Search results
1 – 10 of over 2000Defeng Lv, Huawei Wang and Changchang Che
The purpose of this study is to analyze the intelligent semisupervised fault diagnosis method of aeroengine.
Abstract
Purpose
The purpose of this study is to analyze the intelligent semisupervised fault diagnosis method of aeroengine.
Design/methodology/approach
A semisupervised fault diagnosis method based on denoising autoencoder (DAE) and deep belief network (DBN) is proposed for aeroengine. Multiple state parameters of aeroengine with long time series are processed to form high-dimensional fault samples and corresponding fault types are taken as sample labels. DAE is applied for unsupervised learning of fault samples, so as to achieve denoised dimension-reduction features. Subsequently, the extracted features and sample labels are put into DBN for supervised learning. Thus, the semisupervised fault diagnosis of aeroengine can be achieved by the combination of unsupervised learning and supervised learning.
Findings
The JT9D aeroengine data set and simulated aeroengine data set are applied to test the effectiveness of the proposed method. The result shows that the semisupervised fault diagnosis method of aeroengine based on DAE and DBN has great robustness and can maintain high accuracy of fault diagnosis under noise interference. Compared with other traditional models and separate deep learning model, the proposed method also has lower error and higher accuracy of fault diagnosis.
Originality/value
Multiple state parameters with long time series are processed to form high-dimensional fault samples. As a typical unsupervised learning, DAE is used to denoise the fault samples and extract dimension-reduction features for future deep learning. Based on supervised learning, DBN is applied to process the extracted features and fault diagnosis of aeroengine with multiple state parameters can be achieved through the pretraining and reverse fine-tuning of restricted Boltzmann machines.
Details
Keywords
Yongqing Ma, Yifeng Zheng, Wenjie Zhang, Baoya Wei, Ziqiong Lin, Weiqiang Liu and Zhehan Li
With the development of intelligent technology, deep learning has made significant progress and has been widely used in various fields. Deep learning is data-driven, and its…
Abstract
Purpose
With the development of intelligent technology, deep learning has made significant progress and has been widely used in various fields. Deep learning is data-driven, and its training process requires a large amount of data to improve model performance. However, labeled data is expensive and not readily available.
Design/methodology/approach
To address the above problem, researchers have integrated semi-supervised and deep learning, using a limited number of labeled data and many unlabeled data to train models. In this paper, Generative Adversarial Networks (GANs) are analyzed as an entry point. Firstly, we discuss the current research on GANs in image super-resolution applications, including supervised, unsupervised, and semi-supervised learning approaches. Secondly, based on semi-supervised learning, different optimization methods are introduced as an example of image classification. Eventually, experimental comparisons and analyses of existing semi-supervised optimization methods based on GANs will be performed.
Findings
Following the analysis of the selected studies, we summarize the problems that existed during the research process and propose future research directions.
Originality/value
This paper reviews and analyzes research on generative adversarial networks for image super-resolution and classification from various learning approaches. The comparative analysis of experimental results on current semi-supervised GAN optimizations is performed to provide a reference for further research.
Details
Keywords
Nasser Assery, Yuan (Dorothy) Xiaohong, Qu Xiuli, Roy Kaushik and Sultan Almalki
This study aims to propose an unsupervised learning model to evaluate the credibility of disaster-related Twitter data and present a performance comparison with commonly used…
Abstract
Purpose
This study aims to propose an unsupervised learning model to evaluate the credibility of disaster-related Twitter data and present a performance comparison with commonly used supervised machine learning models.
Design/methodology/approach
First historical tweets on two recent hurricane events are collected via Twitter API. Then a credibility scoring system is implemented in which the tweet features are analyzed to give a credibility score and credibility label to the tweet. After that, supervised machine learning classification is implemented using various classification algorithms and their performances are compared.
Findings
The proposed unsupervised learning model could enhance the emergency response by providing a fast way to determine the credibility of disaster-related tweets. Additionally, the comparison of the supervised classification models reveals that the Random Forest classifier performs significantly better than the SVM and Logistic Regression classifiers in classifying the credibility of disaster-related tweets.
Originality/value
In this paper, an unsupervised 10-point scoring model is proposed to evaluate the tweets’ credibility based on the user-based and content-based features. This technique could be used to evaluate the credibility of disaster-related tweets on future hurricanes and would have the potential to enhance emergency response during critical events. The comparative study of different supervised learning methods has revealed effective supervised learning methods for evaluating the credibility of Tweeter data.
Details
Keywords
Prudence Kadebu, Robert T.R. Shoniwa, Kudakwashe Zvarevashe, Addlight Mukwazvure, Innocent Mapanga, Nyasha Fadzai Thusabantu and Tatenda Trust Gotora
Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent…
Abstract
Purpose
Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes indicators of compromise (IOC) difficult to detect. After the analysis is completed, the output can be employed to detect and then counteract the attack. The goal of this work is to propose a machine learning approach to improve malware detection by combining the strengths of both supervised and unsupervised machine learning techniques. This study is essential as malware has certainly become ubiquitous as cyber-criminals use it to attack systems in cyberspace. Malware analysis is required to reveal hidden IOC, to comprehend the attacker’s goal and the severity of the damage and to find vulnerabilities within the system.
Design/methodology/approach
This research proposes a hybrid approach for dynamic and static malware analysis that combines unsupervised and supervised machine learning algorithms and goes on to show how Malware exploiting steganography can be exposed.
Findings
The tactics used by malware developers to circumvent detection are becoming more advanced with steganography becoming a popular technique applied in obfuscation to evade mechanisms for detection. Malware analysis continues to call for continuous improvement of existing techniques. State-of-the-art approaches applying machine learning have become increasingly popular with highly promising results.
Originality/value
Cyber security researchers globally are grappling with devising innovative strategies to identify and defend against the threat of extremely sophisticated malware attacks on key infrastructure containing sensitive data. The process of detecting the presence of malware requires expertise in malware analysis. Applying intelligent methods to this process can aid practitioners in identifying malware’s behaviour and features. This is especially expedient where the malware is stealthy, hiding IOC.
Details
Keywords
Francisco Villarroel Ordenes and Shunyuan Zhang
The purpose of this paper is to describe and position the state-of-the-art of text and image mining methods in business research. By providing a detailed conceptual and technical…
Abstract
Purpose
The purpose of this paper is to describe and position the state-of-the-art of text and image mining methods in business research. By providing a detailed conceptual and technical review of both methods, it aims to increase their utilization in service research.
Design/methodology/approach
On a first stage, the authors review business literature in marketing, operations and management concerning the use of text and image mining methods. On a second stage, the authors identify and analyze empirical papers that used text and image mining methods in services journals and premier business. Finally, avenues for further research in services are provided.
Findings
The manuscript identifies seven text mining methods and describes their approaches, processes, techniques and algorithms, involved in their implementation. Four of these methods are positioned similarly for image mining. There are 39 papers using text mining in service research, with a focus on measuring consumer sentiment, experiences, and service quality. Due to the nonexistent use of image mining service journals, the authors review their application in marketing and management, and suggest ideas for further research in services.
Research limitations/implications
This manuscript focuses on the different methods and their implementation in service research, but it does not offer a complete review of business literature using text and image mining methods.
Practical implications
The results have a number of implications for the discipline that are presented and discussed. The authors provide research directions using text and image mining methods in service priority areas such as artificial intelligence, frontline employees, transformative consumer research and customer experience.
Originality/value
The manuscript provides an introduction to text and image mining methods to service researchers and practitioners interested in the analysis of unstructured data. This paper provides several suggestions concerning the use of new sources of data (e.g. customer reviews, social media images, employee reviews and emails), measurement of new constructs (beyond sentiment and valence) and the use of more recent methods (e.g. deep learning).
Details
Keywords
Hongwei Zhang, Shihao Wang, Hongmin Mi, Shuai Lu, Le Yao and Zhiqiang Ge
The defect detection problem of color-patterned fabric is still a huge challenge due to the lack of manual defect labeling samples. Recently, many fabric defect detection…
Abstract
Purpose
The defect detection problem of color-patterned fabric is still a huge challenge due to the lack of manual defect labeling samples. Recently, many fabric defect detection algorithms based on feature engineering and deep learning have been proposed, but these methods have overdetection or miss-detection problems because they cannot adapt to the complex patterns of color-patterned fabrics. The purpose of this paper is to propose a defect detection framework based on unsupervised adversarial learning for image reconstruction to solve the above problems.
Design/methodology/approach
The proposed framework consists of three parts: a generator, a discriminator and an image postprocessing module. The generator is able to extract the features of the image and then reconstruct the image. The discriminator can supervise the generator to repair defects in the samples to improve the quality of image reconstruction. The multidifference image postprocessing module is used to obtain the final detection results of color-patterned fabric defects.
Findings
The proposed framework is compared with state-of-the-art methods on the public dataset YDFID-1(Yarn-Dyed Fabric Image Dataset-version1). The proposed framework is also validated on several classes in the MvTec AD dataset. The experimental results of various patterns/classes on YDFID-1 and MvTecAD demonstrate the effectiveness and superiority of this method in fabric defect detection.
Originality/value
It provides an automatic defect detection solution that is convenient for engineering applications for the inspection process of the color-patterned fabric manufacturing industry. A public dataset is provided for academia.
Details
Keywords
Rajshree Varma, Yugandhara Verma, Priya Vijayvargiya and Prathamesh P. Churi
The rapid advancement of technology in online communication and fingertip access to the Internet has resulted in the expedited dissemination of fake news to engage a global…
Abstract
Purpose
The rapid advancement of technology in online communication and fingertip access to the Internet has resulted in the expedited dissemination of fake news to engage a global audience at a low cost by news channels, freelance reporters and websites. Amid the coronavirus disease 2019 (COVID-19) pandemic, individuals are inflicted with these false and potentially harmful claims and stories, which may harm the vaccination process. Psychological studies reveal that the human ability to detect deception is only slightly better than chance; therefore, there is a growing need for serious consideration for developing automated strategies to combat fake news that traverses these platforms at an alarming rate. This paper systematically reviews the existing fake news detection technologies by exploring various machine learning and deep learning techniques pre- and post-pandemic, which has never been done before to the best of the authors’ knowledge.
Design/methodology/approach
The detailed literature review on fake news detection is divided into three major parts. The authors searched papers no later than 2017 on fake news detection approaches on deep learning and machine learning. The papers were initially searched through the Google scholar platform, and they have been scrutinized for quality. The authors kept “Scopus” and “Web of Science” as quality indexing parameters. All research gaps and available databases, data pre-processing, feature extraction techniques and evaluation methods for current fake news detection technologies have been explored, illustrating them using tables, charts and trees.
Findings
The paper is dissected into two approaches, namely machine learning and deep learning, to present a better understanding and a clear objective. Next, the authors present a viewpoint on which approach is better and future research trends, issues and challenges for researchers, given the relevance and urgency of a detailed and thorough analysis of existing models. This paper also delves into fake new detection during COVID-19, and it can be inferred that research and modeling are shifting toward the use of ensemble approaches.
Originality/value
The study also identifies several novel automated web-based approaches used by researchers to assess the validity of pandemic news that have proven to be successful, although currently reported accuracy has not yet reached consistent levels in the real world.
Details
Keywords
Machine learning is an algorithmic-based auto-learning mechanism that improves from its experiences. It makes use of a statistical learning method that trains and develops on its…
Abstract
Machine learning is an algorithmic-based auto-learning mechanism that improves from its experiences. It makes use of a statistical learning method that trains and develops on its own without the assistance of a person. Data, characteristics deduced from the data, and the model make up the three primary parts of a machine learning solution. Machine learning generates an algorithm from subsets of data that can utilise combinations of features and weights different from those obtained from basic principles. In this paper, an analysis of customer behaviour is predicted using different machine learning algorithms. The results of the algorithms are validated using python programming.
Details
Keywords
Robot learning ‐ be it unsupervised, supervised or self‐supervised ‐ is one method of dealing with noisy, inconsistent, or contradictory data that has proven useful in mobile…
Abstract
Robot learning ‐ be it unsupervised, supervised or self‐supervised ‐ is one method of dealing with noisy, inconsistent, or contradictory data that has proven useful in mobile robotics. In all but the simplest cases of robot learning, raw sensor data cannot be used directly as input to the learning process. Instead, some “meaningful” preprocessing has to be applied to the raw data, before the learning controller can use the sensory perceptions as input. In this paper, two instances of supervised and unsupervised robot learning experiments, using vision input are presented. The vision sensor signal preprocessing necessary to achieve successful learning is also discussed.
Details
Keywords
Wei-Chao Lin, Shih-Wen Ke and Chih-Fong Tsai
Data mining is widely considered necessary in many business applications for effective decision-making. The importance of business data mining is reflected by the existence of…
Abstract
Purpose
Data mining is widely considered necessary in many business applications for effective decision-making. The importance of business data mining is reflected by the existence of numerous surveys in the literature focusing on the investigation of related works using data mining techniques for solving specific business problems. The purpose of this paper is to answer the following question: What are the widely used data mining techniques in business applications?
Design/methodology/approach
The aim of this paper is to examine related surveys in the literature and thus to identify the frequently applied data mining techniques. To ensure the recent relevance and quality of the conclusions, the criterion for selecting related studies are that the works be published in reputed journals within the past 10 years.
Findings
There are 33 different data mining techniques employed in eight different application areas. Most of them are supervised learning techniques and the application area where such techniques are most often seen is bankruptcy prediction, followed by the areas of customer relationship management, fraud detection, intrusion detection and recommender systems. Furthermore, the widely used ten data mining techniques for business applications are the decision tree (including C4.5 decision tree and classification and regression tree), genetic algorithm, k-nearest neighbor, multilayer perceptron neural network, naïve Bayes and support vector machine as the supervised learning techniques and association rule, expectation maximization and k-means as the unsupervised learning techniques.
Originality/value
The originality of this paper is to survey the recent 10 years of related survey and review articles about data mining in business applications to identify the most popular techniques.
Details