期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
1
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 分组密码算法 安全性分析 改进设计 安全问题 密码设计 动态分组 变换矩阵 内部结构
下载PDF
CSMCCVA:Framework of cross-modal semantic mapping based on cognitive computing of visual and auditory sensations 被引量:1
2
作者 刘扬 Zheng Fengbin Zuo Xianyu 《High Technology Letters》 EI CAS 2016年第1期90-98,共9页
Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of co... Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of cognitive system,and establishes a brain-like cross-modal semantic mapping framework based on cognitive computing of visual and auditory sensations.The mechanism of visual-auditory multisensory integration,selective attention in thalamo-cortical,emotional control in limbic system and the memory-enhancing in hippocampal were considered in the framework.Then,the algorithms of cross-modal semantic mapping were given.Experimental results show that the framework can be effectively applied to the cross-modal semantic mapping,and also provides an important significance for brain-like computing of non-von Neumann structure. 展开更多
关键词 计算框架 语义映射 模态 听觉 视觉 多媒体搜索引擎 层次结构 认知系统
下载PDF
Lateral Migration and Nonuniform Rotation of Biconcave Particle Suspended inPoiseuille Flow
3
作者 闻炳海 陈艳燕 +2 位作者 张任良 张超英 方海平 《Chinese Physics Letters》 SCIE CAS CSCD 2013年第6期114-117,共4页
A biconcave particle suspended in a Poiseuille flow is investigated by the multiple-relaxation-time lattice Boltzmann method with the Galilean-invariant momentum exchange method.The lateral migration and equilibrium o... A biconcave particle suspended in a Poiseuille flow is investigated by the multiple-relaxation-time lattice Boltzmann method with the Galilean-invariant momentum exchange method.The lateral migration and equilibrium of the particle are similar to the Segré-Silberberg effect in our numerical simulations.Surprisingly,two lateral equilibrium positions are observed corresponding to the releasing positions of the biconcave particle.The upper equilibrium positions significantly decrease with the increasing Reynolds number,whereas the lower ones are almost insensitive to the Reynolds number.Interestingly,the regular wave accompanied by nonuniform rotation is exhibited in the lateral movement of the biconcave particle.It can be attributed to the fact that the biconcave shape in various postures interacts with the parabolic velocity distribution of the Poiseuille flow.A set of contours illustrate the dynamic flow field when the biconcave particle has successive postures in a rotating period. 展开更多
关键词 flow. CONCAVE POSITIONS
原文传递
A Processor Performance Prediction Method Based on Interpretable Hierarchical Belief Rule Base and Sensitivity Analysis
4
作者 Chen Wei-wei He Wei +3 位作者 Zhu Hai-long Zhou Guo-hui Mu Quan-qi Han Peng 《Computers, Materials & Continua》 SCIE EI 2023年第3期6119-6143,共25页
The prediction of processor performance has important referencesignificance for future processors. Both the accuracy and rationality of theprediction results are required. The hierarchical belief rule base (HBRB)can i... The prediction of processor performance has important referencesignificance for future processors. Both the accuracy and rationality of theprediction results are required. The hierarchical belief rule base (HBRB)can initially provide a solution to low prediction accuracy. However, theinterpretability of the model and the traceability of the results still warrantfurther investigation. Therefore, a processor performance prediction methodbased on interpretable hierarchical belief rule base (HBRB-I) and globalsensitivity analysis (GSA) is proposed. The method can yield more reliableprediction results. Evidence reasoning (ER) is firstly used to evaluate thehistorical data of the processor, followed by a performance prediction modelwith interpretability constraints that is constructed based on HBRB-I. Then,the whale optimization algorithm (WOA) is used to optimize the parameters.Furthermore, to test the interpretability of the performance predictionprocess, GSA is used to analyze the relationship between the input and thepredicted output indicators. Finally, based on the UCI database processordataset, the effectiveness and superiority of the method are verified. Accordingto our experiments, our prediction method generates more reliable andaccurate estimations than traditional models. 展开更多
关键词 Hierarchical belief rule base(HBRB) evidence reasoning(ER) INTERPRETABILITY global sensitivity analysis(GSA) whale optimization algorithm(WOA)
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet
5
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
A LOWER BOUND ON COCHROMATIC NUMBER FOR LINE GRAPHS OF A KIND OF GRAPHS 被引量:8
6
作者 Liu Xinsheng Chen Xiang'en Ou Lifeng 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2006年第3期357-360,共4页
Erdoes, Gimbel 并且(1990 ) 笔直地推测了那如果ω(G )【 5 并且 z (G)】3,那么 z (G) ≥χ(G )- 2。但是由使用边 cochromatic 的概念,它被证明那 ifG 的数字是有ω(G 的一张连接的没有三角的图的线图)【 5 并且 G ≠ K_4,然后 ... Erdoes, Gimbel 并且(1990 ) 笔直地推测了那如果ω(G )【 5 并且 z (G)】3,那么 z (G) ≥χ(G )- 2。但是由使用边 cochromatic 的概念,它被证明那 ifG 的数字是有ω(G 的一张连接的没有三角的图的线图)【 5 并且 G ≠ K_4,然后 z (G) ≥χ(G )-2。 展开更多
关键词 联合彩色数 边缘彩色数 匹配 星形
下载PDF
A model for automatic identification of human pulse signals 被引量:2
7
作者 Hui-yan WANG Pei-yong ZHANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1382-1389,共8页
This paper presents a quantitative method for automatic identification of human pulse signals. The idea is to start with the extraction of characteristic parameters and then to construct the recognition model based on... This paper presents a quantitative method for automatic identification of human pulse signals. The idea is to start with the extraction of characteristic parameters and then to construct the recognition model based on Bayesian networks. To identify depth, frequency and rhythm, several parameters are proposed. To distinguish the strength and shape, which cannot be represented by one or several parameters and are hard to recognize, the main time-domain feature parameters are computed based on the feature points of the pulse signal. Then the extracted parameters are taken as the input and five models for automatic pulse signal identification are constructed based on Bayesian networks. Experimental results demonstrate that the method is feasible and effective in recognizing depth, frequency, rhythm, strength and shape of pulse signals, which can be expected to facilitate the modernization of pulse diagnosis. 展开更多
关键词 脉冲信号辨别 特征抽出 贝叶斯网络 数量分析 小波变换
下载PDF
Lattice Boltzmann simulation of fluid flows in two-dimensional channel with complex geometries
8
作者 闻炳海 刘海燕 +1 位作者 张超英 王强 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4353-4359,共7页
Boundary conditions (BCs) play an essential role in lattice Boltzmann (LB) simulations. This paper investigates several most commonly applied BCs by evaluating the relative L2-norm errors of the LB simulations for two... Boundary conditions (BCs) play an essential role in lattice Boltzmann (LB) simulations. This paper investigates several most commonly applied BCs by evaluating the relative L2-norm errors of the LB simulations for two-dimensional (2-D) Poiseuille flow. It is found that the relative L2-norm error resulting from FHML's BC is smaller than that from other BCs as a whole. Then, based on the FHML's BC, it formulates an LB model for simulating fluid flows in 2-D channel with complex geometries. Afterwards, the flows between two inclined plates, in a pulmonary blood vessel and in a blood vessel with local expansion region, are simulated. The numerical results are in good agreement with the analytical predictions and clearly show that the model is effective. It is expected that the model can be extended to simulate some real biologic flows, such as blood flows in arteries, vessels with stenosises, aneurysms and bifurcations, etc. 展开更多
关键词 格子BOLTZMANN 流体流动 几何形状 模拟 POISEUILLE流 通道 三维 边界条件
原文传递
A metrics suite for coupling measurement of software architecture
9
作者 孔庆彦 伦立军 +1 位作者 赵佳华 王义和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第3期361-365,共5页
To better evaluate the quality of software architecture,a metrics suite is proposed to measure the coupling of software architecture models,in which CBC is used to measure the coupling between components,CBCC is used ... To better evaluate the quality of software architecture,a metrics suite is proposed to measure the coupling of software architecture models,in which CBC is used to measure the coupling between components,CBCC is used to measure the coupling of transferring message between components,CBCCT is used to measure the coupling of software architecture,WCBCC is used to measure the coupling of transferring message with weight between components,and WCBCCT is used to measure the coupling of message transmission with weight in the whole software architecture. The proposed algorithm for the coupling metrics is applied to the design of serve software architecture. Analysis of an example validates the feasibility of this metrics suite. 展开更多
关键词 软件体系结构 耦合传输 套件 指标测量 体系结构模型 软件架构 信息传输 软件质量
下载PDF
Using Kalman Filter to Guarantee QoS Robustness of Web Server
10
作者 LI Jie LIU Xian-xing WANG Ru-chuan 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期239-242,共4页
The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 10... The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self-regulating algorism based on Kalman Filter are proposed towards Web Server. And a Web QoS self-regulating scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain. The simulation results shows that the proposed scheme can guarantee the QoS with both robustness and stability . 展开更多
关键词 WEB服务 服务质量 卡尔曼滤波器 鲁棒性
下载PDF
Feature Selection: Algorithms and Challenges
11
作者 Xindong Wu Yanglan Gan +1 位作者 Hao Wang Xuegang Hu 《南昌工程学院学报》 CAS 2006年第2期28-34,共7页
Feature selection is an active area in data mining research and development. It consists of efforts and contributions from a wide variety of communities, including statistics, machine learning, and pattern recognition... Feature selection is an active area in data mining research and development. It consists of efforts and contributions from a wide variety of communities, including statistics, machine learning, and pattern recognition. The diversity, on one hand, equips us with many methods and tools. On the other hand, the profusion of options causes confusion.This paper reviews various feature selection methods and identifies research challenges that are at the forefront of this exciting area. 展开更多
关键词 feature selection data mining research ALGORITHMS informative attvibutes of dataset CHALLENGE
下载PDF
Measurement of Nodes Importance for Complex Networks Structural-Holes-Oriented
12
作者 Hui Xu Jianpei Zhang +1 位作者 Jing Yang Lijun Lun 《国际计算机前沿大会会议论文集》 2016年第1期117-120,共4页
Mining important nodes in the complex network should not only consider the core nodes, but also consider the locations of the nodes in the network. Despite many researches on discovering important nodes, the importanc... Mining important nodes in the complex network should not only consider the core nodes, but also consider the locations of the nodes in the network. Despite many researches on discovering important nodes, the importance of nodes in the structural holes is still ignored easily. Therefore, this paper proposes a method of local centrality measurement based on structural holes, which evaluates the nodes importance both by direct and indirect constraints caused by the lack of structural holes around the nodes. In this method, the attributes and locations of the nodes and their first-order and second-order neighbors are taken into account simultaneously. Deliberate attack simulation is carried out through selective deletion in a certain proportion of network nodes. Calculating the decreased ratio of network efficiency is to quantitatively describe the importance of nodes in before-and-after attacks. Experiments indicate that this method has more advantages to mine important nodes compared to clustering coefficient and k-shell decomposition method. And it is suitable for the quantitative analysis of the nodes importance in large scale networks. 展开更多
关键词 Complex networks STRUCTURAL HOLES NODES IMPORTANCE Constraints
下载PDF
Mining and Ranking Important Nodes in Complex Network by K-Shell and Degree Difference 被引量:1
13
作者 Jianpei Zhang Hui Xu +1 位作者 Jing Yang Lijun Lun 《国际计算机前沿大会会议论文集》 2018年第1期28-28,共1页
下载PDF
A Deep Learning Driven Feature Based Steganalysis Approach
14
作者 Yuchen Li Baohong Ling +2 位作者 Donghui Hu Shuli Zheng Guoan Zhang 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2213-2225,共13页
The goal of steganalysis is to detect whether the cover carries the secret information which is embedded by steganographic algorithms.The traditional ste-ganalysis detector is trained on the stego images created by a ... The goal of steganalysis is to detect whether the cover carries the secret information which is embedded by steganographic algorithms.The traditional ste-ganalysis detector is trained on the stego images created by a certain type of ste-ganographic algorithm,whose detection performance drops rapidly when it is applied to detect another type of steganographic algorithm.This phenomenon is called as steganographic algorithm mismatch in steganalysis.To resolve this pro-blem,we propose a deep learning driven feature-based approach.An advanced steganalysis neural network is used to extract steganographic features,different pairs of training images embedded with steganographic algorithms can obtain diverse features of each algorithm.Then a multi-classifier implemented as lightgbm is used to predict the matching algorithm.Experimental results on four types of JPEG steganographic algorithms prove that the proposed method can improve the detection accuracy in the scenario of steganographic algorithm mismatch. 展开更多
关键词 Image steganalysis algorithm mismatch convolutional neural network JPEG images
下载PDF
Satisfiability and reasoning mechanism of terminological cycles in description logic vL 被引量:3
15
作者 WANG Ju JIANG YunCheng SHEN YuMing 《Science in China(Series F)》 2008年第9期1204-1214,共11页
The current research works and the existing problems of terminological cycles in description logics are analyzed in this paper. Referring to the works of Baader F and Nebel B,we aim in a new direction. Firstly,descrip... The current research works and the existing problems of terminological cycles in description logics are analyzed in this paper. Referring to the works of Baader F and Nebel B,we aim in a new direction. Firstly,description logic νL is defined,and the description graphs GT and GJ are redefined. A syntax condition for the satisfiability of membership relation is given. By using this syntax condition,we prove the following:The subsumption reasoning in νL with respect to gfp-model,lfp-model and descriptive model is polynomial. 展开更多
关键词 逻辑学 稳定性 推理机制 术语周期
原文传递
Automatic detection and evaluation of Erhua in the Putonghua proficiency test
16
作者 ZHANG Long LI Haifeng +1 位作者 MA Lin WANG Jianhua 《Chinese Journal of Acoustics》 2014年第1期83-96,共14页
An automatic detection and evaluation method of the Erhua(also called r-retroflexion or retrofex suffixation)in the Putonghua proficiency test(PSC)is proposed.Based on the framework of the computer assisted pronunciat... An automatic detection and evaluation method of the Erhua(also called r-retroflexion or retrofex suffixation)in the Putonghua proficiency test(PSC)is proposed.Based on the framework of the computer assisted pronunciation evaluation system,the present authors made an in-depth analysis of phonologic rules and acoustic characteristics of the Erhua,and solved the detection and evaluation of the Erhua as a typical classification problem.Then more representative acoustic features were selected and a variety of difierent classification algorithms were used.The results showed that the boosting classification and regression tree(Boosting CART)could make full use of the characteristics of the Erhua,and the classification accuracy was 92.41%.Based on further analysis of the acoustic feature group,it was found that formant,pronunciation confidence and duration were the most important clues of the Erhua,and these clues could effectively realize the automatic detection and evaluation of the Erhua. 展开更多
关键词 普通话水平测试 自动检测 评价方法 声学特性 分类问题 计算机辅助 评价系统 分类算法
原文传递
Apple leaf disease identification using genetic algorithm and correlation based feature selection method 被引量:8
17
作者 Zhang Chuanlei Zhang Shanwen +2 位作者 Yang Jucheng Shi Yancui Chen Jia 《International Journal of Agricultural and Biological Engineering》 SCIE EI CAS 2017年第2期74-83,共10页
Apple leaf disease is one of the main factors to constrain the apple production and quality.It takes a long time to detect the diseases by using the traditional diagnostic approach,thus farmers often miss the best tim... Apple leaf disease is one of the main factors to constrain the apple production and quality.It takes a long time to detect the diseases by using the traditional diagnostic approach,thus farmers often miss the best time to prevent and treat the diseases.Apple leaf disease recognition based on leaf image is an essential research topic in the field of computer vision,where the key task is to find an effective way to represent the diseased leaf images.In this research,based on image processing techniques and pattern recognition methods,an apple leaf disease recognition method was proposed.A color transformation structure for the input RGB(Red,Green and Blue)image was designed firstly and then RGB model was converted to HSI(Hue,Saturation and Intensity),YUV and gray models.The background was removed based on a specific threshold value,and then the disease spot image was segmented with region growing algorithm(RGA).Thirty-eight classifying features of color,texture and shape were extracted from each spot image.To reduce the dimensionality of the feature space and improve the accuracy of the apple leaf disease identification,the most valuable features were selected by combining genetic algorithm(GA)and correlation based feature selection(CFS).Finally,the diseases were recognized by SVM classifier.In the proposed method,the selected feature subset was globally optimum.The experimental results of more than 90%correct identification rate on the apple diseased leaf image database which contains 90 disease images for there kinds of apple leaf diseases,powdery mildew,mosaic and rust,demonstrate that the proposed method is feasible and effective. 展开更多
关键词 apple leaf disease diseased leaf recognition region growing algorithm(RGA) genetic algorithm and correlation based feature selection(GA-CFS)
原文传递
Optimization of test resources for 3D SoC based on game theory 被引量:3
18
作者 Shao Jingbo Zhao Yue Liu Xiaoxiao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第1期65-74,共10页
The ever-increasing complexity of on-chip interconnection poses great challenges for the architecture of conventional system-on-chip(SoC) in semiconductor industry. The rapid development of process technology enables ... The ever-increasing complexity of on-chip interconnection poses great challenges for the architecture of conventional system-on-chip(SoC) in semiconductor industry. The rapid development of process technology enables the creation of stacked 3-dimensional(3 D) SoC by means of through-silicon-via(TSV). Stacked 3 D SoC testing consists of two major issues, test architecture optimization and test scheduling. This paper proposed game theory based optimization of test scheduling and test architecture to achieve win-win result as well as individual rationality for each player in a game. Game theory helps to achieve equilibrium between two correlated sides to find an optimal solution. Experimental results on handcrafted 3 D SoCs built from ITC'2 benchmarks demonstrate that the proposed approach achieves comparable or better test times at negligible computing time. 展开更多
关键词 3D SOC GAME THEORY TEST ARCHITECTURE TEST SCHEDULING
原文传递
Insect recognition based on integrated region matching and dual tree complex wavelet transform 被引量:2
19
作者 Le-qing ZHU Zhen ZHANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第1期44-53,共10页
To provide pest technicians with a convenient way to recognize insects,a novel method is proposed to classify insect images by integrated region matching (IRM) and dual tree complex wavelet transform (DTCWT).The wing ... To provide pest technicians with a convenient way to recognize insects,a novel method is proposed to classify insect images by integrated region matching (IRM) and dual tree complex wavelet transform (DTCWT).The wing image of the lepidopteran insect is preprocessed to obtain the region of interest (ROI) whose position is then calibrated.The ROI is first segmented with the k-means algorithm into regions according to the color features,properties of all the segmented regions being used as a coarse level feature.The color image is then converted to a grayscale image,where DTCWT features are extracted as a fine level feature.The IRM scheme is undertaken to find K nearest neighbors (KNNs),out of which the nearest neighbor is searched by computing the Canberra distance of DTCWT features.The method was tested with a database including 100 lepidopteran insect species from 18 families and the recognition accuracy was 84.47%.For the forewing subset,a recognition accuracy of 92.38% was achieved.The results showed that the proposed method can effectively solve the problem of automatic species identification of lepidopteran specimens. 展开更多
关键词 Lepidopteran insects Auto-classification k-means algorithm Integrated region matching (IRM) Dual tree complex wavelet transform (DTCWT)
原文传递
Cloud security situation prediction method based on grey wolf optimization and BP neural network 被引量:1
20
作者 Zhao Guosheng Liu Dongmei Wang Jian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第6期30-41,共12页
Aiming at the accuracy and error correction of cloud security situation prediction,a cloud security situation prediction method based on grey wolf optimization(GWO)and back propagation(BP)neural network is proposed.Fi... Aiming at the accuracy and error correction of cloud security situation prediction,a cloud security situation prediction method based on grey wolf optimization(GWO)and back propagation(BP)neural network is proposed.Firstly,the adaptive disturbance convergence factor is used to improve the GWO algorithm,so as to improve the convergence speed and accuracy of the algorithm.The Chebyshev chaotic mapping is introduced into the position update formula of GWO algorithm,which is used to select the features of the cloud security situation prediction data and optimize the parameters of the BP neural network prediction model to minimize the prediction output error.Then,the initial weights and thresholds of BP neural network are modified by the improved GWO algorithm to increase the learning efficiency and accuracy of BP neural network.Finally,the real data sets of Tencent cloud platform are predicted.The simulation results show that the proposed method has lower mean square error(MSE)and mean absolute error(MAE)compared with BP neural network,BP neural network based on genetic algorithm(GA-BP),BP neural network based on particle swarm optimization(PSO-BP)and BP neural network based on GWO algorithm(GWO-BP).The proposed method has better stability,robustness and prediction accuracy. 展开更多
关键词 CLOUD security SITUATION prediction GREY WOLF OPTIMIZATION FEATURE selection
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部