4.8 Article

A Real-Time Defect Detection Method for Digital Signal Processing of Inspection Applications

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 5, Pages 3450-3459

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3013277

Keywords

Defect detection; dilated convolution; industrial big data (IBD); industrial inspection application; real time

Funding

  1. Key R&D Program in Key Areas of Guangdong Province [2019B010137001, 2020B010166001]
  2. Industrial Internet Innovation and Development Project in 2018 [MIZ1824020]
  3. Guangzhou City Industrial Technology Major Research Project [201802010035]
  4. National Natural Science Foundation of Chongqing [cstc2019jcyj-msxmX0208]
  5. open research fund of National Mobile Communications Research Laboratory, Southeast University [2020D05]

Ask authors/readers for more resources

This article introduces a novel defect detection method based on deep learning for digital signal processing of industrial inspection applications. By utilizing a feature collection and compression network and a Gaussian weighted pooling method, the proposed method improves both accuracy and efficiency in real-time systems, achieving mAP/AP(50) of 41.8/80.2 at 33 fps on NEU-DET.
The signal processing of industrial big data (IBD) is a challenging task, owing to the complex working scenarios and the lack of annotations. Defect detection, which is an important subject of IBD research works, has shown its effectiveness in digital signal processing of industrial inspection applications in many previous studies. This article proposes a novel defect detection method based on deep learning for digital signal processing of industrial inspection applications. In our method, a module named feature collection and compression network is applied to merge multiscale feature information. Then, a new pooling method named Gaussian weighted pooling, which provides more precise location information, is used to replace region of interest (ROI) pooling. Experiment results show that our method gets improvements in both accuracy and efficiency, with mAP/AP(50) of 41.8/80.2 at 33 fps on NEU-DET, which satisfies the requirement of real-time systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles

Xiaojie Wang, Laisen Nie, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, Neeraj Kumar

Summary: This article studies the problem of end-to-end network traffic prediction in the backbone networks of Internet of Vehicles (IoV), and proposes a deep learning-based method which considers the spatio-temporal feature and long-range dependence of network traffic. Furthermore, a threshold-based update mechanism is introduced to improve the real-time performance of the method.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Blockchain-Enabled Electrical Fault Inspection and Secure Transmission in 5G Smart Grids

Zhaolong Ning, Handi Chen, Xiaojie Wang, Shupeng Wang, Lei Guo

Summary: The maturity of 5G communication technology promotes industrial revolution and high-quality development of the economy. However, remote grid inspection and maintenance face challenges due to scarce resources and complex environments. To solve this, a blockchain-enabled secure transmission scheme and improved market matching algorithm are proposed, with deep reinforcement learning and A* algorithm used for secure transmission.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2022)

Article Engineering, Electrical & Electronic

Dynamic spectrum access based on deep reinforcement learning for multiple access in cognitive radio

Zeng-qi Li, Xin Liu, Zhao-long Ning

Summary: In this paper, a DSA scheme based on deep reinforcement learning combined with multiple access methods is proposed to maximize system throughput. The scheme intelligently learns the best access strategy in a dynamic environment and avoids interference with other users.

PHYSICAL COMMUNICATION (2022)

Article Engineering, Multidisciplinary

Intelligent Fingerprint-Based Localization Scheme Using CSI Images for Internet of Things

Xiaoqiang Zhu, Wenyu Qu, Xiaobo Zhou, Laiping Zhao, Zhaolong Ning, Tie Qiu

Summary: In this paper, a novel intelligence localization scheme called ILCL is proposed, which utilizes incremental learning and deep neural networks to improve the positioning accuracy and reduce the time-consuming retraining. Experimental results in two real indoor environments confirm the superiority of ILCL.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Automation & Control Systems

Distributed Orchestration of Service Function Chains for Edge Intelligence in the Industrial Internet of Things

Handi Chen, Shupeng Wang, Guojun Li, Laisen Nie, Xiaojie Wang, Zhaolong Ning

Summary: This article establishes a dynamic network virtualization technique enabled service function chain orchestration framework in IIoT and proposes a dynamic orchestration scheme, which is validated to be superior through experimental results.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Artificial Intelligence

An Adaptive Social Spammer Detection Model With Semi-Supervised Broad Learning

Tie Qiu, Xize Liu, Xiaobo Zhou, Wenyu Qu, Zhaolong Ning, C. L. Philip Chen

Summary: In this paper, an adaptive social spammer detection (ASSD) model is proposed to effectively identify spammers in mobile social networks. The model achieves high accuracy and efficiency, and updates adaptively through incremental learning.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2022)

Article Computer Science, Information Systems

Minimizing the Age-of-Critical-Information: An Imitation Learning-Based Scheduling Approach Under Partial Observations

Xiaojie Wang, Zhaolong Ning, Song Guo, Miaowen Wen, H. Vincent Poor

Summary: This paper focuses on the minimization of Age-of-Critical-Information (AoCI) in mobile edge networks. A system model is established to quantify the freshness of information by changes in its critical levels. An information-aware heuristic algorithm and an imitation learning-based scheduling approach are proposed to address the problem, and the superiority of the designed algorithm is demonstrated from both theoretical and experimental perspectives.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

Blockchain-Enabled Intelligent Transportation Systems: A Distributed Crowdsensing Framework

Zhaolong Ning, Shouming Sun, Xiaojie Wang, Lei Guo, Song Guo, Xiping Hu, Bin Hu, Ricky Y. K. Kwok

Summary: Intelligent Transportation System (ITS) is essential for addressing traffic issues and providing services for personal travel. However, existing research has not comprehensively considered the safety, utility, and latency of user data. Therefore, we propose a blockchain-enabled crowdsensing framework for distributed traffic management. By using two algorithms, we achieve secure and efficient transmissions, and experimental results demonstrate the effectiveness of these algorithms in improving the performance of the transportation system.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

Intelligent Intrusion Detection for Internet of Things Security: A Deep Convolutional Generative Adversarial Network-Enabled Approach

Yixuan Wu, Laisen Nie, Shupeng Wang, Zhaolong Ning, Shengtao Li

Summary: With the rapid growth of IoT, cloud-centric computing struggles to meet the low latency and ease of use requirements. Edge computing, as an open and distributed system, integrates computing, networking, storage, and applications, providing intelligent services at the IoT edge. However, the edge network faces various cyber attacks due to its limited resources, making large-scale data collection and detection for IoT security challenging. This paper proposes an intelligent intrusion detection algorithm based on big data mining and a combination of fuzzy rough set, GAN, and CNN, achieving higher accuracy than existing methods.

IEEE INTERNET OF THINGS JOURNAL (2023)

Editorial Material Computer Science, Information Systems

Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains

Uttam Ghosh, Deepak Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, Zhaolong Ning

FUTURE INTERNET (2022)

Article Computer Science, Information Systems

A Delay-Sensitive Multibase-Station Multichannel Access System for Smart Factory

Yuhuai Peng, Zhaolong Ning, Aiping Tan, Shupeng Wang, Mohammad S. Obaidat

Summary: This paper proposes a delay-sensitive multibase-station multichannel access scheme to address the real-time transmission problem in IIoT systems. Experimental results show that compared to CSMA/CA, this scheme can significantly reduce packet loss and average latency.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

Dynamic UAV Deployment for Differentiated Services: A Multi-Agent Imitation Learning Based Approach

Xiaojie Wang, Zhaolong Ning, Song Guo, Miaowen Wen, Lei Guo, H. Vincent Poor

Summary: This study proposes a multi-agent imitation learning enabled UAV deployment approach to enable different UAV owners to provide services with differentiated service capabilities in a shared area. The goal is to maximize both profits of UAV owners and utilities of on-ground users.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Dynamic Computation Offloading and Server Deployment for UAV-Enabled Multi-Access Edge Computing

Zhaolong Ning, Yuxuan Yang, Xiaojie Wang, Lei Guo, Xinbo Gao, Song Guo, Guoyin Wang

Summary: In this paper, a MEC network enabled by UAVs is investigated, considering multi-user computation offloading and edge server deployment to minimize system-wide computation cost under a dynamic environment. The problem is decomposed into two stochastic games and it is proven that each game has at least one Nash Equilibrium. Two learning algorithms are proposed to reach the Nash Equilibriums. These algorithms are further incorporated into an asynchronous updating algorithm to solve the system-wide computation cost minimization problem. Performance evaluations based on real-world data are conducted, showing the proposed algorithms can achieve efficient computation offloading and server deployment under dynamic environments.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Proceedings Paper Computer Science, Information Systems

Network Traffic Prediction for Intelligent Transportation Systems: A Reinforcement Learning Approach

Jian Song, Hua Liu, Laisen Nie, Zhaolong Ning, Mohammad S. Obaidat, Balqies Sadoun

Summary: This paper proposes a novel algorithm that combines Deep Q-Learning and Generative Adversarial Networks for network traffic prediction, and the performance of this algorithm is proven to be better than other methods through experiments.

2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) (2022)

Article Engineering, Civil

Federated Learning Enabled Credit Priority Task Processing for Transportation Big Data

Guangjun Wu, Jun Li, Zhaolong Ning, Yong Wang, Binbin Li

Summary: This paper investigates the task scheduling and running of transportation big data (TBD) based on credit priority. A three-layered architecture is designed, and a federated learning mechanism is proposed to protect the privacy of vehicles and improve the efficiency of task scheduling. A task offloading algorithm is also proposed to optimize the task offloading problem.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

No Data Available