Review of data analysis in vision inspection of power lines with an
in-depth discussion of deep learning technology
- URL: http://arxiv.org/abs/2003.09802v1
- Date: Sun, 22 Mar 2020 04:09:59 GMT
- Title: Review of data analysis in vision inspection of power lines with an
in-depth discussion of deep learning technology
- Authors: Xinyu Liu, Xiren Miao, Hao Jiang, Jing Chen
- Abstract summary: The widespread popularity of unmanned aerial vehicles enables an immense amount of power lines inspection data to be collected.
How to employ massive inspection data especially the visible images to maintain the reliability, safety, and sustainability of power transmission is a pressing issue.
This paper conducts a thorough review of the current literature and identifies the challenges for future research.
- Score: 16.224505272448802
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The widespread popularity of unmanned aerial vehicles enables an immense
amount of power lines inspection data to be collected. How to employ massive
inspection data especially the visible images to maintain the reliability,
safety, and sustainability of power transmission is a pressing issue. To date,
substantial works have been conducted on the analysis of power lines inspection
data. With the aim of providing a comprehensive overview for researchers who
are interested in developing a deep-learning-based analysis system for power
lines inspection data, this paper conducts a thorough review of the current
literature and identifies the challenges for future research. Following the
typical procedure of inspection data analysis, we categorize current works in
this area into component detection and fault diagnosis. For each aspect, the
techniques and methodologies adopted in the literature are summarized. Some
valuable information is also included such as data description and method
performance. Further, an in-depth discussion of existing deep-learning-related
analysis methods in power lines inspection is proposed. Finally, we conclude
the paper with several research trends for the future of this area, such as
data quality problems, small object detection, embedded application, and
evaluation baseline.
Related papers
- Underwater Object Detection in the Era of Artificial Intelligence: Current, Challenge, and Future [119.88454942558485]
Underwater object detection (UOD) aims to identify and localise objects in underwater images or videos.
In recent years, artificial intelligence (AI) based methods, especially deep learning methods, have shown promising performance in UOD.
arXiv Detail & Related papers (2024-10-08T00:25:33Z) - Unveiling the Spectrum of Data Contamination in Language Models: A Survey from Detection to Remediation [28.997127566200753]
The issue of training corpus overlaps with evaluation benchmarks--referred to as contamination--has been the focus of significant recent research.
This body of work aims to identify contamination, understand its impacts, and explore mitigation strategies.
This survey serves as a succinct overview of the most recent advancements in data contamination research.
arXiv Detail & Related papers (2024-06-20T18:07:26Z) - A Literature Review of Literature Reviews in Pattern Analysis and Machine Intelligence [58.6354685593418]
This paper proposes several article-level, field-normalized, and large language model-empowered bibliometric indicators to evaluate reviews.
The newly emerging AI-generated literature reviews are also appraised.
This work offers insights into the current challenges of literature reviews and envisions future directions for their development.
arXiv Detail & Related papers (2024-02-20T11:28:50Z) - A Comprehensive Review on Computer Vision Analysis of Aerial Data [3.1537607776738605]
This paper reviews the computer vision tasks within the domain of aerial data analysis.
The paper provides the comparison of various hyper parameters employed across diverse architectures and tasks.
The paper thoroughly examines the challenges inherent in aerial data analysis, offering practical solutions.
arXiv Detail & Related papers (2024-02-15T08:10:09Z) - Functional Anomaly Detection: a Benchmark Study [4.444788548423704]
Anomaly detection can now rely on measurements sampled at a very high frequency.
It is the purpose of this paper to investigate the performance of recent techniques for anomaly detection in the functional setup on real datasets.
arXiv Detail & Related papers (2022-01-13T18:20:32Z) - A Comparative Review of Recent Few-Shot Object Detection Algorithms [0.0]
Few-shot object detection, learning to adapt to the novel classes with a few labeled data, is an imperative and long-lasting problem.
Recent studies have explored how to use implicit cues in extra datasets without target-domain supervision to help few-shot detectors refine robust task notions.
arXiv Detail & Related papers (2021-10-30T07:57:11Z) - Automatic Gaze Analysis: A Survey of DeepLearning based Approaches [61.32686939754183]
Eye gaze analysis is an important research problem in the field of computer vision and Human-Computer Interaction.
There are several open questions including what are the important cues to interpret gaze direction in an unconstrained environment.
We review the progress across a range of gaze analysis tasks and applications to shed light on these fundamental questions.
arXiv Detail & Related papers (2021-08-12T00:30:39Z) - Deep Learning Schema-based Event Extraction: Literature Review and
Current Trends [60.29289298349322]
Event extraction technology based on deep learning has become a research hotspot.
This paper fills the gap by reviewing the state-of-the-art approaches, focusing on deep learning-based models.
arXiv Detail & Related papers (2021-07-05T16:32:45Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.