首页 > 最新文献

Log. J. IGPL最新文献

英文 中文
Towards real-time DNA biometrics using GPU-accelerated processing 利用gpu加速处理实现实时DNA生物识别
Pub Date : 2020-09-09 DOI: 10.1093/jigpal/jzaa034
Mario Reja, Ciprian-Petrisor Pungila, V. Negru
Decoding the human genome in the past decades has brought into focus a computationally intensive operation through DNA profiling. The typical search space for these kinds of problems is extremely large and requires specialized hardware and algorithms to perform the necessary sequence analysis. In this paper, we propose an innovative and scalable approach to exact multi-pattern matching of nucleotide sequences by harnessing the massively parallel computing power found in commodity graphical processing units. Our approach places careful consideration on preprocessing of DNA datasets and runtime performance, while exploiting the full capabilities of the heterogeneous platform it runs on. Finally, we evaluate our models against real-world DNA sequences.
在过去的几十年里,解码人类基因组已经成为通过DNA分析进行计算密集型操作的焦点。这类问题的典型搜索空间非常大,需要专门的硬件和算法来执行必要的序列分析。在本文中,我们提出了一种创新和可扩展的方法,通过利用商品图形处理单元中的大规模并行计算能力来精确地匹配核苷酸序列的多模式。我们的方法仔细考虑了DNA数据集的预处理和运行时性能,同时利用了它运行的异构平台的全部功能。最后,我们根据真实的DNA序列评估我们的模型。
{"title":"Towards real-time DNA biometrics using GPU-accelerated processing","authors":"Mario Reja, Ciprian-Petrisor Pungila, V. Negru","doi":"10.1093/jigpal/jzaa034","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa034","url":null,"abstract":"\u0000 Decoding the human genome in the past decades has brought into focus a computationally intensive operation through DNA profiling. The typical search space for these kinds of problems is extremely large and requires specialized hardware and algorithms to perform the necessary sequence analysis. In this paper, we propose an innovative and scalable approach to exact multi-pattern matching of nucleotide sequences by harnessing the massively parallel computing power found in commodity graphical processing units. Our approach places careful consideration on preprocessing of DNA datasets and runtime performance, while exploiting the full capabilities of the heterogeneous platform it runs on. Finally, we evaluate our models against real-world DNA sequences.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Biometric recognition system performance measures for lossy compression on EEG signals 生物特征识别系统对脑电信号的有损压缩性能指标
Pub Date : 2020-09-09 DOI: 10.1093/jigpal/jzaa033
Binh Nguyen, Wanli Ma, D. Tran
Electroencephalogram (EEG) plays an essential role in analysing and recognizing brain-related diseases. EEG has been increasingly used as a new type of biometrics in person identification and verification systems. These EEG-based systems are important components in applications for both police and civilian works, and both areas process a huge amount of EEG data. Storing and transmitting these huge amounts of data are significant challenges for data compression techniques. Lossy compression is used for EEG data as it provides a higher compression ratio (CR) than lossless compression techniques. However, lossy compression can negatively influence the performance of EEG-based person identification and verification systems via the loss of information in the reconstructed data. To address this, we propose introducing performance measures as additional features in evaluating lossy compression techniques for EEG data. Our research explores if a common value of CR exists for different systems using datasets with lossy compression that could provide almost the same system performance with those using datasets without lossy compression. We performed experiments on EEG-based person identification and verification systems using two large EEG datasets, CHB MIT Scalp and Alcoholism, to investigate the relationship between standard lossy compression measures and our proposed system performance measures with the two lossy compression techniques, discrete wavelet transform—adaptive arithmetic coding and discrete wavelet transform—set partitioning in hierarchical trees. Our experimental results showed a common value of CR exists for different systems, specifically, 70 for person identification systems and 50 for person verification systems.
脑电图(EEG)在分析和识别脑相关疾病中起着至关重要的作用。脑电图作为一种新型的生物识别技术,在人的身份识别和验证系统中得到了越来越多的应用。这些基于脑电图的系统是警察和民用工程应用的重要组成部分,这两个领域都需要处理大量的脑电图数据。存储和传输这些海量数据是数据压缩技术面临的重大挑战。由于有损压缩比无损压缩具有更高的压缩比,因此对脑电图数据采用有损压缩。然而,有损压缩会通过重构数据中的信息丢失而对基于脑电图的人员识别和验证系统的性能产生负面影响。为了解决这个问题,我们建议引入性能度量作为评估脑电数据有损压缩技术的附加特征。我们的研究探讨了使用有损压缩数据集的不同系统是否存在一个共同的CR值,该值可以提供与使用无有损压缩数据集的系统几乎相同的系统性能。我们在基于脑电图的人识别和验证系统上进行了实验,使用两个大型脑电图数据集,CHB MIT头皮和酒精中毒,研究标准有损压缩措施与我们提出的两种有损压缩技术之间的关系,离散小波变换-自适应算法编码和分层树中的离散小波变换集划分。我们的实验结果表明,不同系统中存在一个共同的CR值,具体来说,人员识别系统为70,人员验证系统为50。
{"title":"Biometric recognition system performance measures for lossy compression on EEG signals","authors":"Binh Nguyen, Wanli Ma, D. Tran","doi":"10.1093/jigpal/jzaa033","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa033","url":null,"abstract":"Electroencephalogram (EEG) plays an essential role in analysing and recognizing brain-related diseases. EEG has been increasingly used as a new type of biometrics in person identification and verification systems. These EEG-based systems are important components in applications for both police and civilian works, and both areas process a huge amount of EEG data. Storing and transmitting these huge amounts of data are significant challenges for data compression techniques. Lossy compression is used for EEG data as it provides a higher compression ratio (CR) than lossless compression techniques. However, lossy compression can negatively influence the performance of EEG-based person identification and verification systems via the loss of information in the reconstructed data. To address this, we propose introducing performance measures as additional features in evaluating lossy compression techniques for EEG data. Our research explores if a common value of CR exists for different systems using datasets with lossy compression that could provide almost the same system performance with those using datasets without lossy compression. We performed experiments on EEG-based person identification and verification systems using two large EEG datasets, CHB MIT Scalp and Alcoholism, to investigate the relationship between standard lossy compression measures and our proposed system performance measures with the two lossy compression techniques, discrete wavelet transform—adaptive arithmetic coding and discrete wavelet transform—set partitioning in hierarchical trees. Our experimental results showed a common value of CR exists for different systems, specifically, 70 for person identification systems and 50 for person verification systems.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127318589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-based architecture for the control of logistics activities: Pharmaceutical utilities case study 基于区块链的物流活动控制架构:医药公用事业案例研究
Pub Date : 2020-09-08 DOI: 10.1093/jigpal/jzaa039
Yeray Mezquita, Roberto Casado-Vara, Alfonso González-Briones, Javier Prieto, J. Corchado
Logistics services involve a wide range of transport operations between distributors and clients. Currently, the large number of intermediaries are a challenge for this sector, as it makes all the processes more complicated. To face that problem, we propose a system that uses smart contracts to remove intermediaries and speed up logistics activities. Our new model combines smart contracts and a multi-agent system in a single platform to improve the current logistics system by increasing organization, security and getting rid of several human intermediaries to automate its processes, making distribution times significantly faster. Also, with this kind of approach, it is possible to apply penalties to parties that do not comply with the terms of using this platform.
物流服务涉及分销商和客户之间广泛的运输操作。目前,大量的中介机构对这个行业来说是一个挑战,因为它使所有的流程变得更加复杂。为了解决这个问题,我们提出了一个使用智能合约来消除中介并加快物流活动的系统。我们的新模式将智能合约和多代理系统结合在一个平台上,通过增加组织、安全性和摆脱几个人工中介来自动化其流程,从而改善当前的物流系统,使配送时间大大缩短。此外,通过这种方法,可以对不遵守使用该平台条款的各方实施处罚。
{"title":"Blockchain-based architecture for the control of logistics activities: Pharmaceutical utilities case study","authors":"Yeray Mezquita, Roberto Casado-Vara, Alfonso González-Briones, Javier Prieto, J. Corchado","doi":"10.1093/jigpal/jzaa039","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa039","url":null,"abstract":"Logistics services involve a wide range of transport operations between distributors and clients. Currently, the large number of intermediaries are a challenge for this sector, as it makes all the processes more complicated. To face that problem, we propose a system that uses smart contracts to remove intermediaries and speed up logistics activities. Our new model combines smart contracts and a multi-agent system in a single platform to improve the current logistics system by increasing organization, security and getting rid of several human intermediaries to automate its processes, making distribution times significantly faster. Also, with this kind of approach, it is possible to apply penalties to parties that do not comply with the terms of using this platform.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure traveling salesman problem with intelligent transport systems features 安全旅行推销员问题与智能交通系统的特点
Pub Date : 2020-09-08 DOI: 10.1093/jigpal/jzaa035
G. Crişan, C. Pintea, A. Calinescu, Corina Pop Sitar, P. Pop
Meeting the security requests in transportation is nowadays a must. The intelligent transport systems (ITSs) represent the support for addressing such a challenge, due to their ability to make real-time adaptive decisions. We propose a new variant of the travelling salesman problem (TSP) integrating security constraints inspired from ITSs. This optimization problem is called the secure TSP and considers a set of security constraints on its integer variables. Similarities with fuzzy logic are presented alongside the mathematical model of the introduced TSP variant.
满足交通运输中的安全要求是必须的。智能交通系统(ITSs)能够做出实时的自适应决策,为解决这一挑战提供了支持。本文提出了一种新的旅行商问题(TSP),该问题集成了从ITSs中得到的安全约束。这种优化问题被称为安全TSP,它在整数变量上考虑一组安全约束。在引入的TSP变量的数学模型的基础上,提出了与模糊逻辑的相似性。
{"title":"Secure traveling salesman problem with intelligent transport systems features","authors":"G. Crişan, C. Pintea, A. Calinescu, Corina Pop Sitar, P. Pop","doi":"10.1093/jigpal/jzaa035","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa035","url":null,"abstract":"\u0000 Meeting the security requests in transportation is nowadays a must. The intelligent transport systems (ITSs) represent the support for addressing such a challenge, due to their ability to make real-time adaptive decisions. We propose a new variant of the travelling salesman problem (TSP) integrating security constraints inspired from ITSs. This optimization problem is called the secure TSP and considers a set of security constraints on its integer variables. Similarities with fuzzy logic are presented alongside the mathematical model of the introduced TSP variant.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116351956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tarski's Undefinability Theorem and the Diagonal Lemma 塔斯基的不可定义定理和对角引理
Pub Date : 2020-09-01 DOI: 10.1093/jigpal/jzab016
Saeed Salehi
We prove the equivalence of the semantic version of Tarski’s theorem on the undefinability of truth with the semantic version of the diagonal lemma and also show the equivalence of a syntactic version of Tarski’s undefinability theorem with a weak syntactic diagonal lemma. We outline two seemingly diagonal-free proofs for these theorems from the literature and show that the syntactic version of Tarski’s theorem can deliver Gödel–Rosser’s incompleteness theorem.
我们证明了关于真值不可定义性的Tarski定理的语义版与对角引理的语义版的等价性,并证明了Tarski定理的句法版与弱句法对角引理的等价性。我们从文献中概述了这些定理的两个看似无对角线的证明,并表明Tarski定理的句法版本可以提供Gödel-Rosser的不完备定理。
{"title":"Tarski's Undefinability Theorem and the Diagonal Lemma","authors":"Saeed Salehi","doi":"10.1093/jigpal/jzab016","DOIUrl":"https://doi.org/10.1093/jigpal/jzab016","url":null,"abstract":"\u0000 We prove the equivalence of the semantic version of Tarski’s theorem on the undefinability of truth with the semantic version of the diagonal lemma and also show the equivalence of a syntactic version of Tarski’s undefinability theorem with a weak syntactic diagonal lemma. We outline two seemingly diagonal-free proofs for these theorems from the literature and show that the syntactic version of Tarski’s theorem can deliver Gödel–Rosser’s incompleteness theorem.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions 进化强化学习自适应检测数据库入侵
Pub Date : 2020-08-07 DOI: 10.1093/jigpal/jzaa030
{"title":"Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions","authors":"","doi":"10.1093/jigpal/jzaa030","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa030","url":null,"abstract":"","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An axiomatic approach to CG′3 logic CG ' 3逻辑的公理化方法
Pub Date : 2020-07-27 DOI: 10.1093/jigpal/jzaa014
Miguel Pérez-Gaspar, Alejandro Hernández-Tello, J. R. A. Ramírez, Mauricio Osorio
In memoriam José Arrazola Ramírez (1962–2018) The logic $textbf{G}^{prime}_3$ was introduced by Osorio et al. in 2008; it is a three-valued logic, closely related to the paraconsistent logic $textbf{CG}^{prime}_3$ introduced by Osorio et al. in 2014. The logic $textbf{CG}^{prime}_3$ is defined in terms of a multi-valued semantics and has the property that each theorem in $textbf{G}^{prime}_3$ is a theorem in $textbf{CG}^{prime}_3$. Kripke-type semantics has been given to $textbf{CG}^{prime}_3$ in two different ways by Borja et al. in 2016. In this work, we continue the study of $textbf{CG}^{prime}_3$, obtaining a Hilbert-type axiomatic system and proving a soundness and completeness theorem for this logic.
为了纪念jos Arrazola Ramírez(1962-2018)逻辑$textbf{G}^{prime}_3$是由Osorio等人在2008年引入的;它是一种三值逻辑,与2014年由Osorio等人提出的副一致逻辑$textbf{CG}^{prime}_3$密切相关。逻辑$textbf{CG}^{prime}_3$是根据多值语义定义的,并且具有如下属性:$textbf{G}^{prime}_3$中的每个定理都是$textbf{CG}^{prime}_3$中的一个定理。Borja等人在2016年以两种不同的方式给出了$textbf{CG}^{prime}_3$的kripke类型语义。在这项工作中,我们继续研究$textbf{CG}^{prime}_3$,得到了一个hilbert型公理系统,并证明了该逻辑的完备性定理。
{"title":"An axiomatic approach to CG′3 logic","authors":"Miguel Pérez-Gaspar, Alejandro Hernández-Tello, J. R. A. Ramírez, Mauricio Osorio","doi":"10.1093/jigpal/jzaa014","DOIUrl":"https://doi.org/10.1093/jigpal/jzaa014","url":null,"abstract":"\u0000 In memoriam José Arrazola Ramírez (1962–2018) The logic $textbf{G}^{prime}_3$ was introduced by Osorio et al. in 2008; it is a three-valued logic, closely related to the paraconsistent logic $textbf{CG}^{prime}_3$ introduced by Osorio et al. in 2014. The logic $textbf{CG}^{prime}_3$ is defined in terms of a multi-valued semantics and has the property that each theorem in $textbf{G}^{prime}_3$ is a theorem in $textbf{CG}^{prime}_3$. Kripke-type semantics has been given to $textbf{CG}^{prime}_3$ in two different ways by Borja et al. in 2016. In this work, we continue the study of $textbf{CG}^{prime}_3$, obtaining a Hilbert-type axiomatic system and proving a soundness and completeness theorem for this logic.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the application of compression-based metrics to identifying anomalous behaviour in web traffic 基于压缩的度量在网络流量异常行为识别中的应用
Pub Date : 2020-07-24 DOI: 10.1093/jigpal/jzz062
Gonzalo de la Torre-Abaitua, L. F. Lago-Fernández, David Arroyo
In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of diagnosing whether event detection and recording is adequately performed. As a result, there is an urge to construct general codification and classification procedures to be applied on any type of security event in any activity log. This work is focused on defining such a method using the so-called normalized compression distance (NCD). NCD is parameter-free and can be applied to determine the distance between events expressed using strings. As a first step in the concretion of a methodology for the integral interpretation of security events, this work is devoted to the characterization of web logs. On the grounds of the NCD, we propose an anomaly-based procedure for identifying web attacks from web logs. Given a web query as stored in a security log, a NCD-based feature vector is created and classified using a support vector machine. The method is tested using the CSIC-2010 data set, and the results are analyzed with respect to similar proposals.
在网络安全领域,需要采用自适应、准确和高效的程序来识别性能缺陷和安全漏洞。Internet服务和流量日益增加的复杂性决定了一种场景,在许多情况下,这种场景阻碍了入侵检测和防御系统的正确部署。尽管监视网络和应用程序活动是一种常见的做法,但是没有一种通用的方法来编纂和解释所记录的事件。此外,这种方法的缺乏在某种程度上削弱了诊断事件检测和记录是否得到充分执行的可能性。因此,迫切需要构建适用于任何活动日志中任何类型的安全事件的通用编码和分类程序。这项工作的重点是使用所谓的规范化压缩距离(NCD)来定义这种方法。NCD是无参数的,可用于确定使用字符串表示的事件之间的距离。作为安全事件整体解释方法具体化的第一步,这项工作致力于网络日志的表征。在NCD的基础上,我们提出了一种基于异常的程序来从web日志中识别web攻击。给定存储在安全日志中的web查询,使用支持向量机创建基于ncd的特征向量并对其进行分类。利用CSIC-2010数据集对该方法进行了测试,并与类似方案的结果进行了分析。
{"title":"On the application of compression-based metrics to identifying anomalous behaviour in web traffic","authors":"Gonzalo de la Torre-Abaitua, L. F. Lago-Fernández, David Arroyo","doi":"10.1093/jigpal/jzz062","DOIUrl":"https://doi.org/10.1093/jigpal/jzz062","url":null,"abstract":"In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of diagnosing whether event detection and recording is adequately performed. As a result, there is an urge to construct general codification and classification procedures to be applied on any type of security event in any activity log. This work is focused on defining such a method using the so-called normalized compression distance (NCD). NCD is parameter-free and can be applied to determine the distance between events expressed using strings. As a first step in the concretion of a methodology for the integral interpretation of security events, this work is devoted to the characterization of web logs. On the grounds of the NCD, we propose an anomaly-based procedure for identifying web attacks from web logs. Given a web query as stored in a security log, a NCD-based feature vector is created and classified using a support vector machine. The method is tested using the CSIC-2010 data set, and the results are analyzed with respect to similar proposals.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anomaly detection based on one-class intelligent techniques over a control level plant 基于一类智能技术的控制级工厂异常检测
Pub Date : 2020-07-24 DOI: 10.1093/jigpal/jzz057
Esteban Jove, J. Casteleiro-Roca, Héctor Quintián-Pardo, D. Simić, J. A. M. Pérez, J. Calvo-Rolle
A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance of each classifier is assessed and validated with real created faults, achieving successful overall results.
技术进步的很大一部分,特别是在工业领域,集中于生产过程的优化。然而,在工业、医药或股票市场等领域,异常的检测已经成为一个巨大的挑战。本文主要研究控制级工厂的异常检测。我们提出了不同智能技术的应用,这些技术允许使用从正确的工厂操作中获取的真实数据来获得单类分类器。每个分类器的性能都被评估和验证了真实的创建故障,获得了成功的总体结果。
{"title":"Anomaly detection based on one-class intelligent techniques over a control level plant","authors":"Esteban Jove, J. Casteleiro-Roca, Héctor Quintián-Pardo, D. Simić, J. A. M. Pérez, J. Calvo-Rolle","doi":"10.1093/jigpal/jzz057","DOIUrl":"https://doi.org/10.1093/jigpal/jzz057","url":null,"abstract":"A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance of each classifier is assessed and validated with real created faults, achieving successful overall results.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121087135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Wind Power with Energy Storage Arbitrage in Day-ahead Market by a Stochastic MILP Approach 基于随机MILP方法的日前市场风电储能套利研究
Pub Date : 2020-07-24 DOI: 10.1093/jigpal/jzz054
I. Gomes, R. Melício, V. Mendes, H. Pousinho
This paper is about a support information management system for a wind power (WP) producer having an energy storage system (ESS) and participating in a day-ahead electricity market. Energy storage can play not only a leading role in mitigation of the effect of uncertainty faced by a WP producer, but also allow for conversion of wind energy into electric energy to be stored and then released at favourable hours. This storage provides capability for arbitrage, allowing an increase on profit of a WP producer, but must be supported by a convenient problem formulation. The formulation proposed for the support information management system is based on an approach of stochasticity written as a mixed integer linear programming problem. WP and market prices are considered as stochastic processes represented by a set of scenarios. The charging/discharging of the ESS are considered dependent on scenarios of market prices and on scenarios of WP. The effectiveness of the proposed formulation is tested by comparison of case studies using data from the Iberian Electricity Market. The comparison is in favour of the proposed consideration of stochasticity.
本文研究的是具有储能系统的风力发电机组参与日前电力市场的支持信息管理系统。储能不仅可以在减轻WP生产商所面临的不确定性影响方面发挥主导作用,而且还可以将风能转换为电能,然后存储并在有利的时间释放。这种存储提供了套利的能力,允许WP生产者增加利润,但必须有一个方便的问题公式支持。提出的保障信息管理系统的公式是基于一个随机的方法写成一个混合整数线性规划问题。WP和市场价格被认为是由一组情景表示的随机过程。ESS的充电/放电被认为取决于市场价格和WP的情况。通过使用来自伊比利亚电力市场的数据的案例研究的比较,测试了所提议的公式的有效性。比较结果支持考虑随机性的建议。
{"title":"Wind Power with Energy Storage Arbitrage in Day-ahead Market by a Stochastic MILP Approach","authors":"I. Gomes, R. Melício, V. Mendes, H. Pousinho","doi":"10.1093/jigpal/jzz054","DOIUrl":"https://doi.org/10.1093/jigpal/jzz054","url":null,"abstract":"This paper is about a support information management system for a wind power (WP) producer having an energy storage system (ESS) and participating in a day-ahead electricity market. Energy storage can play not only a leading role in mitigation of the effect of uncertainty faced by a WP producer, but also allow for conversion of wind energy into electric energy to be stored and then released at favourable hours. This storage provides capability for arbitrage, allowing an increase on profit of a WP producer, but must be supported by a convenient problem formulation. The formulation proposed for the support information management system is based on an approach of stochasticity written as a mixed integer linear programming problem. WP and market prices are considered as stochastic processes represented by a set of scenarios. The charging/discharging of the ESS are considered dependent on scenarios of market prices and on scenarios of WP. The effectiveness of the proposed formulation is tested by comparison of case studies using data from the Iberian Electricity Market. The comparison is in favour of the proposed consideration of stochasticity.","PeriodicalId":304915,"journal":{"name":"Log. J. IGPL","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Log. J. IGPL
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1