A Few-Shot Defect Detection Method for Transmission Lines Based on Meta-Attention and Feature Reconstruction

نویسندگان

چکیده

In tasks of transmission line defect detection, traditional object detection algorithms are ineffective, with few training samples defective components. Meta-learning uses multi-task learning as well fine-tuning to learn common features in different tasks, which has the ability adapt new quickly, shows good performance few-shot and generalization tasks. For this reason, we proposed a method (Meta PowerNet) Meta-attention RPN Feature Reconstruction Module for lines based on meta-learning. First, stage region proposal, proposal network (Meta-Attention Region Proposal Network, MA-RPN) is designed fuse support set query filter noise anchor boxes. addition, it focus subtle texture smaller-sized objects by fusing low-level from set. Second, meta-feature construction stage, meta-learner feature reconstruction module core capture defect-related channels. The experimental results show that under condition, there only 30 various types component defects. achieves 72.5% accuracy defects, significant improvement compared other mainstream detection. Meanwhile, MA-RPN paper can be used meta-learning models universally.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Fault Detection and Classification Approach in Transmission Lines Based on Statistical Patterns

Symmetrical nature of mean of electrical signals during normal operating conditions is used in the fault detection task for dependable, robust, and simple fault detector implementation is presented in this work. Every fourth cycle of the instantaneous current signal, the mean is computed and carried into the next cycle to discover nonlinearities in the signal. A fault detection task is complete...

متن کامل

Few-shot Object Detection

In this paper, we study object detection using a large pool of unlabeled images and only a few labeled images per category, named “few-shot object detection”. The key challenge consists in generating trustworthy training samples as many as possible from the pool. Using few training examples as seeds, our method iterates between model training and high-confidence sample selection. In training, e...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Transmission expansion planning based on merchandizing surplus of transmission lines

This paper proposes an optimal transmission expansion planning (TEP) which is based on determining share of each line in merchandizing surplus (MS) of system, determining by Independent System Operator (ISO). The more share of a line in MS of system denotes the priority of a line for expansion. The procedure of determining MS of each line in a power system is based on determining the MS share o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13105896