The Optimization of Maintenance Policy by Using Generative Adversarial Networks for Data Augmentation under Limited Information
Abstract
References
Index Terms
- The Optimization of Maintenance Policy by Using Generative Adversarial Networks for Data Augmentation under Limited Information
Recommendations
Pyramidal convolution attention generative adversarial network with data augmentation for image denoising
AbstractGenerative adversarial networks (GANs) have shown remarkable effects for various computer vision tasks. Standard convolution plays an important role in the GAN-based model. However, the single type of kernel with a single spatial size limits the ...
Crack Segmentation with Generative Deep Learning-Based Data Augmentation Approach
RACS '23: Proceedings of the 2023 International Conference on Research in Adaptive and Convergent SystemsThis paper presents a novel data augmentation approach for pixel-level crack detection (segmentation) task. The proposed approach employs deep generative models in three subtasks. Firstly, a generative adversarial network (GAN) is utilized to generate ...
A comprehensive review of generative adversarial networks: Fundamentals, applications, and challenges
AbstractIn machine learning, a generative model is responsible for generating new samples of data in terms of a probabilistic model. Generative adversarial network (GAN) has been widely used to generate realistic samples in different domains and ...
Generative Adversarial Networks, applications, evaluation metrics, and challenges. image image
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 3Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in