Network security prediction method based on dynamic fuzzy clustering and gray neural network
A gray neural network, dynamic fuzzy technology, applied in the computer field, can solve the problems of local minimization, slow convergence speed, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] This embodiment further describes step S4, including the following steps:
[0067] S41. Perform normalization processing on the real number genetic coding system of the individual, wherein, x pj represents the individual x p The genetic coding system of the jth position of the individual x after normalization p The gene code system of the jth position of is expressed as:
[0068]
[0069] S42. According to the normalized operation, by The formula constructs the fuzzy similarity matrix R among individuals;
[0070] S43. By looking for the minimum transitive closure of the fuzzy matrix R, transform it into a fuzzy equivalent matrix T according to the fuzzy similarity matrix R established in the upper layer, that is, obtain the corresponding fuzzy equivalent matrix T, and use T to cluster the population, Compare the similarity coefficient β with the equivalence coefficient between each pair of individuals, if β≤T pq , then the individual x p and x q Divided into...
Embodiment 2
[0084] BP neural network structure such as figure 2 , to establish a three-layer BP network, where l i is the output of the i-th node in the input layer, H i is the output of the i-th node in the hidden layer, O i is the output of the i-th node in the output layer, WIH ij Connect the weights between the i-th node in the input layer and the j-th node in the hidden layer, WHO ji is the connection weight between the jth node in the hidden layer and the ith node in the output layer.
[0085] S51. Initialize population P, including crossover scale, crossover probability, and mutation probability P m and for any WIH ij and WHO ji For initialization, real numbers are used for encoding, and the initialization population is 30.
[0086] S52. Calculate each individual evaluation function and sort it, according to The probability value selects network individuals, where f i is the fitness value of individual i, which can be measured by the sum of squared errors E, namely:
[00...
Embodiment 3
[0095] This embodiment further describes step S8, including the following steps:
[0096] S81. Data preprocessing, determining the number of samples required for building a model, namely:
[0097]
[0098] Finds the first-order cumulative sequence.
[0099] S82. Determine the system behavior sequence, from Choose one of the following bounded sequences
[0100] S83, determine the relevant factor sequence, select the lower bound sequence (or intermediate value sequence or upper bound sequence) of all relevant factor sequences as the relevant factor sequence, such as
[0101] S84. Use the gray relational analysis method to determine the influence of relevant factors on the development of system behavior sequence variables, and determine N v value, build GM(0,N v ) model and solve it, and the corresponding predicted value is:
[0102] S85, re-select relevant factors, repeat steps S82, S83, and record the corresponding predicted value as:
[0103]
[0104] in, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


