A new grey forecasting model based on BP neural network and Markov chain was proposed. In order to combine the grey forecasting model with neural network, an important theorem that the grey differential equation is eq...A new grey forecasting model based on BP neural network and Markov chain was proposed. In order to combine the grey forecasting model with neural network, an important theorem that the grey differential equation is equivalent to the time response model, was proved by analyzing the features of grey forecasting model(GM(1,1)). Based on this, the differential equation parameters were included in the network when the BP neural network was constructed, and the neural network was trained by extracting samples from grey system's known data. When BP network was converged, the whitened grey differential equation parameters were extracted and then the grey neural network forecasting model (GNNM(1,1)) was built. In order to reduce stochastic phenomenon in GNNM(1,1), the state transition probability between two states was defined and the Markov transition matrix was established by building the residual sequences between grey forecasting and actual value. Thus, the new grey forecasting model(MNNGM(1,1)) was proposed by combining Markov chain with GNNM(1,1). Based on the above discussion, three different approaches were put forward for forecasting China electricity demands. By comparing GM(1, 1) and GNNM(1,1) with the proposed model, the results indicate that the absolute mean error of MNNGM(1,1) is about 0.4 times of GNNM(1,1) and 0.2 times of GM(I, 1), and the mean square error of MNNGM(1,1) is about 0.25 times of GNNM(1,1) and 0.1 times of GM(1,1).展开更多
The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a...The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.展开更多
A new combined model is proposed to obtain predictive data value applied in state estimation for radial power distribution networks. The time delay part of the model is calculated by a recursive least squares algorith...A new combined model is proposed to obtain predictive data value applied in state estimation for radial power distribution networks. The time delay part of the model is calculated by a recursive least squares algorithm of system identification, which can gradually forget past information. The grey series part of the model uses an equal dimension new information model (EDNIM) and it applies 3 points smoothing method to preprocess the original data and modify remnant difference by GM(1,1). Through the optimization of the coefficient of the model, we are able to minimize the error variance of predictive data. A case study shows that the proposed method achieved high calculation precision and speed and it can be used to obtain the predictive value in real time state estimation of power distribution networks.展开更多
The grey system theory and the artificial neural network technology were applied to predict the sewing technical condition. The representative parameters, such as needle, stitch, were selected. Prediction model was es...The grey system theory and the artificial neural network technology were applied to predict the sewing technical condition. The representative parameters, such as needle, stitch, were selected. Prediction model was established based on the different fabrics’ mechanical properties that measured by KES instrument. Grey relevant degree analysis was applied to choose the input parameters of the neural network. The result showed that prediction model has good precision. The average relative error was 4.08% for needle and 4.25% for stitch.展开更多
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor...To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.展开更多
Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, g...Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, grey theory, and chaos theory, this paper proposes a novel combined model, wavelet-grey-chaos (WGC), for network traffic prediction. In the WGC model, we develop a time series decomposition method without the boundary problem by modifying the standard à trous algorithm, decompose the network traffic into two parts, the residual part and the burst part to alleviate the accumulated error problem, and employ the grey model GM(1,1) and chaos model to predict the residual part and the burst part respectively. Simulation results on real network traffic show that the WGC model does improve prediction accuracy.展开更多
In the network field,Wireless Sensor Networks(WSN)contain prolonged attention due to afresh augmentations.Industries like health care,traffic,defense,and many more systems espoused the WSN.These networks contain tiny ...In the network field,Wireless Sensor Networks(WSN)contain prolonged attention due to afresh augmentations.Industries like health care,traffic,defense,and many more systems espoused the WSN.These networks contain tiny sensor nodes containing embedded processors,TinyOS,memory,and power source.Sensor nodes are responsible for forwarding the data packets.To manage all these components,there is a need to select appropriate parameters which control the quality of service of WSN.Multiple sensor nodes are involved in transmitting vital information,and there is a need for secure and efficient routing to reach the quality of service.But due to the high cost of the network,WSN components have limited resources to manage the network.There is a need to design a lightweight solution that ensures the quality of service in WSN.In this given manner,this study provides the quality of services in a wireless sensor network with a security mechanism.An incorporated hybrid lightweight security model is designed in which random waypoint mobility(RWM)model and grey wolf optimization(GWO)is used to enhance service quality and maintain security with efficient routing.MATLAB version 16 andNetwork Stimulator 2.35(NS2.35)are used in this research to evaluate the results.The overall cost factor is reduced at 60%without the optimization technique and 90.90%reduced by using the optimization technique,which is assessed by calculating the signal-to-noise ratio,overall energy nodes,and communication overhead.展开更多
Wind-power (WP) estimation is necessary for power system in several operations, which are as the optimal power flow between conventional units and wind farms, generators scheduling, and electricity market bidding. E...Wind-power (WP) estimation is necessary for power system in several operations, which are as the optimal power flow between conventional units and wind farms, generators scheduling, and electricity market bidding. Estimating the output power of a wind energy conversion unit (WEC) mainly bases on the incident wind speed at the unit site by using the power characteristic curve. In addition, several time-series models have been using in wind speed forecasting. These models are characterized with requiring a large set of data. In order to prevent from the wind speed measurement and the need of a precise wind turbine model, an novel method basing on neural network and the grey predictor model GM (1,1) is proposed. Though the method, the estimating model can be built only by using the experimental data, which are obtained from the WP system in laboratory. The effectiveness of the estimating model is confirmed by the simulation results.展开更多
Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing r...Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing research focuses on the current situation evaluation, and seldom discusses the future prediction. Based on the historical research, an improved grey Verhulst model is put forward to predict the future situation. Aiming at the shortages in the prediction based on traditional Verhulst model, the adaptive grey parameters and equal- dimensions grey filling methods are proposed to improve the precision. The simulation results prove that the scheme is efficient and applicable.展开更多
The outbreak of hotspot in social network may contain complex dynamic genesis. Using user behavior data from hotspots in social network, we study how different user groups play different roles for a hotspot topic. Fir...The outbreak of hotspot in social network may contain complex dynamic genesis. Using user behavior data from hotspots in social network, we study how different user groups play different roles for a hotspot topic. Firstly, by analyzing users' behavior records, we mine group situation that promotes the hotspot.Several major attributions in a hotspot outbreak, such as individual, peer and group triggers, are defined formally according to the view-point of social identity, social interaction, retweet depth and opinion leader. Secondly,for the problem of the uneven and sparse data in each stage of hotspot topic's life cycle, we propose a dynamic influence model based on grey system to formalize the effect of different groups. Then the process of hotspot evolution driven by distinct crowd is showed dynamically. The experimental result confirms that the model is able not only to qualify users' influence on a hotspot topic but also to predict effectively an upcoming change in a hotspot topic.展开更多
In order to improve the accuracy of model for terminative temperature in steelmaking, it is necessary to predict and control before decarburization. Thus, an optimization neural network model of terminative temperatur...In order to improve the accuracy of model for terminative temperature in steelmaking, it is necessary to predict and control before decarburization. Thus, an optimization neural network model of terminative temperature in the process of dephosphorization by laying correlative degree weights to all input factors related was used. Then sim- ulation experiment of model newly established is conducted utilizing 210 data from a domestic steel plant. The results show that hit rate arrives at 56.45~~ when error is within plus or minus 5%, and the value is 100% when within ~10%. Comparing to the traditional neural network prediction model, the accuracy almost increases by 6. 839o//oo. Thus, the simulation prediction fits the real perfectly, which accounts for that neural network model for terminative tempera- ture based on grey theory can reflect accurately the practice in dephosphorization. Naturally, this method is effective and nraeticahle.展开更多
Purpose–Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks(MANETs).In such systems,the cooperation between nodes is one of the important principles being ...Purpose–Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks(MANETs).In such systems,the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols.Many existing works assume that mobile nodes will follow prescribed protocols without deviation.However,this is not always the case,because these networks are subjected to a variety of malicious attacks.Since there are various models of attack,trust routing scheme can guarantee security and trust of the network.The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.Design/methodology/approach–The proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’trust level,these trust levels are then used in the routing decision-making process.Findings–In order to prove the applicability of the proposed solution,extensive experiments were conducted to evaluate the efficiency of the proposed model,aiming at improving the network interaction quality,malicious node mitigation and enhancements of the system’s security.Originality/value–The proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory,where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics.Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security.展开更多
基金Project(70572090) supported by the National Natural Science Foundation of China
文摘A new grey forecasting model based on BP neural network and Markov chain was proposed. In order to combine the grey forecasting model with neural network, an important theorem that the grey differential equation is equivalent to the time response model, was proved by analyzing the features of grey forecasting model(GM(1,1)). Based on this, the differential equation parameters were included in the network when the BP neural network was constructed, and the neural network was trained by extracting samples from grey system's known data. When BP network was converged, the whitened grey differential equation parameters were extracted and then the grey neural network forecasting model (GNNM(1,1)) was built. In order to reduce stochastic phenomenon in GNNM(1,1), the state transition probability between two states was defined and the Markov transition matrix was established by building the residual sequences between grey forecasting and actual value. Thus, the new grey forecasting model(MNNGM(1,1)) was proposed by combining Markov chain with GNNM(1,1). Based on the above discussion, three different approaches were put forward for forecasting China electricity demands. By comparing GM(1, 1) and GNNM(1,1) with the proposed model, the results indicate that the absolute mean error of MNNGM(1,1) is about 0.4 times of GNNM(1,1) and 0.2 times of GM(I, 1), and the mean square error of MNNGM(1,1) is about 0.25 times of GNNM(1,1) and 0.1 times of GM(1,1).
文摘The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.
文摘A new combined model is proposed to obtain predictive data value applied in state estimation for radial power distribution networks. The time delay part of the model is calculated by a recursive least squares algorithm of system identification, which can gradually forget past information. The grey series part of the model uses an equal dimension new information model (EDNIM) and it applies 3 points smoothing method to preprocess the original data and modify remnant difference by GM(1,1). Through the optimization of the coefficient of the model, we are able to minimize the error variance of predictive data. A case study shows that the proposed method achieved high calculation precision and speed and it can be used to obtain the predictive value in real time state estimation of power distribution networks.
文摘The grey system theory and the artificial neural network technology were applied to predict the sewing technical condition. The representative parameters, such as needle, stitch, were selected. Prediction model was established based on the different fabrics’ mechanical properties that measured by KES instrument. Grey relevant degree analysis was applied to choose the input parameters of the neural network. The result showed that prediction model has good precision. The average relative error was 4.08% for needle and 4.25% for stitch.
文摘To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.
基金Project supported by National Basic Research Program of China (Grant Nos 2009CB320505 and 2009CB320504)National High Technology Research and Development Program of China (Grant Nos 2006AA01Z235, 2007AA01Z206 and 2009AA01Z210)
文摘Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, grey theory, and chaos theory, this paper proposes a novel combined model, wavelet-grey-chaos (WGC), for network traffic prediction. In the WGC model, we develop a time series decomposition method without the boundary problem by modifying the standard à trous algorithm, decompose the network traffic into two parts, the residual part and the burst part to alleviate the accumulated error problem, and employ the grey model GM(1,1) and chaos model to predict the residual part and the burst part respectively. Simulation results on real network traffic show that the WGC model does improve prediction accuracy.
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Collaboration Funding program grant code NU/RC/SERC/11/7。
文摘In the network field,Wireless Sensor Networks(WSN)contain prolonged attention due to afresh augmentations.Industries like health care,traffic,defense,and many more systems espoused the WSN.These networks contain tiny sensor nodes containing embedded processors,TinyOS,memory,and power source.Sensor nodes are responsible for forwarding the data packets.To manage all these components,there is a need to select appropriate parameters which control the quality of service of WSN.Multiple sensor nodes are involved in transmitting vital information,and there is a need for secure and efficient routing to reach the quality of service.But due to the high cost of the network,WSN components have limited resources to manage the network.There is a need to design a lightweight solution that ensures the quality of service in WSN.In this given manner,this study provides the quality of services in a wireless sensor network with a security mechanism.An incorporated hybrid lightweight security model is designed in which random waypoint mobility(RWM)model and grey wolf optimization(GWO)is used to enhance service quality and maintain security with efficient routing.MATLAB version 16 andNetwork Stimulator 2.35(NS2.35)are used in this research to evaluate the results.The overall cost factor is reduced at 60%without the optimization technique and 90.90%reduced by using the optimization technique,which is assessed by calculating the signal-to-noise ratio,overall energy nodes,and communication overhead.
文摘Wind-power (WP) estimation is necessary for power system in several operations, which are as the optimal power flow between conventional units and wind farms, generators scheduling, and electricity market bidding. Estimating the output power of a wind energy conversion unit (WEC) mainly bases on the incident wind speed at the unit site by using the power characteristic curve. In addition, several time-series models have been using in wind speed forecasting. These models are characterized with requiring a large set of data. In order to prevent from the wind speed measurement and the need of a precise wind turbine model, an novel method basing on neural network and the grey predictor model GM (1,1) is proposed. Though the method, the estimating model can be built only by using the experimental data, which are obtained from the WP system in laboratory. The effectiveness of the estimating model is confirmed by the simulation results.
基金the National Natural Science Foundation of China(No.60605019)
文摘Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing research focuses on the current situation evaluation, and seldom discusses the future prediction. Based on the historical research, an improved grey Verhulst model is put forward to predict the future situation. Aiming at the shortages in the prediction based on traditional Verhulst model, the adaptive grey parameters and equal- dimensions grey filling methods are proposed to improve the precision. The simulation results prove that the scheme is efficient and applicable.
基金supported by National Basic Research Program of China(973 program)(Grant No.2013CB3296-06)National Natural Science Foundation of China(Grant No.61272400)+6 种基金Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Ministry of Education of China and China Mobile Research Fund(Grant No.MCM20130351)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Wen Feng Foundation of CQUPT(Grant No.WF201403)Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Open Subject(Grant No.ITD-U13002/KX132600009)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The outbreak of hotspot in social network may contain complex dynamic genesis. Using user behavior data from hotspots in social network, we study how different user groups play different roles for a hotspot topic. Firstly, by analyzing users' behavior records, we mine group situation that promotes the hotspot.Several major attributions in a hotspot outbreak, such as individual, peer and group triggers, are defined formally according to the view-point of social identity, social interaction, retweet depth and opinion leader. Secondly,for the problem of the uneven and sparse data in each stage of hotspot topic's life cycle, we propose a dynamic influence model based on grey system to formalize the effect of different groups. Then the process of hotspot evolution driven by distinct crowd is showed dynamically. The experimental result confirms that the model is able not only to qualify users' influence on a hotspot topic but also to predict effectively an upcoming change in a hotspot topic.
基金Sponsored by National Key Technology Research and Development Program in 11th Five-Year Plan of China (2006BAE03A07)
文摘In order to improve the accuracy of model for terminative temperature in steelmaking, it is necessary to predict and control before decarburization. Thus, an optimization neural network model of terminative temperature in the process of dephosphorization by laying correlative degree weights to all input factors related was used. Then sim- ulation experiment of model newly established is conducted utilizing 210 data from a domestic steel plant. The results show that hit rate arrives at 56.45~~ when error is within plus or minus 5%, and the value is 100% when within ~10%. Comparing to the traditional neural network prediction model, the accuracy almost increases by 6. 839o//oo. Thus, the simulation prediction fits the real perfectly, which accounts for that neural network model for terminative tempera- ture based on grey theory can reflect accurately the practice in dephosphorization. Naturally, this method is effective and nraeticahle.
文摘Purpose–Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks(MANETs).In such systems,the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols.Many existing works assume that mobile nodes will follow prescribed protocols without deviation.However,this is not always the case,because these networks are subjected to a variety of malicious attacks.Since there are various models of attack,trust routing scheme can guarantee security and trust of the network.The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.Design/methodology/approach–The proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’trust level,these trust levels are then used in the routing decision-making process.Findings–In order to prove the applicability of the proposed solution,extensive experiments were conducted to evaluate the efficiency of the proposed model,aiming at improving the network interaction quality,malicious node mitigation and enhancements of the system’s security.Originality/value–The proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory,where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics.Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security.