Journal of Shandong University(Engineering Science) ›› 2019, Vol. 49 ›› Issue (2): 88-95.doi: 10.6040/j.issn.1672-3961.0.2018.342
• Machine Learning & Data Mining • Previous Articles Next Articles
Fang GUO1(),Lei CHEN1,2,3,Ziwen YANG1
CLC Number:
1 |
QU H , MA W T , ZHAO J H , et al. Prediction method for network traffic based on maximum correntropy criterion[J]. China Communications, 2013, 10 (1): 134- 145.
doi: 10.1109/CC.2013.6457536 |
2 | 田中大, 李树江, 王艳红, 等. 高斯过程回归补偿ARIMA的网络流量预测[J]. 北京邮电大学学报, 2017, 40 (6): 65- 73. |
TIAN Zhongda , LI Shujiang , WANG Yanhong , et al. Network traffic prediction based on ARIMA with gaussian process regression compensation[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40 (6): 65- 73. | |
3 | AZZOUNI A, PUJOLLE G. A long short-term memory recurrent neural network framework for network traffic matrix prediction[EB/OL]. (2017-06-08)[2018-04-15]. https://arxiv.org/abs/1705.05690. |
4 |
LANER M , SVOBODA P , RUPP M . Parsimonious fitting of long-range dependent network traffic using A RMA models[J]. IEEE Communications Letters, 2013, 17 (12): 2368- 2371.
doi: 10.1109/LCOMM.2013.102613.131853 |
5 | YADAV R K , BALAKRISHNAN M . Comparative evaluation of ARIMA and ANFIS for modeling of wireless network traffic time series[J]. Eurasip Journal on Wireless Communications & Networking, 2014, 2014 (1): 8- 15. |
6 |
KATRIS C , DASKALAKI S . Comparing forecasting approaches for Internet traffic[J]. Expert Systems with Applications, 2015, 42 (21): 8172- 8183.
doi: 10.1016/j.eswa.2015.06.029 |
7 | NIE L S , JIANG D D , GUO L , et al. Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks[J]. Journal of Network & Computer Applications, 2016, 76 (C): 16- 22. |
8 | LIANG Y , QIU L . Network traffic prediction based on SVR improved by chaos theory and ant colony optimization[J]. International Journal of Future Generation Communication & Networking, 2015, 8 (1): 484- 488. |
9 | Xiang C , Qu P , Qu X . Network traffic prediction based on MK-SVR[J]. Journal of Information & Computational Science, 2015, 12 (8): 3185- 3197. |
10 |
HONG W C . Application of seasonal SVR with chaotic immune algorithm in traffic flow forecasting[J]. Neural Computing and Applications, 2012, 21 (3): 583- 593.
doi: 10.1007/s00521-010-0456-7 |
11 | LV Y , DUAN Y , KANG W , et al. Traffic flow prediction with big data: a deep learning approach[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16 (2): 865- 873. |
12 | 江露琪, 孙文胜. 基于改进的BP神经网络的网络流量预测模型[J]. 通信技术, 2017, 50 (1): 68- 73. |
JIANG Luqi , SUN Wensheng . Research and implementation of network traffic prediction based on modified BP neural network[J]. Communication Technology, 2017, 50 (1): 68- 73. | |
13 | SHAO H X, SOONG B H. Traffic flow prediction with Long Short-Term Memory Networks (LSTMs)[C]// Region 10 conference (TENCON 2016). Singapore: IEEE, 2017: 2986-2989. |
14 | LUO X , ZHOU W , WANG W , et al. Attention-based relation extraction with bidirectional gated recurrent unit and highway network in the analysis of geological data[J]. IEEE Access, 2018, 27 (6): 5705- 5715. |
15 | FU R, ZHANG Z, LI L. Using LSTM and GRU neural network methods for traffic flow prediction[C]//In Proceedings of the Youth Academic Annual Conference of Chinese Association of Automation (YAC). Wuhan: IEEE, 2016: 324-328. |
16 |
ZHOU G B , WU J , ZHANG C L , et al. Minimal gated unit for recurrent neural networks[J]. International Journal of Automation and Computing, 2016, 13 (3): 226- 234.
doi: 10.1007/s11633-016-1006-2 |
17 |
HOCHREITER S , SCHMIDHUBER J . Long short-term memory[J]. Neural Computation, 1997, 9 (8): 1735- 1780.
doi: 10.1162/neco.1997.9.8.1735 |
18 |
BENGIO Y , SIMARD P , FRASCONI P . Learning long-term dependencies with gradient descent is difficult[J]. IEEE transactions on neural networks, 1994, 5 (2): 157- 166.
doi: 10.1109/72.279181 |
19 | CHUNG J, GULCEHRE C, CHO K H, et al. Empirical evaluation of gated recurrent neural networks on sequence modeling[EB/OL]. (2014-12-11)[2018-04-15]. https://arxiv.org/abs/1412.3555. |
20 |
LAKHINA A , PAPAGIANNAKI K , CROVELLA M , et al. Structural analysis of network traffic flows[J]. Acm Sigmetrics Performance Evaluation Review, 2004, 32 (1): 61- 72.
doi: 10.1145/1012888 |
21 |
JIANG D D , WANG X , GUO L , et al. Accurate estimation of large-scale IP traffic matrix[J]. AEU - International Journal of Electronics and Communications, 2011, 65 (1): 75- 86.
doi: 10.1016/j.aeue.2010.02.008 |
22 |
UHLIG S , QUOITIN B , LEPROPRE J , et al. Providing public intradomain traffic matrices to the research community[J]. Acm Sigcomm Computer Communication Review, 2006, 36 (1): 83- 86.
doi: 10.1145/1111322 |
23 | KINGMA D P, BA J. Adam: a method for stochastic optimization[EB/OL]. (2017-01-30)[2018-04-15]. https://arxiv.org/abs/1412.6980. |
[1] | Ya'nan YANG,Bin XIA,Nan XIE,Wenhao YUAN. Hybrid localization algorithm based on BP neural network and multivariable Taylor series [J]. Journal of Shandong University(Engineering Science), 2019, 49(1): 36-40. |
[2] | ZHANG Xihua, LU Shanshan, SU Jianjun. Countermeasure and technology patent development of global energy interconnection [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(6): 143-150. |
[3] | HE Qijia, LIU Zhenbing, XU Tao, JIANG Shujie. MR image classification based on LBP and extreme learning machine [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(2): 86-93. |
[4] | MA Wenjing, WU Dongya, TANG Kai, WANG Dongzhu. A design method for object resolution system applied in transport field [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 10-18. |
[5] | WANG Qiming, LI Zhanguo, FAN Aiwan. Quantum ant colony algorithm based on the game theory [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(2): 33-36. |
[6] | HAN Zhongming, WU Yang, TAN Xusheng, LIU Wen, YANG Weijie. Comparison and analysis on measure indexes for structural hole nodes in social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(1): 1-8. |
[7] | SUN Xiang-hua. The improvement of wireless sensor networks routing algorithm based on the distance vector simulation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 25-30. |
[8] | LIU Qi, LIU Yi-xun, QIN Feng-lin. Modeling research of free riding in P2P streaming systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 31-36. |
[9] | JI Tao, LI Yong-zhong. Blind data processing in cloud computing based on trusted computing mechanisms [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 30-34. |
[10] | LIU Dong-hui1,2, JIANG Wei1*. Research on Web negative information mining based on event ontology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 35-40. |
[11] | DING Yan, LI Yong-zhong*. Research on intrusion detection algorithm based on PCA and semisupervised clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 41-46. |
[12] | CAI Xiaojun 1, ZHAGN Qing 1, CHAI Qiaolin 1, KONG Suli 2. AnDivided multipath dynamic source routing based on energybalanced [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 141-145. |
[13] | Chen Dongyan. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 41-49. |
[14] | CAI Zhong-xin,ZHANG Hua-zhong . The clustering protocol based on a sleeping and selective-gateway mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(1): 56-60 . |
[15] | HUANG Zhong, GE Liansheng. An unified access method for Web services in IoT based on CoAP [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(4): 16-21. |
|