In the context of today's digital production, the quality inspection of printed materials has become a key technology to improve printing efficiency and quality of finished products. Especially with the rapid deve...
详细信息
In large scientific installations, there are various intelligent monitoring and control terminals, each using a different bus communication protocol. This project involves the system development of an embedded univers...
详细信息
The proceedings contain 286 papers. The topics discussed include: research on multi beam sounding based on spatial position relationship and backtracking algorithm;a programmable packet scheduling method based on traf...
ISBN:
(纸本)9798350380958
The proceedings contain 286 papers. The topics discussed include: research on multi beam sounding based on spatial position relationship and backtracking algorithm;a programmable packet scheduling method based on traffic rate;method for recognizing intrapulse modulation types of radar signals;design and research of heat shrink tube expansion controlsystem based on PLC and touch screen;anchor-free ranking-based localization optimized Siamese RGB-T object tracking network;research on prediction and analysis of consumer behavior management based on deep learning;modelling and calculation of micro-resistance measurement;research on optimal water level of lakes based on PSO algorithm;research on PID control of BP neural networks based on PSO optimization;and Gray Wolf based algorithm applied to UAV route planning methodology.
Self-timed (ST) circuits have a number of advantages over synchronous counterparts. They utilize natural interaction between digital units based on data availability. Combinational ST circuits use redundant coding of ...
详细信息
In this paper, we design and implement an Intrusion Detection system (IDS) within the 5G core network, which is capable of inspecting both IP and non-IP data flows. By leveraging the Access and Mobility Management Fun...
详细信息
ISBN:
(纸本)9798350388015;9798350388008
In this paper, we design and implement an Intrusion Detection system (IDS) within the 5G core network, which is capable of inspecting both IP and non-IP data flows. By leveraging the Access and Mobility Management Function (AMF) Network Function (NF) communication service, our IDS can analyze all Cellular Internet of Things (CIoT) data traffic flowing across both the User and control Planes (UP and CP), enabling the detection of malicious activities originating from or targeting IoT networks. Our proposal is aligned with the 3GPP Release 17 (R17) standard and makes use of predefined functionalities to ensure compliance. Our proposal is non-intrusive and does not interfere with the core network's usual processes based on existing Service Based Interfaces (SBI). Additionally, we demonstrate that the classification of a data packet as malicious or benign is context-dependent using AI/ML Transformer Encoder architectures. We implement and integrate our proposed 5G-CIoT IDS as a Network Function inside the 5G Amarisoft platform for extensive experimentation. To evaluate the models' performance, we train our models with different categories of safe and malicious generated traffic and apply them to an emulated realistic scenario. We obtained a very promising result.
Some satellites are designed to be capable of autonomous flight in order to be intelligent. However, many autonomous flight tasks need to be designed because of the complexity of satellite system, which brings heavy s...
详细信息
design of optimal linear feedback controllers is a challenging but important problem in many applications. The main difficulties arise from nonconvexity and infinite dimensionality of the associated optimization probl...
详细信息
This paper presents the design of an enhanced multi-channel portable program-controlled insulation resistance tester system. The automatic switching controlsystem for multi-point measurement of insulation resistance ...
详细信息
This paper proposes an architecture and a real deployment for the shared perception between a vehicle and the infrastructure in autonomous mobility, employing microservices on the infrastructure and vehicle platforms ...
详细信息
PC-Based control has many advantages over other controlsystems like Programmable Logic controller (PLC) base or Programmable Automation controller (PAC) base controlsystem, such as updating to handle more data proce...
详细信息
暂无评论