Abstract
According to the support vector domain properties, the paper establishes vector domain predictive models of chaos channel as well as chaos phase trace of non-linear map, the chaotic fading channel model was established based on Takens phase space delay reconstructing theory. Self-learning makes error least upper bound of generalization model to be minimum. The non-linear higher dimension map was realized by the squares support vector domain. The future fading channel data was predicted from training data set. The predictive error changes with the increase of embed dimension to a constant. The experiment result indicates that the support vector domain needs little support vector with fast convergence rate. With the small sample and unknown probability density, the multi-path predictive series consisted with true value series in Doppler fast fading channel. Under the conditions of small sample, the predicted series is in concordance with the channel true value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573
Zhou, Z., Wang, Y., Jonathan Wu, Q.M., Yang, C.-N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi:10.1109/TIFS.2016.2601065
Nandi, A.K., Azzouz, E.E.: Automatic modulation recognition: I. Sig. Process. 46(2), 211–222 (1995)
Nandi, A.K., Azzouz, E.E.: Modulation recognition using artificial neural networks. Sig. Process. 56(1), 165–175 (1997)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016). doi:10.1109/TIFS.2016.2596138
Zhou, Z., Yang, C.-N., Chen, B., Sun, X., Liu, Q., Jonathan Wu, Q.M.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. E99-D(6), 1531–1540 (2016). doi:10.1587/transinf.2015EDP7341
Tax, D., et al.: Data domain description using support vectors. In: Proceedings of the European Symposium Artificial Neural, p. 251 (1999)
David, M.J., et al.: Support vector domain description. Pattern Recogn. Lett. 20, 1191–1199 (1999)
Louvier, H., et al.: Maintenance of transient chaos using a neural-network-assisted feedback control. Phys. Rev. E 65(1), 016203 (2002)
Jackes, W.C.: Microwave Mobile Communication. IEEE press, Hoboken (1993)
Costamagna, E.: Block-error probabilities for mobile radio channels derived from chaos equations. IEEE Commun. Lett. 3(3), 66–68 (1999)
Costamagna, E.: Multipath channel modeling with chaotic attractors. Proc. IEEE 90(5), 842–859 (2002)
Metzler, R.: Information flow through a chaotic channel: prediction and postdiction at finite resolution. Phys. Rev. E 70(2), 026205 (2004)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016). doi:10.1109/TIFS.2016.2590944
Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015). doi:10.1109/TIFS.2014.2381872
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015). doi:10.1109/TPDS.2015.2401003
Shen, J., Moh, S., Chung, I.: Comment: “Enhanced novel access control protocol over wireless sensor networks”. IEEE Trans. Consum. Electron. 56(3), 2019–2021 (2010). doi:10.1109/TCE.2010.5606360
Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. 1, 1–11 (2016). doi:10.1109/TNNLS.2016.2544779
Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403–1416 (2015). doi:10.1109/TNNLS.2014.2342533
Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2016). ISSN 1939,99,1. doi:10.1109/TSC.2016.2622697
Pan, Z., Lei, J., Zhang, Y., Sun, X., Kwong, S.: Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans. Broadcast. 62(3), 675–684 (2016). doi:10.1109/TBC.2016.2580920
Pan, Z., Zhang, Y., Kwong, S.: Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans. Broadcast. 61(2), 166–176 (2015). doi:10.1109/TBC.2015.2419824
Yuan, C., Sun, X., Lv, R.: Fingerprint liveness detection based on multi-scale LPQ and PCA. Chin. Commun. 13(7), 60–65 (2016). doi:10.1109/CC.2016.7559076
Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming. Chin. Commun. 13(7), 16–23 (2016). doi:10.1109/CC.2016.7559071
Ma, T., Zhang, Y., Cao, J., Shen, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 70(6), 1336–1344 (2015)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016). doi:10.1007/s11042-014-2381-8
Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for ν-support vector regression. Neural Netw. 67, 140–150 (2015). doi:10.1016/j.neunet.2015.03.013
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016). doi:10.1002/sec.1582
Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014). doi:10.1002/sec.864
Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115, 123–132 (2016). doi:10.1016/j.knosys.2016.10.016
Pan, Z., Jin, P., Lei, J., Zhang, Y., Sun, X., Kwong, S.: Fast reference frame selection based on content similarity for low complexity HEVC encoder. J. Vis. Commun. Image Represent. 40(Part B), 516–524 (2016). doi:10.1016/j.jvcir.2016.07.018
Chen, Y., Hao, C., Wu, W., Wu, E.: Robust dense reconstruction by range merging based on confidence estimation. Sci. Chin. Inf. Sci. 59(9), 1–11 (2016). doi:10.1007/s11432-015-0957-4
Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017). doi:10.6138/JIT.2017.18.2.20160815
Tian, Q., Chen, S.: Cross-heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238, 286–295 (2017)
Xue, Y., Jiang, J., Zhao, B., Ma, T.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft. Comput. 22(3), 1–18 (2017). doi:10.1007/s00500-017-2547-1
Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)
Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. Chin. Commun. 13(7), 108–116 (2016). doi:10.1109/CC.2016.7559082
Zhang, J., Tang, J., Wang, T., Chen, F.: Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. Int. J. Sens. Netw. 23(4), 248–257 (2017)
Sun, Y., Feihong, G.: Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring. Int. J. Sens. Netw. 23(4), 258–264 (2017)
Zhangjie, F., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 18(5), 1 (2017). doi:10.1109/TIFS.2017.2705620
Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)
Acknowledgements
Supported by the National Natural Science Foundation of China under Grant No 61574115. Shaanxi Natural Science Basic Research Plan in Shaanxi Province of China (2016JM1029), and a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions, PAPD, CICAEET.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ren, Y., Ren, R. (2017). Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_68
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_68
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)