期刊文献+

基于近邻传播聚类的电力通信告警分析方法 被引量:5

An analysis method of power communication alarm information based on affinity propagation clustering
下载PDF
导出
摘要 在电力通信告警相关性分析中,往往需要将原始告警数据库转化为事务型数据库,针对传统均匀滑动时间窗口提取告警事务效率低的问题,文中提出一种基于近邻传播聚类的滑动时间窗口法,通过将近邻传播聚类算法应用于告警数据预处理过程中,将原始告警数据转化成能够用于滑动时间窗口法处理的若干时间段。实验证明,基于近邻传播聚类的滑动时间窗口法具有更高的事务提取效率,解决了固定时间段划分方法的不合理性,有利于告警相关性分析,在告警事务提取中具有更广泛的应用前景。 In power communication alarm correlationanalysis, the original alarm database needs to be transformed into a transactional database. Traditional sliding time window has low efficiency on extracting alarm transactions, so sliding time window method based on propagation clustering is proposed. With this method, affinity propagation clustering is applied to alarm pretreatment, the alarm sequence would be considered to a series of data objects which is turned into some segments with higher similarity. The performance testing of the algorithm indicates that this method has higher extract efficiency, which solves the irrationality of fixed time window. The method is helpful for alarm correlation analysis and has a wider application prospect for extracting alarm transactions.
出处 《电子设计工程》 2016年第16期142-145,共4页 Electronic Design Engineering
基金 北京市自然科学基金项目(4142049)
关键词 告警事务 关联分析 近邻传播聚类 时间窗口 滑动步长 alarm transactions correlation analysis affinity propagation clustering time window sliding step
  • 相关文献

参考文献12

  • 1CHEN Chao,LI Tong-yanTongyan L.Study of alarm association rules mining based on matrixmapping[C]//Electronics,Comm-unications and Control (ICECC),2011 International Confer-ence on. IEEE,2011:2861-2864.
  • 2Wu Y,Du S,Luo W.Mining alarm database of telecommun-ication network for alarmassociation rules[C]//Dependable Computing,2005. Proceedings.11th Pacific Rim International Symposium on. IEEE,2005:281-286.
  • 3Leng X,Li X. Alarm fuzzy association rules parallel miningin multi-domain distributed communicationnetwork[C]//Comm-unication Technology (ICCT),2012 IEEE 14th International Conference on. IEEE,2012:501-506.
  • 4Wang Y,Li G,Xu Y,et al. An algorithm for mining of associa-tion rules for the information communication network alarms based on swarm intelligence[J].Mathematical Problems in Engineering,2014:1-14.
  • 5Van Vaerenbergh S,Via J.Santamana I.Nonlinear system iden-tification using a new sliding-window kernel RLS algorithm[J]Journal of Communications,2007,2(3):1-7.
  • 6李彤岩,李兴明.基于双约束滑动时间窗口的告警预处理方法研究[J].计算机应用研究,2013,30(2):582-584. 被引量:4
  • 7肖宇,于剑.基于近邻传播算法的半监督聚类[J].软件学报,2008,19(11):2803-2813. 被引量:165
  • 8Frey B J, Dueck D. Clustering by passing messages between data points[J].science,2007,315(5814):972-976.
  • 9Givoni I E,Frey B J. A binary variable model for affinity pro-pagation[J]. Neural Computation,2009,21(6):1589-1600.
  • 10Sahu N,Thakur G S. Document clustering using message passing between data points[C]//CommunicationSystems and Network Technologies (CSNT),2013 International Confe-rence on. IEEE,2013: 591-596.

二级参考文献21

  • 1唐庆梅,熊齐邦.语义Web和Web服务标准集成的研究[J].计算机工程,2006,32(3):136-139. 被引量:6
  • 2管秀鹏,程林,孙元章,张剑云,吴琛,李文云.基于Prony方法的大型互联电网PSS参数优化设计[J].电力系统自动化,2006,30(12):7-11. 被引量:28
  • 3Prabha Kundur.电力系统稳定与控制[M].北京:中国电力出版社,2001.
  • 4杨慧敏.区域电网低频振荡特性分析与抑制方法的研究[M].湖北:华中科技大学,2009.
  • 5毛承雄,涂光瑜,文劲宇,等.现代控制理论[D].武汉:华中科技大学电气与电子工程学院.2006.
  • 6张鹏翔.多目标进化算法及其在电力系统中的应用研究[M].武汉:华中科技大学,2004.
  • 7JOHNSON M A,ZARAFONITIS I P, CALLIGARIS M.Prony Analysis and Power System Stability Theoretical and Applications Research [C].Washington:Power Engineering Society Summer Meeting, 2000:16-20.
  • 8HOCKING R R,LESLIE L L.Selection of the Best Subset in Regression Analysis[J]. Technometrics, 1967:537-540.
  • 9张璞.PSS的自适应算法研究[R].北京:华北电力大学,2011.
  • 10熊俊杰.基于PMU的低频振荡Prony分析和本地在线监测系统[R].南京:东南大学,2006.

共引文献206

同被引文献38

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部