Research on the Performance of Text Mining and Processing in Power Grid Networks
DOI:
https://doi.org/10.4108/eetsis.v10i4.3094Keywords:
Text mining, performance analysis, deep learningAbstract
This paper employs deep learning technique to perform the research of text mining for power grid networks, focusing on fundamental elements such as loss and activation functions. Through some analysis and formulas, we explain how these functions contribute to deep learning. We also introduce major deep learning training models, including CNN and RNN, and provide visual aids to aid understanding. To demonstrate the impact of various factors on deep learning training, we employ control variable experiments to analyze the influence of factors such as learning rate, batch size, and data noise on model training trends. While the influence of hyperparameters and data noise are covered in this paper, other factors such as CPU and memory frequency, as well as GPU performance, also play a crucial role in deep learning training. Therefore, continuous adjustments to various factors are necessary to achieve optimal training results for deep learning models in power grid networks.
References
W. Hong, J. Yin, M. You, H. Wang, J. Cao, J. Li, and M. Liu, “Graph intelligence enhanced bi-channel insider threat detection,” in Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings. Springer, 2022, pp. 86–102.
S. Guo and X. Zhao, “Multi-agent deep reinforcement learning based transmission latency minimization for delay-sensitive cognitive satellite-uav networks,” IEEE Trans. Commun., vol. 71, no. 1, pp. 131–144, 2023.
J. Lu, S. Zhan, and X. Liu, “Intelligent wireless monitoring technology for 10kv overhead lines in smart grid networks,” EAI Endorsed Transactions on Scalable Information Systems, vol. 10, no. 2, 2022.
H. Hui and W. Chen, “Joint scheduling of proactive pushing and on-demand transmission over shared spectrum for profit maximization,” IEEE Trans. Wirel. Commun., vol. 22, no. 1, pp. 107–121, 2023.
J. Yin, M. Tang, J. Cao, M. You, H. Wang, and M. Alazab, “Knowledge-driven cybersecurity intelligence: software vulnerability co-exploitation behaviour discovery,” IEEE Transactions on Industrial Informatics, 2022.
Y. Zhou, Z. Lin, Y. La, J. Huang, and X. Wang, “Analysis and design of power system transformer standard based on knowledge graph,” EAI Endorsed Transactions on Scalable Information Systems, vol. 10, no. 2, 2022.
J. Yin, M. Tang, J. Cao, H. Wang, M. You, and Y. Lin, “Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning,” World Wide Web, pp. 1–23, 2022.
C. Chaieb, F. Abdelkefi, and W. Ajib, “Deep reinforce-ment learning for resource allocation in multi-band and hybrid OMA-NOMA wireless networks,” IEEE Trans. Commun., vol. 71, no. 1, pp. 187–198, 2023.
Y. Zhou, Z. Lin, L. Tu, J. Huang, and Z. Zhang, “Analysis and design of standard knowledge service system based on deep learning,” EAI Endorsed Transactions on Scalable Information Systems, vol. 10, no. 2, 2022.
F. Xiao, S. Zhang, S. Tang, S. Shen, H. Dong, and Y. Zhong, “Wision: Bolstering MAV 3d indoor state estimation by embracing multipath of wifi,” IEEE Trans. Veh. Technol., vol. 72, no. 1, pp. 253–266, 2023.
J. Han, J. Zhang, C. He, C. Lv, X. Hou, and Y. Ji, “Distributed finite-time safety consensus control of vehicle platoon with senor and actuator failures,” IEEE Trans. Veh. Technol., vol. 72, no. 1, pp. 162–175, 2023.
S. Mosharafian and J. M. Velni, “Cooperative adaptive cruise control in a mixed-autonomy traffic system: A hybrid stochastic predictive approach incorporating lane change,” IEEE Trans. Veh. Technol., vol. 72, no. 1, pp. 136–148, 2023.
A. Gupta, M. Sellathurai, and T. Ratnarajah, “End-to-end learning-based full-duplex amplify-and-forward relay networks,” IEEE Trans. Commun., vol. 71, no. 1, pp. 199–213, 2023.
Z. Lin, Z. Ni, L. Kuang, C. Jiang, and Z. Huang, “Multi-satellite beam hopping based on load balancing and interference avoidance for NGSO satellite communica-tion systems,” IEEE Trans. Commun., vol. 71, no. 1, pp. 282–295, 2023.
D. Orlando, S. Bartoletti, I. Palamà, G. Bianchi, and N. Blefari-Melazzi, “Innovative attack detection solutions for wireless networks with application to location security,” IEEE Trans. Wirel. Commun., vol. 22, no. 1, pp. 205–219, 2023.
M. E. Gonzalez, J. F. Silva, M. Videla, and M. E. Orchard, “Data-driven representations for testing independence: Modeling, analysis and connection with mutual informa-tion estimation,” IEEE Trans. Signal Process., vol. 70, pp. 158–173, 2022.
A. T. M. Fisch, I. A. Eckley, and P. Fearnhead, “Innovative and additive outlier robust kalman filtering with a robust particle filter,” IEEE Trans. Signal Process., vol. 70, pp. 47–56, 2022.
Y. Cai, J. Llorca, A. M. Tulino, and A. F. Molisch, “Decentralized control of distributed cloud networks with generalized network flows,” IEEE Trans. Commun., vol. 71, no. 1, pp. 256–268, 2023.
X. Fang, W. Feng, Y. Wang, Y. Chen, N. Ge, Z. Ding, and H. Zhu, “Noma-based hybrid satellite-uav-terrestrial networks for 6g maritime coverage,” IEEE Trans. Wirel. Commun., vol. 22, no. 1, pp. 138–152, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Yuzhong Zhou, Zhengping Lin, Liang Tu, Jiahao Shi, Yuliang Yang
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.