Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Power System Technology》 2011-04
Add to Favorite Get Latest Update

A Hybrid Security Situation Prediction Model for Information Network Based on Support Vector Machine and Particle Swarm Optimization

GAO Kunlun1,Liu Jianming2,XU Ruzhi3,WANG Yufei3,LI Yikang3(1.Information & Communication Department of China Electric Power Research Institute,Hardian District,Beijing 100192,China; 2.State Grid Information & Telecommunication Company Limited,Xuanwu District,Beijing 100761,China; 3.School of Control and Computer Engineering,North China Electric Power University,Changping District,Beijing 102206,China)  
A security situation prediction model for information network based on support vector machine(SVM) and particle swarm optimization(PSO) is proposed.By use of sliding window,in the proposed model a continuous time series that is partially linearly dependent is constructed by security situation values sampled from original discrete time monitoring points,and taking the time series as the sample set of security situation data the SVM is trained to generate a prediction model.During the training of SVM,the PSO algorithm is used to search for the optimal training parameters of SVM to reduce the blindness in the selection of SVM parameters and improve precision of prediction.Through the experiments based on on-site installation and monitoring data of a lot of power enterprise information networks,the effectiveness of the proposed security situation prediction model is verified.
【Fund】: 国家电网公司科技项目(B11-09-109)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 TAO Jia1,SHEN Hong-yan1,GAO Guan-dong2(1.College of Information Science and Technology,Agricultural University of Hebei,Baoding 071000,China; 2.Department of Information and Management,Central Institute for Correctional Police,Baoding 071000,China);A novel forestry investment forecast method based on improved support vector machine[J];Journal of Agricultural University of Hebei;2012-04
2 LI Hongze,GUO Sen,WANG Bao(School of Economics and Management,North China Electric Power University,Changping District,Beijing 102206,China);Evaluation on Power Customer Value Based on Ants Colony Clustering Algorithm Optimized by Genetic Algorithm[J];Power System Technology;2012-12
3 XU Ruzhi1,WANG Yufei2(1.School of Control and Computer Engineering,North China Electric Power University,Changping District,Beijing 102206,China;2.Department of Information & Communication,China Electric Power Research Institute,Haidian District,Beijing 100192,China);A Study on Electric Power Information Network-Oriented Security Situation Awareness[J];Power System Technology;2013-01
4 CHEN Daojun1,GONG Qingwu1,JIN Zhaoyi2,ZHANG Jing1,WANG Dingmei3(1.School of Electrical Engineering,Wuhan University,Wuhan 430072,Hubei Province,China; 2.Nari-relays Electric Co.Ltd.,Nanjing 211100,Jiangsu Province,China; 3.Wind Power Center of Gansu Electric Power Corporation,Lanzhou 730050,Gansu Province,China);Short-Term Wind Power Prediction Based on Support Vector Regression Machine Optimized by Adaptive Disturbance Quantum-Behaved Particle Swarm Optimization[J];Power System Technology;2013-04
5 XU Ruzhi;WANG Jing;ZHU Shaomin;XU Ruihui;School of Control and Computer Engineering, North China Electrical Power University;Beijing Electric Power Company;;A Boosting Algorithm Based Method to Predict Cyber-Threats Situation of Power Information Network[J];Power System Technology;2013-10
6 WANG Yufei;ZHAO Ting;LI Shaoyu;ZHAO Baohua;LI Yujie;Department of Information & Communication,China Electric Power Research Institute, Haidian District;Gansu Electric Power Corporation;;An Intrusion Detection Method for Electric Power Information Network Based on Improved Minimum Enclosing Ball Vector Machine[J];Power System Technology;2013-09
7 ZENG Bin1,ZHONG Ping2(1.Jiangxi University of Science and technology,Ganzhou Jiangxi 341000,China; 2.Electrical Engineering and Automation of Jiangxi University of Science and Technology,Ganzhou Jiangxi 341000,China);Simulation Study on Network Security Situation Forecast[J];Computer Simulation;2012-05
8 GAO Weidong,WANG Zhengshuai(School of Surveying & Mapping,Jiangsu Normal University,Xuzhou 221116,China);Forecast of inrushed water volume grade from coal floor based on support vector machine with particle swarm optimization[J];Coal Geology & Exploration;2012-06
9 WANG Bin,WANG Chao,LI Jing(College of Information Science & Electronic Technology,Jiamusi University,Jiamusi,Heilongjiang 154007,China);A Big Difference for Network Anomaly Data Feature Detection Algorithm of the Simulation Analysis[J];Computer Simulation;2013-08
10 SHI Mei;Tianjin University of Science&Technology;Tianjin information center;;Research and Simulation of Weak Network Attack Signal Effective Detection Method[J];Computer Simulation;2014-05
【Citations】
Chinese Journal Full-text Database 10 Hits
1 Li Xiongwei1,2 Zhou Xiyuan1 Yang Yixian21(The 54th Research Institute of China Electronics TechnologyGroup Corporation,Shijiazhuang 050002)2(Information Security Center,Beijing University of Posts and Telecommunication,Beijing 100876);Study on the Evaluation Methods of the Attack Effect of Network Based on AHP[J];Computer Engineering and Applications;2005-24
2 REN Wei,JIANG Xing-hao,SUN Tan-feng (School of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200030,China);RBFNN-based Prediction of Networks Security Situation[J];Computer Engineering and Applications;2006-31
3 WANG Hui-Qiang LAI Ji-Bao ZHU Liang LIANG Ying (College Computer Science & Technology, Harbin Engineering University, Harbin 150001);Survey of Network Situation Awareness System[J];Computer Science;2006-10
4 ZHANG Xiang,HU Changzhen,LIU Shenghang,TANG Chenghua(Computer Network Countermeasure Technology Laboratory,Beijing Institute of Technology,Beijing 100081);Research on Network Attack Situation Forecast Technique Based on Support Vector Machine[J];Computer Engineering;2007-11
5 DENG Xin, MENG Luoming (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876);Analysis of Alarm Correlation Based on Bayesian Learning[J];Computer Engineering;2007-12
6 DENG Wan-Yu1)ZHENG Qing-Hua1)CHEN Lin2)XU Xue-Bin1)1)(Ministry of Education Key Laboratory for Intelligent Networks and Network Security,Department of Computer Science and Technology,Xi'an Jiaotong University,Xi'an 710049)2)(Department of Computer Science and Technology,Xi'an University of Posts & Telecommunications,Xi'an 710121);Research on Extreme Learning of Neural Networks[J];Chinese Journal of Computers;2010-02
7 WANG Jin-dong,SHEN Liu-qing,WANG Kun,WANG Na(Institute of Electronic Technology,Information Engineering University,Zhengzhou Henan 450004,China);Network security status forecasting and its application in intelligent defense[J];Journal of Computer Applications;2010-06
8 CHEN Xiu-Zhen1+, ZHENG Qing-Hua1, GUAN Xiao-Hong1,2, LIN Chen-Guang1 1(State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi’an Jiaotong University, Xi’an 710049, China) 2(Center for Intelligent and Networked Systems, Tsinghua University, Beijing 100084, China);Quantitative Hierarchical Threat Evaluation Model for Network Security[J];Journal of Software;2006-04
9 CHEN Yong-qiang, LIU Kai-pei (School of Electrical Engineering, Wuhan University, Wuhan 430072, Hubei Province, China);A Condition Monitoring Method of Generators Based on RBF Dynamic Threshold Model[J];Proceedings of the CSEE;2007-26
10 YANG Geng-huang,WEN Bo-ying (College of Information and Electrical Engineering,China Agricultural University,Haidian District,Beijing 100083,China);Identification of Power Quality Disturbance Based on QPSO-ANN[J];Proceedings of the CSEE;2008-10
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WU Di1,2,HE Zhao-xiang1,3,ZHAO Xiao-gang1,YIN Fu-liang1,LI Ming2 (1.School of Electronics and Information Engineering,Dalian University of Technology,Dalian 116023,Liaoning,China;2.Shenyang Aircraft Design and Research Institute,China Aviation Industry Corporation I,Shenyang 110035 Liaoning,China;3.Xi'an Army Academy,Xi'an 710108,Shaanxi,China);Research and Implementation of Estimation Method for Tactical Internet Performance in a Rencounter Scenario[J];Acta Armamentarii;2008-09
2 LI Bao-jun1,CHEN Wei1,LI Bao-long2(1.Xi'an Institution of Applied Optics,Xi'an 710065,Shaanxi,China;2.Xi'an Institution of Electronic Engineering,Xi'an 710100,Shaanxi,China);Research on Network Security Model of Tactical Internet[J];Acta Armamentarii;2010-S2
3 Zhang Xian Wang Hongli(Department of Automatic Control Engineering,The Second Artillery Engineering College,Xi'an 710025 China);Time series prediction using neuron-expanding regularized extreme learning machine[J];Journal of Beijing University of Aeronautics and Astronautics;2011-12
4 CHEN Tian-ping,QIAO Xiang-dong,ZHENG Lian-qing,LUO Yun-qian(Telecommunication Engineering Institute,Air Force Engineering University,Xi'an 710077,China);Application of Graph Theory in Threat Situation Analysis of Network Security[J];Journal of Beijing University of Posts and Telecommunications;2009-01
5 CUI Zhong-jie1,YAO Shu-ping2,HU Chang-zhen2(1.School of Aerospace Science and Engineering,Beijing Institute of Technology,Beijing 100081,China;2.School of Software,Beijing Institute of Technology,Beijing 100081,China);Adaptive Modeling for Security Infrastructure Fault Response[J];北京理工大学学报(英文版);2008-01
6 CAO Yinyin(School of Information Science and Technology,Yangcheng Normal University,Yancheng 224002,China);Destroying Effect-controlling Model of Malicious Code Based on Network Confrontation[J];Journal of Chengdu University(Natural Science Edition);2010-02
7 GOU Guang-lei,CHENG Wei,NI Wei(School of Computer Science & Engineering,Chongqing Institute of Technology,Chongqing 400050,China);Risk Evaluation and Management for Network and Information Security[J];Journal of Chongqing Institute of Technology(Natural Science Edition);2007-09
8 WANG Yan-bo1,WANG Hui-qiang1,WANG Xiu-feng1,YU Ming2(1.College of Cumputer Science and Technology,Harbin Engineering University,Harbin 150001,China;2.Information & Computer Engineering College,NortheastForestry University,Harbin 150040,China);Design of multi-source and heterogeneous log sensor for network situational awareness[J];Transducer and Microsystem Technologies;2010-03
9 LI Jian-ping1,2,WANG Hui-qiang1,LU Ai-ping2,HAO Hong-liang3,FENG Guang-sheng1(1.College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China;2.School of Computer and Information Technology,Daqing Petroleum Institute,Daqing 163318,China;3.Logging & Testing services Company of Daqing Oilfield CO.LTD.,Daqing 163311,China);Quantification awareness method of network security situation based on conditional random fields[J];Transducer and Microsystem Technologies;2010-10
10 CHEN Li-sha ZHANG Feng-li WANG Juan (University of Electronic Science and Technology of China,Chengdu 610054);Establishment of An Index System of Assessment for Situation of Network Security[J];Journal of Chongqing University of Science and Technology(Natural Sciences Edition);2008-03
China Proceedings of conference Full-text Database 10 Hits
1 HE Li JIAYan LI Ai-Ping YE Yun (School of Computer Science,National University of Defense Technology, Changsha 410073,China);Research on Network Vulnerability Index Calculation Based on National Vulnerability Database[A];[C];2009
2 XIA Bing~(1,2),XIA~1 Minjie,XU~1 Fei,ZHENG Qiusheng~(1,2) (1.School of Computer Science,Zhongyuan University of Technology,Zhengzhou 450007,Henan China; 2.Zhengzhou Key Lab of Computer Network Security Assessment Department,Zhengzhou 450007,Henan China);Research and Design on Control Center of Distributed Security Assessment System[A];[C];2010
3 LI Yuan-zheng,HAN Wei-hong,ZHANG Jian-feng (School of Computer,National University of Defense Technology,Changsha Hunan 410073,China);Research on Configuration of Index System of E-government Extranet Security[A];[C];2011
4 CHEN Tao,GONG Zheng Hu,ZHUO Ying (School of Computer,National University of Defense Technology,Chang Sha 410073);Research on the Model of Integrate Network Situation Analysis[A];[C];2009
5 SUN Ning FU Xiang-dong ZHANG Sheng-cai (Modern Educational Technology Center,Gansu Institute of Political Science and Law,Lanzhou,730070);Research of Situation Evaluation on Campus Network Security[A];[C];2010
6 Wangze liutong;Network security situation awareness of the importance[A];[C];2012
7 Liu Yaqiu + , Wei Yingying, Jing Weipeng and Wu Qu College of Information and Computer Engineering Northeast Forestry University Harbin, China;Modeling and Simulation Comparison of Real-time Monitoring of Particleboard Hot-Pressing Thermal Conductivity[A];[C];2012
8 Aiping Lu + and Jianping Li School of Computer and Information Technology, Northeast Petroleum University Daqing, China, 163318;A Method of Data Preprocessing for Network Security Situational Awareness Based on Conditional Random Fields[A];[C];2012
9 ZHONG Li (PLA Information Security Test and Evaluation Centre,Beijing 100016,China);The Construction of Active Network Security Situation Awareness Framework[A];[C];2013
10 Che Xun~1 Zhu Minhao~2 Wang Mingjia Cao Zuqing~(44) 1 NR Electric Co Ltd 2 Chain Realtime Detabase Co Ltd Sgepri 3 Nanjing Huaneng Power Plant 4 Southeast University;Synopasis and Discussion About Calculation Methods of Steam Turbine's Exhaust Enthalpy[A];[C];2013
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Wang Guoquan,Feng Guangwen(Xinjiang Radiation Environmental Supervising Station,Urumqi 830011,China);The Application of Entropy Weight TOPSIS Method for Optimal Choice in Low Radiological Decorative Building Materials[J];Environmental Science and Management;2011-01
2 LIANG Ying,WANG Huiqiang,LIU Lei(College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China);Method of Quantifying Network Security Situational Awareness Based on Analysis of Network Service States[J];Journal of Beijing Jiaotong University;2009-02
3 DUAN Qun-jie1,2,ZHANG Ming-jun1(1.College of Mechanical and Electrical Engineering,Harbin Engineering University,Harbin 150001,Heilongjiang,China;2.College of Mechanical Engineering,Jiamusi University,Jiamusi 154007,Heilongjiang,China);Design of Motion Planner Based on Subtraction Clustering and Adaptive Fuzzy Neural Network[J];Acta Armamentarii;2007-12
4 Fang Ke Ma Ping Yang Ming(Control & Simulation Center,Harbin Institute of Technology,Harbin 150080,China);AHP ultra weight for simulation credibility evaluation[J];Journal of Beijing University of Aeronautics and Astronautics;2011-05
5 YANG Ciyin1,ZHANG Jianping1,GUO Lihong1,CAO Lihua1,2(1.Changchun Institute of Optics,Fine Mechanics and Physics,Changchun 130033;2.Changchun University of Science and Technology,Changchun 130022);Infrared Signature Measurement of TargetsBased on Atmospheric Correction[J];Journal of Changchun University of Science and Technology(Natural Science Edition);2010-04
6 YI Xiao-mei,WU Peng,LIU Li-juan,DAI Dan(School of Information Engineering,Zhejiang Agriculture and Forestry University, Hangzhou 311300,China);Research on WSNs intrusion detection technology based on PSO-RBF[J];Transducer and Microsystem Technologies;2011-09
7 CHEN Li-sha ZHANG Feng-li WANG Juan (University of Electronic Science and Technology of China,Chengdu 610054);Establishment of An Index System of Assessment for Situation of Network Security[J];Journal of Chongqing University of Science and Technology(Natural Sciences Edition);2008-03
8 LUO Dong1,QIN Zhi-guang2,MA Xin-xin2 (1. School of Management,University of Electronic Science and Technology of China Chengdu 610054; 2. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 610054);Dynamic Identity Authentication Policy of E-Procurement System P2DR Research[J];Journal of University of Electronic Science and Technology of China;2007-06
9 DING Shi-fei1,2,QI Bing-juan1,and TAN Hong-yan3(1.School of Computer Science and Technology,China University of Mining and Technology Xuzhou Jiangsu 221116; 2.Key Laboratory of Intelligent Information Processing,Institute of Computing Technology,Chinese Academy of Science Haidian Beijing 100080; 3.High Performance Network Laboratory,Institute of Acoustic,Chinese Academy of Science Haidian Beijing 100190);An Overview on Theory and Algorithm of Support Vector Machines[J];Journal of University of Electronic Science and Technology of China;2011-01
10 ZANG Shu-ying,ZHANG Ce,ZHANG Li-juan,ZHANG Yu-hong(College of Geographical Sciences,Harbin Normal University,Harbin,Heilongjiang 150025,China);Wetland Remote Sensing Classification Using Support Vector Machine Optimized With Genetic Algorithm: A Case Study in Honghe Nature National Reserve[J];Scientia Geographica Sinica;2012-04
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 XU Ruzhi;WANG Jing;ZHU Shaomin;XU Ruihui;School of Control and Computer Engineering, North China Electrical Power University;Beijing Electric Power Company;;A Boosting Algorithm Based Method to Predict Cyber-Threats Situation of Power Information Network[J];Power System Technology;2013-10
2 SUN Weiqing;WANG Chengmin;ZHANG Yan;School of Optical-Electrical and Computer Engineering, University of Shanghai for Science & Technology;School of Electronic Information and Electrical Engineering, Shanghai Jiaotong University;;A Power Grid Planning Method Considering Transmission Line Load Rate Constraint and Flexible Cost Evaluation Within Full Planning Cycle[J];Power System Technology;2013-10
3 WANG Yufei;ZHAO Ting;LI Shaoyu;ZHAO Baohua;LI Yujie;Department of Information & Communication,China Electric Power Research Institute, Haidian District;Gansu Electric Power Corporation;;An Intrusion Detection Method for Electric Power Information Network Based on Improved Minimum Enclosing Ball Vector Machine[J];Power System Technology;2013-09
4 LI Xiaojie;YUAN Jie;CHEN Chao;Chinese Medicine College,Guangdong Pharmaceutical University;;Application of multi-objective optimization method on Chinese medicine compositionactivity relationship analysis[J];Journal of Guangdong Pharmaceutical University;2014-03
5 LIN Hong;SUN Licheng;CHANG Xiqiang;Electric Engineering College, Xinjiang University;Xinjiang Electric Power Dispatching Center;;A Probabilistic Model to Simulate Wind Power Output Fluctuation of a Certain Wind Farm Cluster in Xinjiang Region[J];Power System Technology;2014-06
6 ZHAO Bing;GAO Xin;ZHAI Feng;CHEN Peng;WANG Xin;China Electric Power Research Institute;School of Automation, Beijing University of Posts and Telecommunications;;Mutual Authentication Protocol for Electricity Consumption Information Acquisition System[J];Power System Technology;2014-09
7 ZHAO Li;HOU Xingzhe;HU Jun;FU Hong;SUN Hongliang;Chongqing Electric Power Company;;Improved K-Means Algorithm Based Analysis on Massive Data of Intelligent Power Utilization[J];Power System Technology;2014-10
8 LI Fangwei;ZHENG Bo;ZHU Jiang;ZHANG Haibo;Chongqing Key Lab of Mobile Communications Technology,Chongqing University of Posts and Telecommunications;;A method of network security situation prediction based on AC-RBF neural network[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition);2014-05
9 SU Sheng;WU Changjiang;MA Jun;ZENG Xiangjun;Hunan Province Key Laboratory of Smart Grids Operation and Control (Changsha University of Science and Technology);;Attacker's Perspective Based Analysis on Cyber Attack Mode to Cyber-Physical System[J];Power System Technology;2014-11
10 DUAN Jianmin;WANG Zhixin;WANG Chengmin;ZHOU Qinyong;HAN Jiahui;School of Electronic, Information and Electric Engineering, Shanghai Jiao Tong University;China Electric Power Research Institute;;Renewable Power Planning Considering Carbon Emission Reduction Benefits[J];Power System Technology;2015-01
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 LI Qi~1,CHAM Yew Thean~2,AU Wing Kong Eric~2,JIA Jun-bo~(2,3),HAN Ming~4(1.School of Electrical Engineering,Southwest Jiaotong University,Chengdu,Sichuan 610031,China;2.School ofEngineering,Temasek Polytechnic,Singapore 529757,Singapore;3.School of Electrical & Electronic Engineering,Nanyang Technological University,639798,Singapore;4.Gas Hub Technology Pte.Ltd.,567761,Singapore);Investigation of electrical response of PEMFC[J];Battery Bimonthly;2006-05
2 ZHONG Zhi-dan,ZHU Xin-jian,CAO Guang-yi(Fuel Cell Research Institute,Shanghai Jiao Tong University,Shanghai 200030,China);Fuel cell modeling research based on simulated annealing algorithm[J];Battery Bimonthly;2006-05
3 LI Qi1,2,CHEN Wei-rong1,JIA Jun-bo2,3,CHAM Yew Thean2(1.School of Electric Engineering,Southwest Jiaotong University,Chengdu,Sichuan 610031,China;2.School of Engineering,Temasek Polytechnic,529757,Singapore;3.School of Electrical & Electronic Engineering,Nanyang Technological University,639798,Singapore);Fuel cell model optimization based on improved PSO algorithm[J];Battery Bimonthly;2007-06
4 ZHAO Chun-na, PAN Feng, XUE Ding-yu(School of Information Science & Engineering, Northeastern University, Shenyang 110004, China. );H_∞ Controller Design for Fractional Order System[J];JOURNAL OF NORTHEASTERN UNIVERSITY;2006-11
5 OUYANG Sen, WANG Jianhua, GENG Yingsan, SONG Zhengxiang, CHEN Degui, ZHANG Guiqing(School of Electircal Engineering, Xian Jiaotong University, Xian 710049, China);Power quality classification based on wavelet transform and neural network[J];Advanced Technology of Electrical Engineering and Energy;2003-03
6 Qu Zhao1 Lai Xu2 Zhu Jianlin3 (1. Changsha University Changsha 410003 China 2. Wuhan University Wuhan 430072 China 3. Xiangtan University Xiangtan 411105 China);Design and Implementation of On-line State Monitoring and Fault Diagnosis Network System for a Hydroelectric Generating Set[J];Transactions of China Electrotechnical Society;2005-03
7 Li Dahu1 Jiang Quanyuan2 Cao Yijia2 (1. Huazhong University of Science and Technology Wuhan 430074 China 2. Zhejiang University Hangzhou 310027 China);Clustering Based on Support Vector Regression Model and Its Application in Power System Transient Stability Prediction[J];Transactions of China Electrotechnical Society;2006-07
8 Yuan Jinsha,Zhang Yinghui,Niu lixian,Liu Xianwei (School of Electrical and Electronic Engineering,North China Electric Power University,Baoding 071003,China);Short-term Load Forecasting Method Based on SOFM and SVR[J];Electric Power Science and Engineering;2009-08
9 Li Bijun1 ,Xue Yusheng2 ,Gu Jinwen2 ,H an Zhenxiang1 1.Zhejiang U niversity,Hangzhou 310027,China 2 .Nanjing Automation Research Institute,Nanjing2 10003 ,China;IDENTIFICATION OF RESIDUALS CONTAMINATION BASED ON SIGNS OF MEASUREMENT RESIDUALS[J];AUTOMATION OF ELECTRIC POWER SYSTEMS;2000-05
10 Wang Jing1 ,Shu H ongchun2 ,Chen X ueyun1 1.Harbin Institute of Technology,Harbin15 0 0 0 1,China 2 . Kunm ing U niversity of Science and Technology,Kunm ing 6 5 0 0 0 1,China;SURGE DISTURBANCE DETECTION USING WAVELET-BASED NEURAL NETWORK[J];Automation of Electric Power Systems;2002-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved