首页 > 最新文献

2009 First Asian Conference on Intelligent Information and Database Systems最新文献

英文 中文
A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring System 分布式实时排放和空气污染物监测系统的数据管理系统
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.84
Junghee Kim, Youlin Jin, S. Lim, Karpjoo Jeong, J. Woo, Eun Yi Kim
Many people want to feel safe and secure by monitoring events and changes surrounding them that affect their quality of life. This concern prompted the development of the environment monitoring system. Among the many research groups, sensors and sensor network are their choice of tool for environment monitoring system. Data management is the most challenging issue when we are using sensor networks. To compose sensor network environment need various kind of sensors which does not have standard way to describe sensors and sensor data. In this paper, we will discuss the data management system for the Distributed Real-time Emissions Air pollutants Monitoring System (DREAM). In this system, we will discuss sensor data modeling and usage of those data.
许多人希望通过监控周围影响他们生活质量的事件和变化来获得安全感。这种关注促使了环境监测系统的发展。在众多的研究小组中,传感器和传感器网络是他们选择的环境监测系统的工具。当我们使用传感器网络时,数据管理是最具挑战性的问题。组成传感器网络环境需要各种各样的传感器,而这些传感器和传感器数据没有标准的描述方式。在本文中,我们将讨论分布式实时排放空气污染物监测系统(DREAM)的数据管理系统。在本系统中,我们将讨论传感器数据建模和这些数据的使用。
{"title":"A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring System","authors":"Junghee Kim, Youlin Jin, S. Lim, Karpjoo Jeong, J. Woo, Eun Yi Kim","doi":"10.1109/ACIIDS.2009.84","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.84","url":null,"abstract":"Many people want to feel safe and secure by monitoring events and changes surrounding them that affect their quality of life. This concern prompted the development of the environment monitoring system. Among the many research groups, sensors and sensor network are their choice of tool for environment monitoring system. Data management is the most challenging issue when we are using sensor networks. To compose sensor network environment need various kind of sensors which does not have standard way to describe sensors and sensor data. In this paper, we will discuss the data management system for the Distributed Real-time Emissions Air pollutants Monitoring System (DREAM). In this system, we will discuss sensor data modeling and usage of those data.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implicit Camera Calibration Using MultiLayer Perceptron Type Neural Network 基于多层感知器型神经网络的隐式摄像机标定
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.11
Dong-Min Woo, Dong-Chul Park
This paper suggest a new camera calibration approach based on the neural network model. The proposed approach is shown to be very accurate because the neural network model implicitly contains all the physical parameters, some of which are very difficult to be estimated in the conventional explicit calibration methods. As the first step of this approach, this paper presents the camera calibration process which enables the coordinate transformation between 2D image points and points of a certain space in 3D real world. However, this approach is currently extended to be a general 3D camera calibration method in terms of 2 plane method. Experimental comparison of our method with well-known Tsai's 2 stage method is made to verify the accuracy of the proposed method.
提出了一种基于神经网络模型的摄像机标定方法。由于神经网络模型隐式地包含了常规显式校准方法难以估计的所有物理参数,因此该方法具有很高的精度。作为该方法的第一步,本文给出了实现二维图像点与三维真实世界中一定空间点之间坐标转换的摄像机标定过程。然而,该方法目前被扩展为一种通用的2平面三维摄像机标定方法。将本文方法与蔡氏二阶段法进行了实验比较,验证了本文方法的准确性。
{"title":"Implicit Camera Calibration Using MultiLayer Perceptron Type Neural Network","authors":"Dong-Min Woo, Dong-Chul Park","doi":"10.1109/ACIIDS.2009.11","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.11","url":null,"abstract":"This paper suggest a new camera calibration approach based on the neural network model. The proposed approach is shown to be very accurate because the neural network model implicitly contains all the physical parameters, some of which are very difficult to be estimated in the conventional explicit calibration methods. As the first step of this approach, this paper presents the camera calibration process which enables the coordinate transformation between 2D image points and points of a certain space in 3D real world. However, this approach is currently extended to be a general 3D camera calibration method in terms of 2 plane method. Experimental comparison of our method with well-known Tsai's 2 stage method is made to verify the accuracy of the proposed method.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic Packet Balancing Agent in MANETs Based on AOMDV 基于AOMDV的manet动态包均衡代理
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.50
Chen Ni, Hyeon-Cheol Zin, Bokman Lee, D. Hwang, Chonggun Kim
A MANET comprises a set of mobile devices which are capable of communicating with others. Despite its flexibility and portability, it suffers from energy limitation. If the energy consumption of the nodes in the MANET cannot be balanced efficiently, some nodes will die in an early stage due to the energy depletion, which in turn partitions the whole network and leads to the communication failure. To balance the energy consumption, we propose the dynamic packet balancing agent for MANETs. The agent utilizes the HELLO packets to update energy information along a path, which enables the dynamic update of the energy information of each path, and sends packets via the path with the best energy condition. The agent is further applied to AOMDV, a well-known multipath protocol. Simulation result generated by NS2(Network Simulator version 2) shows that our proposal outperforms AOMDV in balancing energy consumption.
MANET包括一组能够与其他人通信的移动设备。尽管它具有灵活性和便携性,但它受到能量限制。如果不能有效地平衡MANET中节点的能量消耗,一些节点会因为能量耗尽而过早死亡,从而导致整个网络被分割,导致通信失败。为了平衡能量消耗,我们提出了动态分组平衡代理。agent利用HELLO报文沿着一条路径更新能量信息,实现了每条路径能量信息的动态更新,并在能量状态最佳的路径上发送报文。该代理进一步应用于著名的多路径协议AOMDV。NS2(Network Simulator version 2)的仿真结果表明,我们的方案在平衡能耗方面优于AOMDV。
{"title":"Dynamic Packet Balancing Agent in MANETs Based on AOMDV","authors":"Chen Ni, Hyeon-Cheol Zin, Bokman Lee, D. Hwang, Chonggun Kim","doi":"10.1109/ACIIDS.2009.50","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.50","url":null,"abstract":"A MANET comprises a set of mobile devices which are capable of communicating with others. Despite its flexibility and portability, it suffers from energy limitation. If the energy consumption of the nodes in the MANET cannot be balanced efficiently, some nodes will die in an early stage due to the energy depletion, which in turn partitions the whole network and leads to the communication failure. To balance the energy consumption, we propose the dynamic packet balancing agent for MANETs. The agent utilizes the HELLO packets to update energy information along a path, which enables the dynamic update of the energy information of each path, and sends packets via the path with the best energy condition. The agent is further applied to AOMDV, a well-known multipath protocol. Simulation result generated by NS2(Network Simulator version 2) shows that our proposal outperforms AOMDV in balancing energy consumption.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Approach to Identity Theft Detection Using Social Network Analysis 基于社会网络分析的身份盗窃检测方法
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.44
G. Kolaczek
The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenge in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject’s behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.
提出了一种身份盗窃相关事件的自动检测方法。该方法基于社会网络分析。在当代信息社会中,电子身份的保护是安全研究的最大挑战之一。本文所描述的身份盗窃检测方法的主要思想是身份盗窃事件与作为社会网络(或几个不同网络)节点的主体的行为变化有关。因此,通过分析观察到的行为模式的变化,可以像检测其他类型的恶意活动一样检测身份盗窃。
{"title":"An Approach to Identity Theft Detection Using Social Network Analysis","authors":"G. Kolaczek","doi":"10.1109/ACIIDS.2009.44","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.44","url":null,"abstract":"The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenge in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of the subject’s behavior as the node of the social network (or several different networks). In consequence identity theft may be detected similarly as the other types of malicious activities by analyzing the change of observed behavior patterns.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials 多信道无线网络的领导人选举——依赖与独立试验
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.29
Z. Golebiewski, Michal Koza, M. Klonowski, Mirosław Kutyłowski
We consider access scheduling to a shared radio channel in networks where a set of stations tries to get exclusive rights to transmit over a shared radio channel. A frequent strategy to solve this problem is that each station independently tosses an asymmetric coin and transmits in case of tails. The trials are executed some number of times and the first station that sends alone in a trial gets the right to broadcast over the shared channel. We consider here a multi-channel case: during onetime slot a station may transmit on k different channels.In this case trials can be arranged in two slightly different ways. The first method is that in each trial a station decides whether to participate in it; if it is so, then the station decides independently for each channel whether to transmit on it. According to the second method a station makes one decision whether to send and if the decision is positive it chooses a single channel for transmission. The second method guarantees a limited energy cost for each station but,as we show, turns out to be inferior regarding success probability. We consider these algorithms for a realistic number of stations. We analyze subtle differences between both algorithms regarding success probability.
我们考虑在网络中对共享无线信道的访问调度,其中一组电台试图获得通过共享无线信道的独家传输权。解决这个问题的一个常用策略是,每个站点独立地投掷一枚非对称硬币,并在反面的情况下进行传输。试验执行若干次,并且在试验中单独发送的第一个站获得在共享频道上广播的权利。我们在这里考虑一个多信道的情况:在一个时隙中,一个电台可以在k个不同的信道上传输。在这种情况下,审判可以以两种略有不同的方式安排。第一种方法是在每次试验中由一个工作站决定是否参加试验;如果是这样,那么电台独立决定是否在每个频道上传输。根据第二种方法,站做出是否发送的决定,如果决定是肯定的,则选择单个信道进行传输。第二种方法保证每个站点的能源成本有限,但正如我们所示,其成功概率较低。我们将这些算法考虑为实际数量的站点。我们分析了两种算法在成功率方面的细微差异。
{"title":"Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials","authors":"Z. Golebiewski, Michal Koza, M. Klonowski, Mirosław Kutyłowski","doi":"10.1109/ACIIDS.2009.29","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.29","url":null,"abstract":"We consider access scheduling to a shared radio channel in networks where a set of stations tries to get exclusive rights to transmit over a shared radio channel. A frequent strategy to solve this problem is that each station independently tosses an asymmetric coin and transmits in case of tails. The trials are executed some number of times and the first station that sends alone in a trial gets the right to broadcast over the shared channel. We consider here a multi-channel case: during onetime slot a station may transmit on k different channels.In this case trials can be arranged in two slightly different ways. The first method is that in each trial a station decides whether to participate in it; if it is so, then the station decides independently for each channel whether to transmit on it. According to the second method a station makes one decision whether to send and if the decision is positive it chooses a single channel for transmission. The second method guarantees a limited energy cost for each station but,as we show, turns out to be inferior regarding success probability. We consider these algorithms for a realistic number of stations. We analyze subtle differences between both algorithms regarding success probability.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems 计算机通信系统的智能分布式入侵检测系统
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.87
A. Grzech
The paper is devoted to present various intelligent, distributed network-based intrusion detection systems architectures and quality measures. Moreover an impact of network and their intrusion detection system architectures parameters on the intrusion detection systems quality is discussed.
本文介绍了各种基于分布式网络的智能入侵检测系统的体系结构和质量措施。讨论了网络及其入侵检测系统体系结构参数对入侵检测系统质量的影响。
{"title":"Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems","authors":"A. Grzech","doi":"10.1109/ACIIDS.2009.87","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.87","url":null,"abstract":"The paper is devoted to present various intelligent, distributed network-based intrusion detection systems architectures and quality measures. Moreover an impact of network and their intrusion detection system architectures parameters on the intrusion detection systems quality is discussed.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133151055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deriving Conceptual Schema from XML Databases 从XML数据库派生概念模式
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.13
O. Y. Yuliana, S. Chittayasothorn
In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of integrity constraints that have gained fundamental importance in relational database design. MAR is a class of patterns which has been studied rigorously in data mining. We employ MAR to mine the interesting rules from XML Databases. The mined interesting rules are considered as candidate FDs whose all confidence itemsets are 100%. To prune the weak rules, we pay attention to support and correlation itemsets. The final strong rules are used to generate an Object-Role Model conceptual schema diagram.
本文将功能依赖(FD)和多维关联规则(MAR)这两个不同研究领域的概念结合在一起。FD是一类完整性约束,在关系数据库设计中具有重要意义。MAR是一类在数据挖掘中得到严格研究的模式。我们使用MAR从XML数据库中挖掘有趣的规则。挖掘出的有趣规则被视为候选fd,其所有置信度项集都为100%。为了减少弱规则,我们关注支持项集和相关项集。最后的强规则用于生成对象-角色模型概念模式图。
{"title":"Deriving Conceptual Schema from XML Databases","authors":"O. Y. Yuliana, S. Chittayasothorn","doi":"10.1109/ACIIDS.2009.13","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.13","url":null,"abstract":"In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of integrity constraints that have gained fundamental importance in relational database design. MAR is a class of patterns which has been studied rigorously in data mining. We employ MAR to mine the interesting rules from XML Databases. The mined interesting rules are considered as candidate FDs whose all confidence itemsets are 100%. To prune the weak rules, we pay attention to support and correlation itemsets. The final strong rules are used to generate an Object-Role Model conceptual schema diagram.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stability Analysis of Fuzzy Control for Nonlinear Systems 非线性系统模糊控制的稳定性分析
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.83
Po-Chen Chen, K. Yeh, Cheng-Wu Chen, Shu-Hao Lin
In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the consequent parameter vector are decided via a genetic algorithm (GA) after which a modified adaptive law is derived based on Lyapunov stability theory to control the nonlinear system for tracking a user-defined reference model. The requirement of Kalman-Yacubovich lemma is fulfilling. A boundary-layer function is introduced into these updating laws to cover parameter and modeling errors, and to guarantee that the state errors converge into a specified error bound. After this, an adaptive neural network controller (ANNC) is derived to simultaneously stabilize and control the system.
在这项研究中,我们提出了一种基于遗传算法的参考ANNC的稳定性分析方法,该方法能够处理非线性系统的这些类型的问题。通过遗传算法确定后续参数向量的初始值,然后基于Lyapunov稳定性理论推导出一种改进的自适应律来控制非线性系统跟踪自定义参考模型。满足了卡尔曼-雅库波维奇引理的要求。在这些更新律中引入边界层函数来覆盖参数误差和建模误差,并保证状态误差收敛到指定的误差界内。在此基础上,推导了一种自适应神经网络控制器(ANNC),实现了系统的稳定和控制。
{"title":"Stability Analysis of Fuzzy Control for Nonlinear Systems","authors":"Po-Chen Chen, K. Yeh, Cheng-Wu Chen, Shu-Hao Lin","doi":"10.1109/ACIIDS.2009.83","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.83","url":null,"abstract":"In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the consequent parameter vector are decided via a genetic algorithm (GA) after which a modified adaptive law is derived based on Lyapunov stability theory to control the nonlinear system for tracking a user-defined reference model. The requirement of Kalman-Yacubovich lemma is fulfilling. A boundary-layer function is introduced into these updating laws to cover parameter and modeling errors, and to guarantee that the state errors converge into a specified error bound. After this, an adaptive neural network controller (ANNC) is derived to simultaneously stabilize and control the system.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132774439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing Matrix 范数诱导矩阵有向初始化自适应学习模糊分类器
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.57
L. Yao, Kuei-Sung Weng, Ren-Wei Chang
A fuzzy classifier with adaptive learning of the volume of norm inducing matrix is proposed in this paper. The proposed fuzzy classifier improves the Gustafson-Kessel algorithm (GKA) which assumes a fixed volume of the norm inducing matrix. An efficient approach based on gradient descent learning, called adaptive ellipsoid classification algorithm (AECA) is proposed to recursively update the volume of norm inducing matrix. Mathematical analyses and computer simulations are made to show the effectiveness and efficiency of the proposed fuzzy classifier.
提出了一种基于范数诱导矩阵体积自适应学习的模糊分类器。提出的模糊分类器改进了Gustafson-Kessel算法(GKA),该算法假设范数诱导矩阵的体积固定。提出了一种基于梯度下降学习的自适应椭球分类算法(AECA)来递归更新范数诱导矩阵的体积。数学分析和计算机仿真表明了所提模糊分类器的有效性和高效性。
{"title":"A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing Matrix","authors":"L. Yao, Kuei-Sung Weng, Ren-Wei Chang","doi":"10.1109/ACIIDS.2009.57","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.57","url":null,"abstract":"A fuzzy classifier with adaptive learning of the volume of norm inducing matrix is proposed in this paper. The proposed fuzzy classifier improves the Gustafson-Kessel algorithm (GKA) which assumes a fixed volume of the norm inducing matrix. An efficient approach based on gradient descent learning, called adaptive ellipsoid classification algorithm (AECA) is proposed to recursively update the volume of norm inducing matrix. Mathematical analyses and computer simulations are made to show the effectiveness and efficiency of the proposed fuzzy classifier.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"841 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base 基于模式基的支持向量回归短期负荷预测
Pub Date : 2009-04-01 DOI: 10.1109/ACIIDS.2009.52
Yingchun Guo, D. Niu
A new idea is proposed that preprocessing is the key to improving the precision of short-term load forecasting (STLF). This paper presents a new model of STLF which is using support vector regression (SVR) based on pattern-base. Our model can be described as follows: firstly, it recognizes the different patterns of daily load according such features as weather and date type by means of data mining technology of classification and regression tree (CART); secondly, it sets up pattern-bases which are composed of daily load data sequence with highly similar features; thirdly, it establishes SVR forecasting model based on the pattern-base which matches to the forecasting day. Since the patterns of daily load are treated beforehand, the rule of the historical data sequence is more obvious. The model has many advantages: first, since the training data has similar pattern to the forecasting day, the model reflects the rule of daily load accurately and improves forecasting precision accordingly; second, as the pattern variables need not to be input into model, the mapping of the categorical variables is solved; third, as inputs are reduced, the model is simplified and the runtime is lessened. The simulation indicates that the new method is feasible and the forecasting precision is greatly improved.
提出了预处理是提高短期负荷预测精度的关键思想。本文提出了一种基于模式基的支持向量回归(SVR)的STLF模型。我们的模型可以描述为:首先,利用分类回归树(CART)的数据挖掘技术,根据天气、日期类型等特征识别出日负荷的不同模式;其次,建立由特征高度相似的日负荷数据序列组成的模式库;第三,建立了与预测日匹配的基于模式库的支持向量回归预测模型。由于对日负荷模式进行了预先处理,因此历史数据序列的规律更为明显。该模型具有以下优点:第一,由于训练数据与预测日的模式相似,模型能准确反映日负荷规律,提高预测精度;其次,由于模式变量不需要输入到模型中,解决了分类变量的映射问题;第三,随着输入的减少,模型得到简化,运行时间也缩短了。仿真结果表明,新方法是可行的,预测精度大大提高。
{"title":"Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base","authors":"Yingchun Guo, D. Niu","doi":"10.1109/ACIIDS.2009.52","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.52","url":null,"abstract":"A new idea is proposed that preprocessing is the key to improving the precision of short-term load forecasting (STLF). This paper presents a new model of STLF which is using support vector regression (SVR) based on pattern-base. Our model can be described as follows: firstly, it recognizes the different patterns of daily load according such features as weather and date type by means of data mining technology of classification and regression tree (CART); secondly, it sets up pattern-bases which are composed of daily load data sequence with highly similar features; thirdly, it establishes SVR forecasting model based on the pattern-base which matches to the forecasting day. Since the patterns of daily load are treated beforehand, the rule of the historical data sequence is more obvious. The model has many advantages: first, since the training data has similar pattern to the forecasting day, the model reflects the rule of daily load accurately and improves forecasting precision accordingly; second, as the pattern variables need not to be input into model, the mapping of the categorical variables is solved; third, as inputs are reduced, the model is simplified and the runtime is lessened. The simulation indicates that the new method is feasible and the forecasting precision is greatly improved.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115709103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2009 First Asian Conference on Intelligent Information and Database Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1