Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

PDF

Deep learning

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 64

Full-Text Articles in Computer Engineering

Deep Learning Based Local Path Planning Method For Moving Robots, Zesen Liu, Sheng Bi, Chuanhong Guo, Yankui Wang, Min Dong May 2024

Deep Learning Based Local Path Planning Method For Moving Robots, Zesen Liu, Sheng Bi, Chuanhong Guo, Yankui Wang, Min Dong

Journal of System Simulation

Abstract: In order to integrate visual information into the robot navigation process, improve the robot's recognition rate of various types of obstacles, and reduce the occurrence of dangerous events, a local path planning network based on two-dimensional CNN and LSTM is designed, and a local path planning approach based on deep learning is proposed. The network uses the image from camera and the global path to generate the current steering angle required for obstacle avoidance and navigation. A simulated indoor scene is built for training and validating the network. A path evaluation method that uses the total length and the …


Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen May 2024

Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen

Engineering Faculty Articles and Research

Dual-hand gesture recognition is crucial for intuitive 3D interactions in virtual reality (VR), allowing the user to interact with virtual objects naturally through gestures using both handheld controllers. While deep learning and sensor-based technology have proven effective in recognizing single-hand gestures for 3D interactions, research on dual-hand gesture recognition for VR interactions is still underexplored. In this work, we introduce CWT-CNN-TCN, a novel deep learning model that combines a 2D Convolution Neural Network (CNN) with Continuous Wavelet Transformation (CWT) and a Temporal Convolution Network (TCN). This model can simultaneously extract features from the time-frequency domain and capture long-term dependencies using …


Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei Apr 2024

Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei

Journal of System Simulation

Abstract: In order to improve the processing ability of the depth-neural network dehazing algorithm to the supplementary data set, and to make the network differently process the image features of different importance to improve the dehazing ability of the network, an incremental dehazing algorithm based on multiple migration of attention is proposed. The teacher's attention generation network in the form of Encoder-Decoder extracts the multiple attention of labels and haze, which is used it as the label of the characteristic migration media network to constrain the network training to form the migration media attention as close as possible to the …


Expanding Analytical Capabilities In Intrusion Detection Through Ensemble-Based Multi-Label Classification, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif Apr 2024

Expanding Analytical Capabilities In Intrusion Detection Through Ensemble-Based Multi-Label Classification, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif

Electrical and Computer Engineering Publications

Intrusion detection systems are primarily designed to flag security breaches upon their occurrence. These systems operate under the assumption of single-label data, where each instance is assigned to a single category. However, when dealing with complex data, such as malware triage, the information provided by the IDS is limited. Consequently, additional analysis becomes necessary, leading to delays and incurring additional computational costs. Existing solutions to this problem typically merge these steps by considering a unified, but large, label set encompassing both intrusion and analytical labels, which adversely affects efficiency and performance. To address these challenges, this paper presents a novel …


Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow Apr 2024

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow

Electrical & Computer Engineering Theses & Dissertations

Facial expression production and perception in autism spectrum disorder (ASD) suggest the potential presence of behavioral biomarkers that may stratify individuals on the spectrum into prognostic or treatment subgroups. High-speed internet and the ease of technology have enabled remote, scalable, affordable, and timely access to medical care, such as measurements of ASDrelated behaviors in familiar environments to complement clinical observation. Machine and deep learning (DL)-based analysis of video tracking (VT) of expression production and eye tracking (ET) of expression perception may aid stratification biomarker discovery for children and young adults with ASD. However, there are open challenges in 1) facial …


Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li Jan 2024

Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li

Journal of System Simulation

Abstract: Aiming at the lack of directionality of traditional dot product attention, this paper proposes a directed attention model (DAM) based on cosine similarity. To effectively represent the direction relationship between the spatial and temporal features of video frames, the paper defines the relationship function in the attention mechanism using the cosine similarity theory, which can remove the absolute value of the relationship between features. To reduce the computational burden of the attention mechanism, the operation is decomposed from two dimensions of time and space. The computational complexity is further optimized by combining linear attention operation. The experiment is divided …


A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor Jan 2024

A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor

UNF Graduate Theses and Dissertations

Previous literature demonstrates that autonomous UAVs (unmanned aerial vehicles) have the po- tential to be utilized for wildfire surveillance. This advanced technology empowers firefighters by providing them with critical information, thereby facilitating more informed decision-making processes. This thesis applies deep Q-learning techniques to the problem of control policy design under the objective that the UAVs collectively identify the maximum number of locations that are under fire, assuming the UAVs can share their observations. The prohibitively large state space underlying the control policy motivates a neural network approximation, but prior work used only convolutional layers to extract spatial fire information from …


Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang Sep 2023

Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang

Journal of System Simulation

Abstract: To address the problem of the loss of local style details in cross-domain image simulation, a ChinOperaGAN network framework suitable for opera makeup is designed from the perspective of protecting the excellent traditional culture. In order to solve the style translation of differences in two image domains, multiple overlapping local adversarial discriminators are proposed in the generative adversarial network. Since paired opera makeup data are difficult to obtain, a synthetic image is generated by combining the source image makeup mapping to effectively guide the transfer of local makeup details between images. In view of the characteristics of opera makeup …


Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni May 2023

Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni

UNLV Theses, Dissertations, Professional Papers, and Capstones

Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan Jan 2023

Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan

Journal of System Simulation

Abstract: Aiming at the problems of low intelligence and poor adaptability for the existing mixed signal recognition methods, an intelligent recognition method based on cyclic spectral cross section and deep learning is proposed. For common mixed communication signals, the characteristics of zero frequency cross section of cyclic spectrum are theoretically deduced and analyzed. Two new pre-processing methods, nonlinear segmental mapping and directional pseudo-clustering are proposed, which can effectively improve the adaptability and consistency of cross section features. The pre-processed feature graph is combined with the residual network (ResNet), and the deep learning network is used to mine and analyze the …


Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu Jan 2023

Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu

Journal of System Simulation

Abstract: The efficient, accurate and automatic judgment of the combat mission or intention of the enemy's air targets in the battlefield is the basis of situation awareness and the key to the allocation of auxiliary combat resources. Combined with the calculation characteristics of feed forward deep neural network and long-term and short-term memory network model, two targeted basic index learners are designed, and then the weighted combination is carried out according to the cross entropy of the basic index, which can be used to further train the evaluation index of the learner. It can not only effectively prevent the model …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


A Wind Turbine Fault Diagnosis Method Based On Siamese Deep Neural Network, Jiarui Liu, Guotian Yang, Xiaowei Wang Nov 2022

A Wind Turbine Fault Diagnosis Method Based On Siamese Deep Neural Network, Jiarui Liu, Guotian Yang, Xiaowei Wang

Journal of System Simulation

Abstract: In order to effectively extract the fault features of time series data in supervisory control and data acquisition (SCADA), considering the advantages of one-dimensional convolutional neural network (1-D CNN) for extracting local time series features and the advantages of long-term memory (LSTM) which can extract long-term dependent features, a method for fault diagnosis of wind turbines based on 1-D CNN-LSTM is proposed. To solve the problem of the scarcity of fault samples of wind turbines based on the siamese network architecture, a wind fault diagnosis method based on siamese 1-D CNN-LSTM is proposed. The proposed siamese 1-D CNN-LSTM …


Fatigue Detection Method Based On Facial Features And Head Posture, Rongxiu Lu, Bihao Zhang, Zhenlong Mo Oct 2022

Fatigue Detection Method Based On Facial Features And Head Posture, Rongxiu Lu, Bihao Zhang, Zhenlong Mo

Journal of System Simulation

Abstract: Aiming at the of the single fatigue characteristics, low robustness and inability to customize fatigue thresholds for different drivers of fatigue detection methods, a method based on facial features and head posture is proposed. In face detection and face key point positioning HOG feature operator and regression tree algorithm are used. In head posture estimation, head posture Euler angle is estimated by combining the face key points with the coordinate system transformation. In fatigue feature extraction, a deep residual neural network model is established to extract the eye fatigue features, which the eye, mouth aspect ratio and head posture …


Electrical Resistance Tomography And Flow Pattern Identification Method Based On Deep Residual Neural Network, Weiguo Tong, Shichao Zeng, Lifeng Zhang, Zhe Hou, Jiayue Guo Sep 2022

Electrical Resistance Tomography And Flow Pattern Identification Method Based On Deep Residual Neural Network, Weiguo Tong, Shichao Zeng, Lifeng Zhang, Zhe Hou, Jiayue Guo

Journal of System Simulation

Abstract: Aiming at the low accuracy of inverse problem imaging and flow pattern recognition in electrical resistance tomography (ERT), a two-phase flow electrical resistance tomography and flow pattern recognition method based on the deep residual neural network is proposed. The finite element method is used to model the ERT forward problem to construct the "boundary voltage-conductivity distribution-flow pattern category" dataset of various gas-liquid two-phase flow distributions. The residual neural network for ERT image reconstruction and flow pattern identification of gas-liquid two-phase flow is built and trained. The two outputs of the residual neural network are processed respectively to obtain …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Aerial Target Threat Assessment Method Based On Deep Learning, Huimin Chai, Yong Zhang, Xinyue Li, Yanan Song Jul 2022

Aerial Target Threat Assessment Method Based On Deep Learning, Huimin Chai, Yong Zhang, Xinyue Li, Yanan Song

Journal of System Simulation

Abstract: Due to many factors of aerial target threat assessment and the lack of self-learning ability of current assessment methods, a deep neural network model for aerial target threat assessment is established using deep learning theory. In order to improve the fitting effect of the model training, a symmetric pre-training method is given. The hidden layers of the model are pre-trained layer by layer, and finally the whole model is trained. Sample data and air to air simulation scene experiments are carried out respectively. The experiments results show that the accuracy of the model using the symmetric pre-training method is …


Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang Apr 2022

Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang

Journal of System Simulation

Abstract: In the research field of radar remote sensing, both the completeness and diversity of radar data samples cannot meet the requirement of effective training of deep learning models, and the models are prone to over-fitting, which significantly limits the wide application of deep learning techniques in this field. Targeting on the needs of intelligent application in radar remote sensing, a microwave imaging radar suited data augmentation method is proposed to solve the issue of insufficient radar data samples by leveraging the general framework of generative adversarial network. Aiming at the features of radar samples being not obvious, the label …


Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen Jan 2022

Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen

Journal of System Simulation

Abstract: Reinforcement Learning (RL) achieves lower time response and better model generalization in Job Shop Scheduling Problem (JSSP). To explain the current overall research status of JSSP based on RL, summarize the current scheduling framework based on RL, and lay the foundation for follow-up research, the backgrounds of JSSP and RL are introduced. Two simulation techniques commonly used in JSSP are analyzed and two commonly used frameworks for RL to solve JSSP are given. In addition, some existing challenges are pointed out, and related research progress is introduced from three aspects: direct scheduling, feature representation-based scheduling, and parameter search-based scheduling.


Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng Jan 2022

Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng

Journal of System Simulation

Abstract: In order to construct a maize kernel variety recognition model with high recognition accuracy and suitable for mobile phone application, a mobile phone is used to obtain maize kernel double-sided (embryonic and non-embryonic) images. Based on the lightweight convolutional neural network MobileNetV2 and transfer learning, a maize kernel image variety recognition model is constructed. In view of the existing research methods are mainly for single-sided recognition of maize kernel variety, the performance of single-sided and double-sided characteristics modeling and recognition is compared. The results show that the double-sided recognition accuracy of maize kernel double-sided characteristics modeling is 99.83%, which …


Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue Jan 2022

Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue

Journal of System Simulation

Abstract: Predicting crystal properties using traditional machine learning methods requires complex feature engineering. In order to bypass time-consuming feature engineering, element network (ElemNet), representation learning from stoichiometry (Roost), compositionally-restricted attention-based network (CrabNet) and crystal graph convolution neural network (CGCNN) based on deep learning technology are used to simulate the formation energy, total energy per atom, band gap, and Fermi energy of crystal. The residual learning is introduced into CGCNN, and a crystal graph convolution residual neural network (CGCRN) is proposed. In the CGCRN, the number of hidden layers and the number of nodes in the hidden layers are increased, …


Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu Jan 2022

Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu

Engineering Technology Faculty Publications

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler Dec 2021

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang Dec 2021

Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang

Electrical & Computer Engineering Theses & Dissertations

Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …


Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin Oct 2021

Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin

Journal of System Simulation

Abstract: Aiming at the problem of low data generation efficiency due to the high complexity of solving the N-S equation of smoke flow field, a deep learning model which can generate high-resolution smoke flow data based on low-resolution smoke flow data solved by N-S equation is explored and designed. Based on the Generative Adversarial Network, the smoke data reconstruction network based on the sub voxel convolution layer is constructed. Considering the fluidity of smoke, time loss based on advection step is introduced into the loss function to realize high-precision smoke simulation. By extending the image super-resolution quality evaluation index, the …


Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley Jul 2021

Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley

Graduate Theses and Dissertations

Identifying freight patterns in transit is a common need among commercial and municipal entities. For example, the allocation of resources among Departments of Transportation is often predicated on an understanding of freight patterns along major highways. There exist multiple sensor systems to detect and count vehicles at areas of interest. Many of these sensors are limited in their ability to detect more specific features of vehicles in traffic or are unable to perform well in adverse weather conditions. Despite this limitation, to date there is little comparative analysis among Laser Imaging and Detection and Ranging (LIDAR) sensors for freight detection …


Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang Jun 2021

Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang

Journal of System Simulation

Abstract: To create the synthetic satellite cloud data in the domain of Meteorology, a method based on Generative Adversarial Networks (GAN) is proposed. Depending on ability of the nonlinear mapping and the information extraction of raster data with the deep learning network, a deep generative adversarial network model is proposed to extract the corresponding information between the numerical weather prediction(NWP) products and the satellite cloud data, and then the appropriate elements of the NWP product are chosen as the input to synthesize the corresponding satellite cloud data. The experiments are conducted on the re-analysis products of the European Centre …


Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang Jun 2021

Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang

Journal of System Simulation

Abstract: As network attacks increasingly hidden, intelligent and complex. Simple machine learning cannot deal with attacks timely. A deep learning method based on the combination of SDAE and LSTM is proposed. Firstly, the distribution rules of network data are extracted intelligently layer by layer by SDAE, and the diverse anomaly features of high-dimensional data ate extracted by using coefficient penalty and reconstruction error of each coding layer. Then, LSTM’ s memory function and the powerful learning ability of sequence data are used to classify learning depth. Finally, the experiments are carried out with the UNSW-NB15 data set, which is analyzed …