[1]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29-33.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29-33.
点击复制

 混沌RBF神经网络异常检测算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年07期
页码:
29-33
栏目:
出版日期:
2014-07-10

文章信息/Info

Title:
 Chaotic RBF Neural Network Anomaly Detection Algorithm
文章编号:
1673-629X(2014)07-0029-05
作者:
 翁鹤皮德常
 南京航空航天大学 计算机科学与技术学院
Author(s):
 WENG He PI De-chang
关键词:
 电力负荷相空间重构混沌时间序列RBF神经网络异常检测
Keywords:
 electricity loadphase space reconstructionchaotic time seriesRBF neural networkanomaly detection
分类号:
TP183
文献标志码:
A
摘要:
 针对传统神经网络异常检测算法的准确率问题,文中将混沌和RBF( Radial Basis Function)神经网络相结合,既可利用混沌的随机性、初值敏感性等特点,也可发挥RBF神经网络大规模并行处理、自组织自适应性等功能。文中对混沌时间序列进行相空间重构得到相空间向量,作为RBF神经网络的输入,通过RBF神经网络构建电力负荷序列的拟合函数,在此基础上进一步预测,比较预测值与真实值的偏差,从而判断检测信号是否为异常信号。实验结果表明,该方法相对其他算法预测精度更高,具有较好的异常检测能力。
Abstract:
 For the accuracy problem of traditional neural network anomaly detection algorithm,propose a method of combining chaos and RBF ( Radial Basis Function) neural network,not only can take advantages of the randomness and initial value sensitivity and others of chaos,but also make use of the large-scale parallel processing,self-organization and adaptive capability of RBF neural networks. Recon-struct the chaotic time sequence to obtain the phase space vector as the input of RBF neural network,by which build the electricity load sequence fitting function. Then use this function to take one-step prediction in the phrase space reconstruction. At last,compare predicted value and true value of the deviation,in order to determine whether the abnormal signal or detection signal. Experimental results show that this method has better prediction accuracy and anomaly detection capabilities.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[7]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[8]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[9]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.
[10]吴家皋[][],余浩[] [],张雪英[]. 基于链接回溯的地理信息更新主题爬虫研究[J].计算机技术与发展,2014,24(07):52.
 WU Jia-gao[] [],YU Hao[] [],ZHANG Xue-ying[]. Study of Topic-driven Web Crawler for Geographic Information Updating Based on Link Backtracking[J].,2014,24(07):52.

更新日期/Last Update: 2015-03-12