共查询到19条相似文献,搜索用时 234 毫秒
1.
FENG Jian~ 《自动化学报》2005,(3)
A leak detection plays a key role in the overall integrity monitoring for a oil pipeline system.A fuzzy decision-making approach to pipeline leak localization is proposed in this paper. The two main methods,pressure gradient localization and negative pressure wave localization,are combined with fuzzy logical decision-making method to form a novel fault diagnosis scheme.The combination scheme can improve the precision of localization.An application example,14km long oil pipeline leak detection and localization,is illustrated.This method is compared with others through practical experiments and its validity is confirmed by the results. 相似文献
2.
基于Minkowskey距离的模糊入侵检测方法研究 总被引:2,自引:0,他引:2
After analyzing the deficiency of traditional intrusion detection system, a new kind of intrusion detection method based on Minkowskey is put forward for reducing false positive rate. The essence of it is to set up a normal behavior fuzzy sub collection A on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection B with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method. 相似文献
3.
A fuzzy logic based supervisory hierarchical control scheme for real time pressure control 总被引:5,自引:4,他引:1
This paper describes a supervisory hierarchical fuzzy controller (SHFC) for regulating pressure in a real-time pilot pressure control system. The input scaling factor tuning of a direct expert controller is made using the error and process input parameters in a closed loop system in order to obtain better controller performance for set-point change and load disturbances. This on-line tuning method reduces operator involvement and enhances the controller performance to a wide operating range. The hierarchical control scheme consists of an intelligent upper level supervisory fuzzy controller and a lower level direct fuzzy controller. The upper level controller provides a mechanism to the main goal of the system and the lower level controller delivers the solutions to a particular situation. The control algorithm for the proposed scheme has been developed and tested using an ARM7 microcontroller-based embedded target board for a nonlinear pressure process having dead time. To demonstrate the effectiveness, the results of the proposed hierarchical controller, fuzzy controller and conventional proportional-integral (PI) controller are analyzed. The results prove that the SHFC performance is better in terms of stability and robustness than the conventional control methods. 相似文献
4.
Fault Detection under Fuzzy Model Uncertainty 总被引:2,自引:0,他引:2
The paper tackles the problem of robust fault detection using Takagi-Sugeno fuzzy models. A model-based strategy is employed to generate residuals in order to make a decision about the state of the process. Unfortunately, such a method is corrupted by model uncertainty due to the fact that in real applications there exists a model-reality mismatch. In order to ensure reliable fault detection the adaptive threshold technique is used to deal with the mentioned problem. The paper focuses also on fuzzy model design procedure. The bounded-error approach is applied to generating the rules for the model using available measurements. The proposed approach is applied to fault detection in the DC laboratory engine. 相似文献
5.
Event detection in wireless sensor networks (WSNs) has attracted much attention due to its importance in many applications. The erroneous abnormal data generated during event detection are prone to lead to false detection results. Therefore, in order to improve the reliability of event detection, we propose a dirty-event cleaning method based on spatio-temporal correlations among sensor data. Unlike traditional fault-tolerant approaches, our method takes into account the inherent uncertainty of sensor measurements and focuses on the type of directional events. A probabilitybased mapping scheme is introduced, which maps uncertain sensor data into binary data. Moreover, we give formulated definitions of transient dirty-event (TDE) and permanent dirty-event (PDE), which are cleaned by a novel fuzzy method and a collaborative cleaning scheme, respectively. Extensive experimental results show the effectiveness of our dirty-event cleaning method. 相似文献
6.
A self-recovery fragile watermarking scheme for image authentication with superior localization 总被引:4,自引:0,他引:4
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication. 相似文献
7.
A semantic unit based event detection scheme in soccer videos is proposed in this paper. The scheme can be characterized as a three-layer framework. At the lowest layer, low-level features including color, texture, edge, shape, and motion are extracted. High-level semantic events are defined at the highest layer. In order to connect low-level features and high-level semantics, we design and define some semantic units at the intermediate layer. A semantic unit is composed of a sequence of consecutives frames with the same cue that is deduced from low-level features. Based on semantic units, a Bayesian network is used to reason the probabilities of events. The experiments for shoot and card event detection in soccer videos show that the proposed method has an encouraging performance. 相似文献
8.
YANG Yu-wang TAO Jun GU Li YANG Jing-yu 《通讯和计算机》2008,5(5):43-47
Localization of license plate is an important factor in license plate recognition system. Currently although there are some methods for the localization, some limits such as low accuracy exist. So a better method should be found to solve this problem. Level Set, which has been proved efficient currently, gives new prospect to license plate localization. In this paper, based on the original thought of Level Set method, the Mumford-Shah model with Level Set method is obtained, further the finite difference and a third order TVD (Total Variation Diminishing) Runge-Kutta time discretization scheme is analyzed, and applied in license plate image localization. Computation results show that better edge detection results from level set method are obtained compared to other edge detection methods such as Roberts, Sobel and Canny. Level Set method drops much edge of non-target area which has a lot of value to target edge detection and target position tracking. 相似文献
9.
YE Chang-guo SANG Sheng-ju FENG Ling 《通讯和计算机》2009,6(9):67-70
Data mining technology is applied to the network intrusion detection, and precision of the detection will be improved by the superiority of data mining. This paper, first analyzes the method of wireless network intrusion detection, presents a wireless network intrusion detection algorithm based on association rule mining. The application of fuzzy association rules in the wireless network intrusion detection is mainly discussed; a comparative analysis with the classical algorithm Apriori is made by experiment. The result shows that the fuzzy rule mining algorithm is more convenient than Apriori algorithm. 相似文献
10.
Ning Han Sung Hwan Sohn Jae Moung Kim 《通讯和计算机》2009,6(5):46-51
Cognitive radio is considered as a promising technique to increase the utilization of limited spectral resource. The key issue in cognitive radio is to design a reliable spectrum sensing method that is able to detect the signal in the target channel as well as to recognize different signals. In this paper, focusing on classifying different OFDM signals, we propose a two-step detection and identification approach. The key parameters to separate different OFDM signals are the subcarrier spacing and guard interval. A simple but reliable peak detection method is adopted in the first step, while a peak searching method is used to determine the length of guard interval. Simulations are carried out in AWGN to verify the validation of the proposed method. It is shown that our method can satisfy the detection and identification requirement with a low false alarm probability. 相似文献
11.
基于负压波法的输油管道泄漏检测定位系统 总被引:6,自引:0,他引:6
为实现对石油管道的泄漏进行检测并定位,简要分析了国内外输油管道泄漏检测定位方法及其应用现状,重点研究了负压波泄漏检测与定位算法在实际中的应用.尤其对负压波定位公式中需要的首、末站压力拐点的时间差,即各站压力下降的拐点寻找进行了比较深入的研究与分析.在此基础上设计了一套基于ADAM5510的泄漏检测系统,给出了系统的总体组成结构、各部分功能及软件设计思想.现场试验表明设计的泄漏检测与定位方法具有实用价值. 相似文献
12.
基于虚拟仪器的输油管道泄漏监测定位系统的实现 总被引:5,自引:0,他引:5
为了解决目前的输油管道泄漏监测和定位问题,提出了一个基于虚拟仪器的输油管道泄漏监测定位系统的实现方法。其采用了因特网来传输数据,提出了基于负压波和流量平衡法的四段法判断泄漏,分析了负压力波传到首末两站的时间差对泄漏定位的影响以及使用小波变换检测时间差的方法。系统在实际应用中取得了良好的效果。 相似文献
13.
14.
15.
基于信息融合的管道泄漏检测与定位技术应用研究 总被引:1,自引:0,他引:1
基于目前已经在石油输送管道中应用的SCADA系统将信息融合技术应用于管道泄漏检测与定位系统中;该方法应用管道泄漏时的多种特征信号,采用最优加权融合算法将多元信息综合处理,扩展了时间和空间上的检测范围,提高了泄漏检测系统的灵敏度和可靠性;在实验室用水泵和不锈钢管道组成的水循环系统进行了模拟实验,通过对比验证了信息融合检漏方法比单一检漏方法具有明显的优越性。 相似文献
16.
输油管网状态量多及工艺复杂,难以建立精确的管网数学模型,为了能够实时监控管网的安全运行情况,本文提出一种基于大维数据驱动的管网泄漏监控模糊决策方法.首先利用管网现有的数据信息,在不对数据进行降维处理的情况下,从信息物理系统的角度出发,将油气管网的拓扑结构、阀门开度等管道物理数据以及压力、流量等运行信息数据结合起来对复杂管网系统建立数据驱动模型.然后基于大维随机矩阵谱理论,将得到的信息物理数据协方差矩阵谱分布及圆环率作为模糊决策的条件对管网运行情况进行判断.当管网拓扑发生动态变化时,提出的方法可以有效地解决误报率高的问题.最后通过仿真及实例的分析,可以证明所提出方法的有效性. 相似文献
17.
基于目前已经在石油输送管道中应用的SCADA系统,将信息融合技术应用于管道泄漏检测系统中;该方法应用管道泄漏时的多种特征信号,采用最优加权融合算法将多元信息综合处理,扩展了时间和空间上的检测范围,提高了泄漏检测系统的灵敏度和可靠性。在实验室用水泵和不锈钢管道组成的水循环系统进行了模拟实验,通过对比验证了信息融合检漏方法比单一检漏方法具有明显的优越性。 相似文献
18.