Detection of Transmission Line Corridors Risk Intrusion based on BCNN

被引:0
|
作者
Yao, Nan [1 ]
Liu, Ziquan [1 ]
Wang, Zhen [1 ]
Lu, Yongling [1 ]
Xue, Hai [1 ]
机构
[1] State Grid Jiangsu Elect Power Co Ltd, Res Inst, Nanjing 210000, Jiangsu, Peoples R China
关键词
Risk Intrusion; B-CNN; Transmission Lines;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk intrusion of transmission lines is one of the main environmental challenges causing power interruption. Many techniques have been used to detect vegetation erosion. These methods are very effective in detecting vegetation invasion. However, they are expensive as cover areas are concerned. Alternatively, simple surveillance device can overlay vast areas at a relatively low cost. In this paper, we describe the statistical moments of the color space and the texture features of images to identify the most effective features that can improve the accuracy of vegetation density classification of the B-CNN algorithm. The method aims to distinguish between high density and low density vegetation areas along the power line corridor right of way (ROW). The results show that the statistical moments of the color space have a positive effect on the classification accuracy, while certain features of the grayscale symbiotic matrix have a negative effect on the classification accuracy. Therefore, a combination of the most effective features is used to achieve a recall of 98.272%.
引用
收藏
页码:738 / 744
页数:7
相关论文
共 50 条
  • [41] Wildfire detection for transmission line based on improved lightweight YOLO
    He, Hui
    Zhang, Zheng
    Jia, Qiang
    Huang, Lei
    Cheng, Yongqiang
    Chen, Bo
    ENERGY REPORTS, 2023, 9 : 512 - 520
  • [42] Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process
    Wang, Yafei
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 881 - 896
  • [43] Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process
    Yafei Wang
    Wireless Personal Communications, 2022, 127 : 881 - 896
  • [44] Eye gaze pattern analysis for fatigue detection based on GP-BCNN with ESM
    Wang, Yan
    Huang, Rui
    Guo, Lei
    PATTERN RECOGNITION LETTERS, 2019, 123 : 61 - 74
  • [45] A Risk Assessment of Transmission Line Overload Based on MLSI/PSO
    Izhak, R.
    Ali, A.
    Nazir, Muhammad S.
    Malik, Muhammad Z.
    ICCDE 2019: PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING AND DATA ENGINEERING, 2019, : 24 - 28
  • [46] Intrusion detection based on IDBM
    Liu, Yajun
    Zhang, Xuan
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 173 - 177
  • [47] Entropy based intrusion detection
    Yoshida, K
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 840 - 843
  • [48] A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection
    Yan, Jiaqi
    Jin, Dong
    Leet, Cheol Won
    Liu, Ping
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 299 - 304
  • [49] Employing On-Line Training in SDN Intrusion Detection
    Chuang, Po-Jen
    Wu, Kuan-Lin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2021, 37 (02) : 483 - 496
  • [50] An Intrusion Detection Method for Line Current Differential Relays
    Ameli, Amir
    Hooshyar, Ali
    El-Saadany, Ehab F.
    Youssef, Amr M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 329 - 344