Skip to main content

Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

  • 2585 Accesses

Abstract

According to the support vector domain properties, the paper establishes vector domain predictive models of chaos channel as well as chaos phase trace of non-linear map, the chaotic fading channel model was established based on Takens phase space delay reconstructing theory. Self-learning makes error least upper bound of generalization model to be minimum. The non-linear higher dimension map was realized by the squares support vector domain. The future fading channel data was predicted from training data set. The predictive error changes with the increase of embed dimension to a constant. The experiment result indicates that the support vector domain needs little support vector with fast convergence rate. With the small sample and unknown probability density, the multi-path predictive series consisted with true value series in Doppler fast fading channel. Under the conditions of small sample, the predicted series is in concordance with the channel true value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573

    Article  Google Scholar 

  2. Zhou, Z., Wang, Y., Jonathan Wu, Q.M., Yang, C.-N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi:10.1109/TIFS.2016.2601065

    Article  Google Scholar 

  3. Nandi, A.K., Azzouz, E.E.: Automatic modulation recognition: I. Sig. Process. 46(2), 211–222 (1995)

    Article  MATH  Google Scholar 

  4. Nandi, A.K., Azzouz, E.E.: Modulation recognition using artificial neural networks. Sig. Process. 56(1), 165–175 (1997)

    Article  MATH  Google Scholar 

  5. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016). doi:10.1109/TIFS.2016.2596138

    Article  Google Scholar 

  6. Zhou, Z., Yang, C.-N., Chen, B., Sun, X., Liu, Q., Jonathan Wu, Q.M.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. E99-D(6), 1531–1540 (2016). doi:10.1587/transinf.2015EDP7341

    Article  Google Scholar 

  7. Tax, D., et al.: Data domain description using support vectors. In: Proceedings of the European Symposium Artificial Neural, p. 251 (1999)

    Google Scholar 

  8. David, M.J., et al.: Support vector domain description. Pattern Recogn. Lett. 20, 1191–1199 (1999)

    Article  Google Scholar 

  9. Louvier, H., et al.: Maintenance of transient chaos using a neural-network-assisted feedback control. Phys. Rev. E 65(1), 016203 (2002)

    Article  Google Scholar 

  10. Jackes, W.C.: Microwave Mobile Communication. IEEE press, Hoboken (1993)

    Google Scholar 

  11. Costamagna, E.: Block-error probabilities for mobile radio channels derived from chaos equations. IEEE Commun. Lett. 3(3), 66–68 (1999)

    Article  Google Scholar 

  12. Costamagna, E.: Multipath channel modeling with chaotic attractors. Proc. IEEE 90(5), 842–859 (2002)

    Article  Google Scholar 

  13. Metzler, R.: Information flow through a chaotic channel: prediction and postdiction at finite resolution. Phys. Rev. E 70(2), 026205 (2004)

    Article  MathSciNet  Google Scholar 

  14. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016). doi:10.1109/TIFS.2016.2590944

    Article  Google Scholar 

  15. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015). doi:10.1109/TIFS.2014.2381872

    Article  Google Scholar 

  16. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015). doi:10.1109/TPDS.2015.2401003

    Article  Google Scholar 

  17. Shen, J., Moh, S., Chung, I.: Comment: “Enhanced novel access control protocol over wireless sensor networks”. IEEE Trans. Consum. Electron. 56(3), 2019–2021 (2010). doi:10.1109/TCE.2010.5606360

    Article  Google Scholar 

  18. Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. 1, 1–11 (2016). doi:10.1109/TNNLS.2016.2544779

    Google Scholar 

  19. Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403–1416 (2015). doi:10.1109/TNNLS.2014.2342533

    Article  MathSciNet  Google Scholar 

  20. Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2016). ISSN 1939,99,1. doi:10.1109/TSC.2016.2622697

  21. Pan, Z., Lei, J., Zhang, Y., Sun, X., Kwong, S.: Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans. Broadcast. 62(3), 675–684 (2016). doi:10.1109/TBC.2016.2580920

    Article  Google Scholar 

  22. Pan, Z., Zhang, Y., Kwong, S.: Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans. Broadcast. 61(2), 166–176 (2015). doi:10.1109/TBC.2015.2419824

    Article  Google Scholar 

  23. Yuan, C., Sun, X., Lv, R.: Fingerprint liveness detection based on multi-scale LPQ and PCA. Chin. Commun. 13(7), 60–65 (2016). doi:10.1109/CC.2016.7559076

    Article  Google Scholar 

  24. Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming. Chin. Commun. 13(7), 16–23 (2016). doi:10.1109/CC.2016.7559071

    Article  Google Scholar 

  25. Ma, T., Zhang, Y., Cao, J., Shen, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 70(6), 1336–1344 (2015)

    MATH  MathSciNet  Google Scholar 

  26. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016). doi:10.1007/s11042-014-2381-8

    Article  Google Scholar 

  27. Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for ν-support vector regression. Neural Netw. 67, 140–150 (2015). doi:10.1016/j.neunet.2015.03.013

    Article  Google Scholar 

  28. Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016). doi:10.1002/sec.1582

    Article  Google Scholar 

  29. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014). doi:10.1002/sec.864

    Article  Google Scholar 

  30. Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115, 123–132 (2016). doi:10.1016/j.knosys.2016.10.016

    Article  Google Scholar 

  31. Pan, Z., Jin, P., Lei, J., Zhang, Y., Sun, X., Kwong, S.: Fast reference frame selection based on content similarity for low complexity HEVC encoder. J. Vis. Commun. Image Represent. 40(Part B), 516–524 (2016). doi:10.1016/j.jvcir.2016.07.018

    Article  Google Scholar 

  32. Chen, Y., Hao, C., Wu, W., Wu, E.: Robust dense reconstruction by range merging based on confidence estimation. Sci. Chin. Inf. Sci. 59(9), 1–11 (2016). doi:10.1007/s11432-015-0957-4

    Google Scholar 

  33. Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017). doi:10.6138/JIT.2017.18.2.20160815

    Google Scholar 

  34. Tian, Q., Chen, S.: Cross-heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238, 286–295 (2017)

    Article  Google Scholar 

  35. Xue, Y., Jiang, J., Zhao, B., Ma, T.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft. Comput. 22(3), 1–18 (2017). doi:10.1007/s00500-017-2547-1

    Google Scholar 

  36. Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)

    Google Scholar 

  37. Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. Chin. Commun. 13(7), 108–116 (2016). doi:10.1109/CC.2016.7559082

    Article  Google Scholar 

  38. Zhang, J., Tang, J., Wang, T., Chen, F.: Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. Int. J. Sens. Netw. 23(4), 248–257 (2017)

    Article  Google Scholar 

  39. Sun, Y., Feihong, G.: Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring. Int. J. Sens. Netw. 23(4), 258–264 (2017)

    Article  Google Scholar 

  40. Zhangjie, F., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)

    Article  Google Scholar 

  41. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 18(5), 1 (2017). doi:10.1109/TIFS.2017.2705620

    Article  Google Scholar 

  42. Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)

    Article  Google Scholar 

Download references

Acknowledgements

Supported by the National Natural Science Foundation of China under Grant No 61574115. Shaanxi Natural Science Basic Research Plan in Shaanxi Province of China (2016JM1029), and a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions, PAPD, CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ren Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, Y., Ren, R. (2017). Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_68

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics