基于随机配置网络的光纤入侵信号识别算法 下载: 1113次
盛智勇, 曾志强, 曲洪权, 李伟. 基于随机配置网络的光纤入侵信号识别算法[J]. 激光与光电子学进展, 2019, 56(14): 140602.
Zhiyong Sheng, Zhiqiang Zeng, Hongquan Qu, Wei Li. Fiber Intrusion Signal Recognition Algorithm Based on Stochastic Configuration Network[J]. Laser & Optoelectronics Progress, 2019, 56(14): 140602.
[1] Qu Z G, Zhou Y, Zeng Z M, et al. Detection of the abnormal events along the oil and gas pipeline and multi-scale chaotic character analysis of the detected signals[J]. Measurement Science and Technology, 2008, 19(2): 025301.
[2] 孙茜. Ф-OTDR光纤预警系统模式识别方法研究[D]. 天津: 天津大学, 2015.
SunQ. Research on recognition method for Ф-OTDR optical fiber pre-warning pattern[D]. Tianjin: Tianjin University, 2015.
[3] 杨洋, 沙洲, 封皓, 等. 输水管道预警与泄漏定位中Φ-OTDR技术信号处理法[J]. 激光与光电子学进展, 2018, 55(4): 040607.
[4] 吴永红, 朱莎, 许蔚, 等. 分布式光纤裂缝传感工程应用研究进展[J]. 激光与光电子学进展, 2018, 55(9): 090002.
[7] 杨丹. 光纤振动信号特征提取与识别算法研究[D]. 北京: 北方工业大学, 2018.
YangD. Characteristics extraction and recognition research in optical fiber pre-warning signal[D]. Beijing: North China University of Technology, 2018.
[8] 王照勇, 潘政清, 叶青, 等. 用于光纤围栏入侵告警的频谱分析快速模式识别[J]. 中国激光, 2015, 42(4): 0405010.
[9] 王永洪, 刘俊伟, 张明义, 等. 基于光纤布拉格光栅的双壁模型管桩轴力测试[J]. 激光与光电子学进展, 2018, 55(11): 110605.
[10] 郭小乐. 关于神经网络插值与逼近问题的研究[D]. 银川: 宁夏大学, 2017.
Guo XL. Study on interpolation and approximation problem of neural networks[D]. Yinchuan: Ningxia University, 2017.
[11] Rumelhart D E, Hinton G E, Williams R J. Learning representations by back-propagating errors[J]. Nature, 1986, 323(6088): 533-536.
[12] Mahoney M W. Randomized algorithms for matrices and data[J]. Foundations and Trends® in Machine Learning, 2011, 3(2): 647-672.
[13] Wang D H, Li M. Stochastic configuration networks: fundamentals and algorithms[J]. IEEE Transactions on Cybernetics, 2017, 47(10): 3466-3479.
[14] Wang D H, Cui C H. Stochastic configuration networks ensemble with heterogeneous features for large-scale data analytics[J]. Information Sciences, 2017, 417: 55-71.
[15] Wang DH, Li M. Robust stochastic configuration networks with kernel density estimation for uncertain data regression[J]. Information Sciences, 2017, 412/413: 210- 222.
[16] 李豪. 病态问题的奇异值双参数修正解法及其应用[D]. 郑州: 战略支援部队信息工程大学, 2018.
LiH. Singular values correction methods with double parameters for ill conditioned problems and their applications[D]. Zhengzhou: PLA Strategic Support Force Information Engineering University, 2018.
[17] 刘婷, 戴亚康, 杨莹雪, 等. 基于奇异值分解和最小L2范数解的动态脑磁源重建[J]. 中国体视学与图像分析, 2015, 20(3): 235-241.
Liu T, Dai Y K, Yang Y X, et al. Dynamic magnetoencephalography source reconstruction based on singular value decomposition and minimum L2-norm estimation[J]. Chinese Journal of Stereology and Image Analysis, 2015, 20(3): 235-241.
[18] Sutskever I, Hinton G, Krizhevsky A, et al. Dropout: a simple way to prevent neural networks from overfitting[J]. Journal of Machine Learning Research, 2014, 15(1): 1929-1958.
盛智勇, 曾志强, 曲洪权, 李伟. 基于随机配置网络的光纤入侵信号识别算法[J]. 激光与光电子学进展, 2019, 56(14): 140602. Zhiyong Sheng, Zhiqiang Zeng, Hongquan Qu, Wei Li. Fiber Intrusion Signal Recognition Algorithm Based on Stochastic Configuration Network[J]. Laser & Optoelectronics Progress, 2019, 56(14): 140602.