期刊文献+

网络回溯的算法模型改进及电网应用

Based on the Network Back Recognition Technology and Its Application Research
下载PDF
导出
摘要 对称正定(Symmetric Positive Definite,SPD)矩阵可以通过计算图像集合的协方差矩阵建立图像集合的模型。文中基于网络回溯和对称正定进行了图像加密识别的研究。通过对标准数据库集分析实验得出:提出的方法获得了较高的识别精度,将流形上的点投影到高维的核空间,应用核鉴别分析进行分类。本文使用无监督的方法获得的投影矩阵达到降维的目的 ,性能上较同类的方法有较大的优势,但是识别精度仍有待提高。研究结果对于识别进行的优化具有一定的参考价值。 Symmetric Positive Definite (Symmetric Positive Definite, SPD) matrix can be very good to encode image information. In this paper, based on the network back and symmetric positive definite to encrypt the image recognition research. Through analyzing standard database set experiment, puts forward the method to obtain the higher recognition accuracy, the points on the manifold projection to high dimensional kernel space, using nuclear identify classification analysis. This article Uses unsupervised method to obtain the projection matrix to achieve the purpose of dimension reduction, performance on a similar method has great advantage, but still needs to improve identification precision. The results of the study identify the optimization has a certain reference value.
作者 李文航
出处 《自动化技术与应用》 2017年第11期77-79,84,共4页 Techniques of Automation and Applications
基金 广东电网资助项目(编号210548)
关键词 对称正定 网络回溯 数据库 symmetric positive definite network back database
  • 相关文献

参考文献10

二级参考文献41

  • 1宋少群,朱永利,于红.基于图论与人工智能搜索技术的电网拓扑跟踪方法[J].电网技术,2005,29(19):75-79. 被引量:47
  • 2冉晓旻.IP反向追踪技术综述[J].计算机安全,2005(3):57-59. 被引量:2
  • 3龙启峰,陈岗,丁晓群,丁颖,马春生,黄文英.基于面向对象技术的电力网络拓扑分析新方法[J].电力系统及其自动化学报,2005,17(1):73-77. 被引量:17
  • 4林济铿,覃岭,罗萍萍.基于图形建模的电力系统拓扑分析新方法[J].电力系统自动化,2005,29(22):54-59. 被引量:38
  • 5刘善阳,双锴.基于源路径隔离引擎的跨域溯源扩展[EB/OL], [2011-12-28] [2015-02-20]. http://www. paper,edu. cn/html/releasepaper/2011/12/788.
  • 6VUAYALAKSHMI M, SHALINIE S M. Single PacketICMP Traceback Technique using Router Interface [ J ].Journal of information science and engineering, 2014,30(6): 1673-1694.
  • 7ZARGAR S T,JOSHI J, TIPPER D. A survey of defensemechanisms against distributed denial of service ( DDoS )flooding attacks [ J ]. Communications Surveys & Tutori-als, IEEE, 2013, 15(4) : 2046-2069.
  • 8KHAq~FAK S, RAMY N R, KHAN K R, et al. A taxon- omy of botnet behavior, detection, and defense [ J ]. Communications Surveys & Tutorials, IEEE, 2014, 16 (2) : 898-924.
  • 9KUZNETSOV V,SANDSTRoM H,SIMKI A. An Evalu-ation of Different IP Traceback Approaches [ C ]// Pro-ceedings of the 4th International Conference on Informa-tion and Communications Security Springer-Verlag, Ber-lin :Springer Berlin Heidelberg,2002 : 37 -48.
  • 10SHAHBAHRAMI A, BAHRAMPOUR R, ROSTAMI M S’et al. Evaluation of Huffman and arithmetic algorithms formultimedia compression standards[ J]. 2011,1 (4) :34-47.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部