{"id":"https://openalex.org/W2900013713","doi":"https://doi.org/10.1109/idaacs-sws.2018.8525625","title":"Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network","display_name":"Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2900013713","doi":"https://doi.org/10.1109/idaacs-sws.2018.8525625","mag":"2900013713"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs-sws.2018.8525625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws.2018.8525625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101869306","display_name":"Xu Zhang","orcid":"https://orcid.org/0000-0003-3751-5529"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Zhang","raw_affiliation_strings":["A School of computer Science, Hubei university of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"A School of computer Science, Hubei university of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670242","display_name":"Zhiwei Ye","orcid":"https://orcid.org/0000-0001-6668-4634"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Ye","raw_affiliation_strings":["A School of computer Science, Hubei university of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"A School of computer Science, Hubei university of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037591175","display_name":"Lingyu Yan","orcid":"https://orcid.org/0000-0003-2468-3881"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingyu Yan","raw_affiliation_strings":["A School of computer Science, Hubei university of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"A School of computer Science, Hubei university of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103162139","display_name":"Chunzhi Wang","orcid":"https://orcid.org/0000-0002-9620-3421"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunzhi Wang","raw_affiliation_strings":["A School of computer Science, Hubei university of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"A School of computer Science, Hubei university of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101902622","display_name":"Ruoxi Wang","orcid":"https://orcid.org/0009-0009-5154-0086"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruoxi Wang","raw_affiliation_strings":["Wuhan FiberHome Technical Services Co.Ltd"],"affiliations":[{"raw_affiliation_string":"Wuhan FiberHome Technical Services Co.Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101869306"],"corresponding_institution_ids":["https://openalex.org/I74525822"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71227522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"73","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14225","display_name":"Advanced Sensor and Control Systems","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13535","display_name":"Wireless Sensor Networks and IoT","score":0.964900016784668,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7576839327812195},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.751122772693634},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.702551007270813},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5930733680725098},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.49445056915283203},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49296140670776367},{"id":"https://openalex.org/keywords/rate-of-convergence","display_name":"Rate of convergence","score":0.4528910517692566},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4307999014854431},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4279502034187317},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.4277260899543762},{"id":"https://openalex.org/keywords/premature-convergence","display_name":"Premature convergence","score":0.4151352643966675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40943408012390137},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.360228568315506},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3461723327636719},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3455153703689575},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1347971260547638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09437552094459534},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.06189882755279541}],"concepts":[{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7576839327812195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.751122772693634},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.702551007270813},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5930733680725098},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.49445056915283203},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49296140670776367},{"id":"https://openalex.org/C57869625","wikidata":"https://www.wikidata.org/wiki/Q1783502","display_name":"Rate of convergence","level":3,"score":0.4528910517692566},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4307999014854431},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4279502034187317},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.4277260899543762},{"id":"https://openalex.org/C58758708","wikidata":"https://www.wikidata.org/wiki/Q7240233","display_name":"Premature convergence","level":3,"score":0.4151352643966675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40943408012390137},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.360228568315506},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3461723327636719},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3455153703689575},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1347971260547638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09437552094459534},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.06189882755279541},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs-sws.2018.8525625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws.2018.8525625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1570321471","https://openalex.org/W1972062587","https://openalex.org/W2093733173","https://openalex.org/W2483412448","https://openalex.org/W2528216621","https://openalex.org/W2591025119","https://openalex.org/W2746529592","https://openalex.org/W2770375189","https://openalex.org/W6635471180"],"related_works":["https://openalex.org/W4239286941","https://openalex.org/W42170614","https://openalex.org/W2364947648","https://openalex.org/W2568269143","https://openalex.org/W2379567910","https://openalex.org/W2391178530","https://openalex.org/W1991387858","https://openalex.org/W2358785986","https://openalex.org/W2120521599","https://openalex.org/W1504924465"],"abstract_inverted_index":{"Research":[0],"on":[1],"network":[2,15,32,113,150],"security":[3,34,114,146],"situation":[4,35,147,158],"awareness":[5],"is":[6,18,87,102,123,151,160],"currently":[7],"a":[8,88],"research":[9],"hotspot":[10],"in":[11,43,107],"the":[12,21,29,60,97,109,119,127,131,135,144,149,154,157],"field":[13],"of":[14,20,99,111,130,137,148,156],"security.":[16],"It":[17],"one":[19],"easiest":[22],"and":[23,73,141,153],"most":[24],"effective":[25],"methods":[26],"to":[27,53,125],"use":[28,110],"BP":[30,44,112,132],"neural":[31,45],"for":[33],"prediction.":[36],"However,":[37],"there":[38],"are":[39],"still":[40],"some":[41,63],"problems":[42],"network,":[46],"such":[47,68],"as":[48,69],"slow":[49],"convergence":[50],"rate,":[51],"easy":[52],"fall":[54,79],"into":[55,80],"local":[56,81],"extremum,":[57],"etc.":[58],"On":[59],"other":[61],"hand,":[62],"common":[64],"used":[65,124],"evolutionary":[66],"algorithms,":[67],"genetic":[70],"algorithm":[71,86,91],"(GA)":[72],"particle":[74],"swarm":[75],"optimization":[76,85],"(PSO),":[77],"easily":[78],"optimum.":[82],"Hybrid":[83],"rice":[84],"newly":[89],"proposed":[90,120],"with":[92],"strong":[93],"search":[94,140],"ability,":[95],"so":[96],"method":[98],"this":[100],"paper":[101],"proposed.":[103],"This":[104],"article":[105],"describes":[106],"detail":[108],"posture":[115],"prediction":[116,159],"method.":[117],"In":[118],"method,":[121],"HRO":[122,138],"train":[126],"connection":[128],"weights":[129],"network.":[133],"Through":[134],"advantages":[136],"global":[139],"fast":[142],"convergence,":[143],"future":[145],"predicted,":[152],"accuracy":[155],"effectively":[161],"improved.":[162]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
