specific application scenario of this paper, the kilometer post detection model based on an improved SSD algorithm is established. Finally, from the analysis of the experimental results, we know that the detection model established in this paper ensures both detection accuracy and efficiency. The accuracy of our model reached 98.92%, while the detection time was only 35.43 ms. Thus, our model realizes the rapid and accurate detection of kilometer posts and improves the assisted positioning technology based on kilometer posts by optimizing the detection method.


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2348 ◽  
Author(s):  
Liangliang Lou ◽  
Jinyi Zhang ◽  
Yong Xiong ◽  
Yanliang Jin

Smart Parking Management Systems (SPMSs) have become a research hotspot in recent years. Many researchers are focused on vehicle detection technology for SPMS which is based on magnetic sensors. Magnetism-based wireless vehicle detectors (WVDs) integrate low-power wireless communication technology, which improves the convenience of construction and maintenance. However, the magnetic signals are not only susceptible to the adjacent vehicles, but also affected by the magnetic signal dead zone of high-chassis vehicles, resulting in a decrease in vehicle detection accuracy. In order to improve the vehicle detection accuracy of the magnetism-based WVDs, the paper introduces an RF-based vehicle detection method based on the characteristics analysis of received signal strengths (RSSs) generated by the wireless transceivers. Since wireless transceivers consume more energy than magnetic sensors, the proposed RF-based method is only activated to extract the data characteristics of RSSs to further judge the states of vehicles when the data feature of magnetic signals is not sufficient to provide accurate judgment on parking space status. The proposed method was evaluated in an actual roadside parking lot and experimental results show that when the sampling rate of magnetic sensor is 1 Hz, the vehicle detection accuracy is up to 99.62%. Moreover, compared with machine-learning-based vehicle detection method, the experimental results show that our method has achieved a good compromise between detection accuracy and power consumption.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Yaojun Hao ◽  
Fuzhi Zhang ◽  
Jian Wang ◽  
Qingshan Zhao ◽  
Jianfang Cao

Due to the openness of the recommender systems, the attackers are likely to inject a large number of fake profiles to bias the prediction of such systems. The traditional detection methods mainly rely on the artificial features, which are often extracted from one kind of user-generated information. In these methods, fine-grained interactions between users and items cannot be captured comprehensively, leading to the degradation of detection accuracy under various types of attacks. In this paper, we propose an ensemble detection method based on the automatic features extracted from multiple views. Firstly, to collaboratively discover the shilling profiles, the users’ behaviors are analyzed from multiple views including ratings, item popularity, and user-user graph. Secondly, based on the data preprocessed from multiple views, the stacked denoising autoencoders are used to automatically extract user features with different corruption rates. Moreover, the features extracted from multiple views are effectively combined based on principal component analysis. Finally, according to the features extracted with different corruption rates, the weak classifiers are generated and then integrated to detect attacks. The experimental results on the MovieLens, Netflix, and Amazon datasets indicate that the proposed method can effectively detect various attacks.


2014 ◽  
Vol 716-717 ◽  
pp. 924-927
Author(s):  
Xiu Ying Li ◽  
Cun Ping Liu ◽  
Rong Fang Mei

In the process of fault signal detection of large-scale integrated circuit, the fault signal detection can improve the working performance of large-scale integrated circuit. The traditional detection system is simple, time-consuming, and the error is large, the fault signal detection haslow accuracy. In view of this situation, a new design method of large scale integrated circuit fault signal detection system is proposed based on single chip microcomputer. S3C2410 is taken as hardware design basis, and the signal sensor is used, the software algorithm uses three B spline wavelet transform for ORB wave detection method. The detection is completed.The experiment experimental results show that the system can improve the detection accuracy greatly, and effectively improve the work efficiency.


2014 ◽  
Vol 716-717 ◽  
pp. 936-939
Author(s):  
Lin Zhang

Detection speed of traditional face detection method based on AdaBoost algorithm is slow since AdaBoost asks a large number of features. Therefore, to address this shortcoming, we proposed a fast face detection method based on AdaBoost and canny operators in this paper. Firstly, we use canny operators to detect edge of face image which separates the region of the possible human face from image, and then do face detection in the separated region using Modest AdaBoost algorithm (MAB). Before using MAB to achieve face detection, utilizing canny operators to detect edge can make this algorithm effectively filter information, retain useful information, reduce the amount of information and improve detection speed. Experimental results show that the algorithm can obtain higher detection accuracy and detection speed has been significantly improved at the same time.


2021 ◽  
Vol 267 ◽  
pp. 01034
Author(s):  
Li Mingyang ◽  
Li Chengrong

Household waste is threatening the urban environment increasingly day by day for people’s material needs increasing with the acceleration of urbanization. In this paper, a new waste sorting model is proposed to solve the problems of waste sorting. The style transfer was used to increase the data set to make some objects be sorted well. Then the rotational attention mechanism model was used to increase the accuracy of waste sorting of the blocked objects. The representation vector extraction module in the target tracking algorithm Deep Sort was replaced with Siamese network to make the network more lightweight. As a result, this paper effectively solves the current waste sorting tasks.


CONVERTER ◽  
2021 ◽  
pp. 598-605
Author(s):  
Zhao Jianchao

Behind the rapid development of the Internet industry, Internet security has become a hidden danger. In recent years, the outstanding performance of deep learning in classification and behavior prediction based on massive data makes people begin to study how to use deep learning technology. Therefore, this paper attempts to apply deep learning to intrusion detection to learn and classify network attacks. Aiming at the nsl-kdd data set, this paper first uses the traditional classification methods and several different deep learning algorithms for learning classification. This paper deeply analyzes the correlation among data sets, algorithm characteristics and experimental classification results, and finds out the deep learning algorithm which is relatively good at. Then, a normalized coding algorithm is proposed. The experimental results show that the algorithm can improve the detection accuracy and reduce the false alarm rate.


Sign in / Sign up

Export Citation Format

Share Document