scholarly journals A Comparative Study between Machine Learning Algorithm and Artificial Intelligence Neural Network in Detecting Minor Bearing Fault of Induction Motors

Energies ◽  
2019 ◽  
Vol 12 (11) ◽  
pp. 2105 ◽  
Author(s):  
Shrinathan Esakimuthu Pandarakone ◽  
Yukio Mizuno ◽  
Hisahide Nakamura

Most of the mechanical systems in industries are made to run through induction motors (IM). To maintain the performance of the IM, earlier detection of minor fault and continuous monitoring (CM) are required. Among IM faults, bearing faults are considered as indispensable because of its high probability incidence nature. CM mainly depends upon signal processing and fault detection techniques. In recent decades, various methods have been involved in detecting the bearing fault using machine learning (ML) algorithms. Additionally, the role of artificial intelligence (AI), a growing technology, has also been used in fault diagnosis of IM. Taking the necessity of minor fault detection and the detailed study about the role of ML and AI to detect the bearing fault, the present study is performed. A comprehensive study is conducted by considering various diagnosis methods from ML and AI for detecting a minor bearing fault (hole and scratch). This study helps in understanding the difference between the diagnosis approach and their effectiveness in detecting an IM bearing fault. It is accomplished through FFT (fast Fourier transform) analysis of the load current and the extracted features are used to train the algorithm. The application is extended by comparing the result of ML and AI, and then explaining the specific purpose of use.

Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 656
Author(s):  
Xavier Larriva-Novo ◽  
Víctor A. Villagrá ◽  
Mario Vega-Barbas ◽  
Diego Rivera ◽  
Mario Sanz Rodrigo

Security in IoT networks is currently mandatory, due to the high amount of data that has to be handled. These systems are vulnerable to several cybersecurity attacks, which are increasing in number and sophistication. Due to this reason, new intrusion detection techniques have to be developed, being as accurate as possible for these scenarios. Intrusion detection systems based on machine learning algorithms have already shown a high performance in terms of accuracy. This research proposes the study and evaluation of several preprocessing techniques based on traffic categorization for a machine learning neural network algorithm. This research uses for its evaluation two benchmark datasets, namely UGR16 and the UNSW-NB15, and one of the most used datasets, KDD99. The preprocessing techniques were evaluated in accordance with scalar and normalization functions. All of these preprocessing models were applied through different sets of characteristics based on a categorization composed by four groups of features: basic connection features, content characteristics, statistical characteristics and finally, a group which is composed by traffic-based features and connection direction-based traffic characteristics. The objective of this research is to evaluate this categorization by using various data preprocessing techniques to obtain the most accurate model. Our proposal shows that, by applying the categorization of network traffic and several preprocessing techniques, the accuracy can be enhanced by up to 45%. The preprocessing of a specific group of characteristics allows for greater accuracy, allowing the machine learning algorithm to correctly classify these parameters related to possible attacks.


2020 ◽  
Vol 5 (19) ◽  
pp. 32-35
Author(s):  
Anand Vijay ◽  
Kailash Patidar ◽  
Manoj Yadav ◽  
Rishi Kushwah

In this paper an analytical survey on the role of machine learning algorithms in case of intrusion detection has been presented and discussed. This paper shows the analytical aspects in the development of efficient intrusion detection system (IDS). The related study for the development of this system has been presented in terms of computational methods. The discussed methods are data mining, artificial intelligence and machine learning. It has been discussed along with the attack parameters and attack types. This paper also elaborates the impact of different attack and handling mechanism based on the previous papers.


2021 ◽  
Vol 4 (4) ◽  
pp. 96
Author(s):  
Jarina Raihan A ◽  
Pg Emeroylariffion Abas ◽  
Liyanage C De Silva

Underwater images are extremely sensitive to distortion occurring in an aquatic underwater environment, with absorption, scattering, polarization, diffraction and low natural light penetration representing common problems caused by sea water. Because of these degradation of quality, effectiveness of the acquired images for underwater applications may be limited. An effective method of restoring underwater images has been demonstrated, by considering the wavelengths of red, blue, and green lights, attenuation and backscattering coefficients. The results from the underwater restoration method have been applied to various underwater applications; particularly, edge detection, Speeded Up Robust Feature detection, and image classification that uses machine learning. It has been shown that more edges and more SURF points can be detected as a result of using the method. Applying the method to restore underwater images in image classification tasks on underwater image datasets gives accuracy of up to 89% using a simple machine-learning algorithm. These results are significant as it demonstrates that the restoration method can be implemented on underwater system for various purposes.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042086
Author(s):  
Yuqi Qin

Abstract Machine learning algorithm is the core of artificial intelligence, is the fundamental way to make computer intelligent, its application in all fields of artificial intelligence. Aiming at the problems of the existing algorithms in the discrete manufacturing industry, this paper proposes a new 0-1 coding method to optimize the learning algorithm, and finally proposes a learning algorithm of “IG type learning only from the best”.


Sign in / Sign up

Export Citation Format

Share Document