首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
User Oriented Modeling and Simulation in LEO Satellite Networks 面向用户的低轨道卫星网络建模与仿真
Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li
Modeling and simulation is a very powerful tool for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling and simulation method has been proposed for LEO satellite communication networks. Different from the traditional method focused on the packet generation, our model framework is “user oriented” with several layers which can reflect the behavior of users in the network. Layers offer services to the higher layer and require services from the layer below. Such a “user oriented” top-down manner has a great superiority in describing complex communication system. This approach is then demonstrated on modeling ISL traffic load in LEO satellite communication networks. By this way we get an estimation of the ISL traffic load for different number of users with various traffic characteristics. Furthermore this can be a very useful reference for system design.
建模与仿真是通信网络流量分析和性能评估的有力工具。近地轨道卫星系统是一个复杂的动态系统,很难找到一个数学模型来描述它。本文提出了一种新的低轨卫星通信网络建模与仿真方法。与传统的以数据包生成为中心的方法不同,我们的模型框架是“面向用户”的,它的多层结构可以反映网络中用户的行为。层向上层提供服务,并要求下层提供服务。这种“面向用户”的自顶向下方式在描述复杂的通信系统时具有很大的优越性。然后在低轨道卫星通信网络中对ISL业务负载建模进行了验证。通过这种方法,我们可以估计出不同用户数、不同流量特征下的ISL流量负荷。此外,这对系统设计也有一定的参考价值。
{"title":"User Oriented Modeling and Simulation in LEO Satellite Networks","authors":"Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li","doi":"10.1109/NSWCTC.2009.260","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.260","url":null,"abstract":"Modeling and simulation is a very powerful tool for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling and simulation method has been proposed for LEO satellite communication networks. Different from the traditional method focused on the packet generation, our model framework is “user oriented” with several layers which can reflect the behavior of users in the network. Layers offer services to the higher layer and require services from the layer below. Such a “user oriented” top-down manner has a great superiority in describing complex communication system. This approach is then demonstrated on modeling ISL traffic load in LEO satellite communication networks. By this way we get an estimation of the ISL traffic load for different number of users with various traffic characteristics. Furthermore this can be a very useful reference for system design.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System 分布式多粒度P2P流量识别与控制系统建模
Wang Jinsong, Wang Zhengxu, L. Tao, Liu Fan
As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed Multi-Granularity P2P Traffic Identifying and Controlling in the light of large-scale and high-speed network environment, under the premise that it basically does not change the structure of network, not increase the special monitoring equipment and minimize the impact on the actual communication system, we resolve the entire network's P2P traffic identifying and controlling.
随着P2P应用和用户量的不断快速增长,互联网面临的网络拥塞、服务质量难以保证等问题也越来越严重。本文针对大规模高速网络环境,设计了分布式多粒度P2P流量识别与控制模型,在基本不改变网络结构、不增加专用监控设备、对实际通信系统影响最小的前提下,解决了整个网络的P2P流量识别与控制问题。
{"title":"Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System","authors":"Wang Jinsong, Wang Zhengxu, L. Tao, Liu Fan","doi":"10.1109/NSWCTC.2009.315","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.315","url":null,"abstract":"As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed Multi-Granularity P2P Traffic Identifying and Controlling in the light of large-scale and high-speed network environment, under the premise that it basically does not change the structure of network, not increase the special monitoring equipment and minimize the impact on the actual communication system, we resolve the entire network's P2P traffic identifying and controlling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134538071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Sensor Network for Cropland Environmental Monitoring 用于农田环境监测的无线传感器网络
Hui Liu, Zhijun Meng, Maohua Wang
Wireless sensor network technology can provide optimal and integrated solution for distributed data collecting, delivering and analyzing in tough croplands environment. A wireless sensor network for cropland environmental monitoring is designed according to cropland application requirements. It consists of a set of sensor nodes for data sensing, a sink node for data aggregating and long-distance transmitting, and a base station for data storing and analyzing. In order to make sure of reliable communication performance, we have conducted radio propagation experiments in actual crop field. Antenna height is proven to be an important factor to propagation loss. Therefore, the lowest antenna height for cropland applications is discussed. Finally, we proposed regular patterns of sensor nodes deployment based on the communication range and the sampling range.
无线传感器网络技术可以为恶劣农田环境下的分布式数据采集、传输和分析提供优化的集成解决方案。根据农田应用需求,设计了农田环境监测无线传感器网络。它由一组用于数据感知的传感器节点、一个用于数据聚合和远程传输的汇聚节点和一个用于数据存储和分析的基站组成。为了保证可靠的通信性能,我们在实际农田中进行了无线电传播实验。天线高度是影响传输损耗的重要因素。因此,讨论了农田应用的最低天线高度。最后,提出了基于通信距离和采样距离的传感器节点规则部署模式。
{"title":"A Wireless Sensor Network for Cropland Environmental Monitoring","authors":"Hui Liu, Zhijun Meng, Maohua Wang","doi":"10.1109/NSWCTC.2009.306","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.306","url":null,"abstract":"Wireless sensor network technology can provide optimal and integrated solution for distributed data collecting, delivering and analyzing in tough croplands environment. A wireless sensor network for cropland environmental monitoring is designed according to cropland application requirements. It consists of a set of sensor nodes for data sensing, a sink node for data aggregating and long-distance transmitting, and a base station for data storing and analyzing. In order to make sure of reliable communication performance, we have conducted radio propagation experiments in actual crop field. Antenna height is proven to be an important factor to propagation loss. Therefore, the lowest antenna height for cropland applications is discussed. Finally, we proposed regular patterns of sensor nodes deployment based on the communication range and the sampling range.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Dynamic Behavior Measurement Based on Interactive Markov Chain 基于交互马尔可夫链的动态行为测量
Xing Zhang, Chen Li, Ruihua Li
To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other is Steady-state Distribution of Executing Routes (SDER), which solves the problem of linear model that can not measure branch and concurrent system. Compared with traditional methods, the IMC-based model provides more powerful ability to measure runtime behaviors in complex and branch system.
针对信任测量中存在的问题和挑战,提出了一种基于交互马尔可夫链(IMC)的动态行为测量模型。在这个模型中,我们使用两种不同的方法来获得系统运行时对性能和功能的期望。一种方法是时序执行概率(TPER),它引入了行为序列与时间的关系。另一种是执行路由稳态分布(SDER),它解决了线性模型无法测量分支和并发系统的问题。与传统方法相比,基于imc的模型提供了更强大的能力来测量复杂和分支系统的运行时行为。
{"title":"Dynamic Behavior Measurement Based on Interactive Markov Chain","authors":"Xing Zhang, Chen Li, Ruihua Li","doi":"10.1109/NSWCTC.2009.160","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.160","url":null,"abstract":"To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other is Steady-state Distribution of Executing Routes (SDER), which solves the problem of linear model that can not measure branch and concurrent system. Compared with traditional methods, the IMC-based model provides more powerful ability to measure runtime behaviors in complex and branch system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education 基于马尔可夫链的体育教学质量模糊综合评价模型
Liu Min-hang, Fu Yu-kun
On the basis of making full use of the computer technology, the Markov chain and the index system of the student's quality of sports, this article carries out a fuzzy evaluation to the quality of physical education and proves its feasibility with the examples. Nowadays, when the information technology, computer technology has been widely used in physical education, this kind of appraisal attempt has the positive practical significance
在充分利用计算机技术、马尔可夫链和学生体育素质指标体系的基础上,对体育教学质量进行了模糊评价,并通过实例证明了其可行性。在信息技术、计算机技术已广泛应用于体育教学的今天,这种评价尝试具有积极的现实意义
{"title":"A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education","authors":"Liu Min-hang, Fu Yu-kun","doi":"10.1109/NSWCTC.2009.327","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.327","url":null,"abstract":"On the basis of making full use of the computer technology, the Markov chain and the index system of the student's quality of sports, this article carries out a fuzzy evaluation to the quality of physical education and proves its feasibility with the examples. Nowadays, when the information technology, computer technology has been widely used in physical education, this kind of appraisal attempt has the positive practical significance","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Notice of Violation of IEEE Publication PrinciplesApplication of Markov Chain in IP Traffic Classification 违反IEEE发布原则的通知。马尔可夫链在IP流量分类中的应用
Zhou Xusheng, Wang Zhiming
Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc.) which raises new challenges in resource reservation, pricing, network monitoring, etc. In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques. The evaluation of this automatic recognition procedure using a monitor port on campus network switch demonstrates the feasibility and the excellent performance of this approach.
由于P2P、VoIP、流媒体视频等新业务的出现,在资源预约、定价、网络监控等方面提出了新的挑战,服务分类正成为一个核心问题。为了识别应用程序的特定签名,我们首先通过一阶马尔可夫链在传输层对其数据包序列进行建模。然后,我们通过标准决策技术决定哪个服务应该与任何新序列相关联。利用校园网交换机监控端口对该自动识别程序进行了评估,验证了该方法的可行性和优异的性能。
{"title":"Notice of Violation of IEEE Publication PrinciplesApplication of Markov Chain in IP Traffic Classification","authors":"Zhou Xusheng, Wang Zhiming","doi":"10.1109/NSWCTC.2009.151","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.151","url":null,"abstract":"Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc.) which raises new challenges in resource reservation, pricing, network monitoring, etc. In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques. The evaluation of this automatic recognition procedure using a monitor port on campus network switch demonstrates the feasibility and the excellent performance of this approach.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division 基于随机树分割的有效二值图像水印算法
Chao-yang Zhang, Zhilua Hu
Aiming at the binary text image’s characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according to each pixel’s degree and texture changes between blocks. Through properties’ combination, the embedment block and location which are fit for watermarking are screened out. At last, different binary text images are chosen for emulation experiment.
针对二值文本图像像素简单、纹理复杂、信息隐藏免疫能力差的特点,提出了一种基于兼容粗糙度等级的数字水印嵌入位置选择方法。该方法将二值文本图像划分为不同的等价类。根据每个像素的程度和块间纹理的变化,将等价类进一步划分为不同的子类。通过属性组合,筛选出适合水印的嵌入块和位置。最后,选择不同的二值文本图像进行仿真实验。
{"title":"An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division","authors":"Chao-yang Zhang, Zhilua Hu","doi":"10.1109/NSWCTC.2009.344","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.344","url":null,"abstract":"Aiming at the binary text image’s characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according to each pixel’s degree and texture changes between blocks. Through properties’ combination, the embedment block and location which are fit for watermarking are screened out. At last, different binary text images are chosen for emulation experiment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System 基于光纤通信系统的井下温湿度监测研究
W. Xiaolei, Wu Bingxin, Fu Bangsheng, P. Sheng
For the problem of temperature drift, inexact and great transmission loss of the monitoring of environment temperature and humidity under the mine, this paper proposes the temperature and humidity monitoring and optical fiber communication transmission system under the mine based on TMS320LF2812(DSP) by controlling the digital temperature sensor. The system adopts RS232 serial communication, uploads data by optical communication. Data are dealed with by host computer to improve the speed and capability of system .The actual test results show that the system can work stably ,the measuring accuracy of temperature and humidity is up to 0.1¿ and 1%RH. It can realize reliable data transmission.
针对井下环境温湿度监测存在温度漂移、不精确、传输损耗大等问题,提出了基于TMS320LF2812(DSP)的井下温湿度监测及光纤通信传输系统,通过对数字温度传感器的控制,实现井下温湿度监测与光纤通信传输。系统采用RS232串行通信,通过光通信上传数据。实际测试结果表明,该系统工作稳定,温度和湿度的测量精度可达0.1% rh和1%RH。可实现可靠的数据传输。
{"title":"Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System","authors":"W. Xiaolei, Wu Bingxin, Fu Bangsheng, P. Sheng","doi":"10.1109/NSWCTC.2009.258","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.258","url":null,"abstract":"For the problem of temperature drift, inexact and great transmission loss of the monitoring of environment temperature and humidity under the mine, this paper proposes the temperature and humidity monitoring and optical fiber communication transmission system under the mine based on TMS320LF2812(DSP) by controlling the digital temperature sensor. The system adopts RS232 serial communication, uploads data by optical communication. Data are dealed with by host computer to improve the speed and capability of system .The actual test results show that the system can work stably ,the measuring accuracy of temperature and humidity is up to 0.1¿ and 1%RH. It can realize reliable data transmission.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hidden Markov Model Based Real Time Network Security Quantification Method 基于隐马尔可夫模型的实时网络安全量化方法
Weiming Li, Zhengbiao Guo
Exactly assessing the security risk of a network is the key to improving the security level of the network. The Hidden Markov Model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is Intrusion Detection System alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this method, which improves its accuracy and simplifies the configuration by automatically working out matrixes in HMM. In an experimental study we demonstrate the usefulness of our techniques.
准确评估网络的安全风险是提高网络安全水平的关键。基于隐马尔可夫模型的实时网络安全风险量化方法可以动态、实时地得到以入侵检测系统告警为输入的风险值。该方法优于传统的静态评估方法。本文通过HMM中矩阵的自动计算,解决了该方法的主要缺陷,提高了算法的精度,简化了结构。在一项实验研究中,我们证明了我们的技术的有效性。
{"title":"Hidden Markov Model Based Real Time Network Security Quantification Method","authors":"Weiming Li, Zhengbiao Guo","doi":"10.1109/NSWCTC.2009.375","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.375","url":null,"abstract":"Exactly assessing the security risk of a network is the key to improving the security level of the network. The Hidden Markov Model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is Intrusion Detection System alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this method, which improves its accuracy and simplifies the configuration by automatically working out matrixes in HMM. In an experimental study we demonstrate the usefulness of our techniques.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Short-Term Load Forecasting Based on the BKF-SVM 基于BKF-SVM的短期负荷预测
Kebin Cui, Yingshuang Du
Support vector machine has been widely used in the area of load forecasting, but there are still many disadvantages that are large processed data and slow processing speed etc when training data.. According to the disadvantages, this paper proposes a kind of forecasting method of SVM based on Boolean kernel function. In order to determine the super parameters which exert a direct influence on the ability of extension of SVM, the fixed step iteration method is presented, achieving the automatic selection of super parameters. The practical example shows that the system with BKF-SVM(Boolean Kernel Functions of SVM) method, comparing with the RBF-SVM method, when being applied to short-term load-forecasting has got higher prediction accuracy with such advantages as simple structure and good generalization performance without over-fitting phenomenon.
支持向量机在负荷预测领域得到了广泛的应用,但在训练数据时仍存在处理数据量大、处理速度慢等缺点。针对其不足,本文提出了一种基于布尔核函数的支持向量机预测方法。为了确定对支持向量机扩展能力有直接影响的超级参数,提出了固定步长迭代法,实现了超级参数的自动选择。实例表明,与RBF-SVM方法相比,采用BKF-SVM方法进行短期负荷预测的系统具有结构简单、泛化性能好、无过拟合现象等优点,预测精度更高。
{"title":"Short-Term Load Forecasting Based on the BKF-SVM","authors":"Kebin Cui, Yingshuang Du","doi":"10.1109/NSWCTC.2009.170","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.170","url":null,"abstract":"Support vector machine has been widely used in the area of load forecasting, but there are still many disadvantages that are large processed data and slow processing speed etc when training data.. According to the disadvantages, this paper proposes a kind of forecasting method of SVM based on Boolean kernel function. In order to determine the super parameters which exert a direct influence on the ability of extension of SVM, the fixed step iteration method is presented, achieving the automatic selection of super parameters. The practical example shows that the system with BKF-SVM(Boolean Kernel Functions of SVM) method, comparing with the RBF-SVM method, when being applied to short-term load-forecasting has got higher prediction accuracy with such advantages as simple structure and good generalization performance without over-fitting phenomenon.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1