The proceedings contain 82 papers. The topics discussed include: rogue nodes detection using idle parking resources;analysis of node importance of satellite network based on triangular motif;research on web configurat...
ISBN:
(纸本)9798400716683
The proceedings contain 82 papers. The topics discussed include: rogue nodes detection using idle parking resources;analysis of node importance of satellite network based on triangular motif;research on web configuration software interactivity enhancement technology based on Vue and component library;design and implementation of power communication protocol plug-in based on hot loading;cross polarization interference cancellation algorithm based on maximum likelihood for satellite communication;research on machinelearning and state grid business risk prevention and control based on the Internet;design and implementation of intelligent radar anti-jamming simulation system;application of artificial bee colony algorithm in power communicationnetwork routing optimization simulation;and research on intelligent recommendation model for application systems.
With the rapid development of technology, the network environment is becoming increasingly complex, and security issues are becoming more prominent. network security situational awareness is an important method for as...
详细信息
In the digital age, the protection of data assets in the enterprise cybersecurity space has become critical. This paper explores a deep learning-based data asset protection technique that aims to solve the challenges ...
详细信息
A network of commonplace physical things with electronic parts, such as sensors, processors, and wireless communication modules is referred to as the "Internet of Things" (IoT). They can communicate with one...
详细信息
A network of commonplace physical things with electronic parts, such as sensors, processors, and wireless communication modules is referred to as the "Internet of Things" (IoT). They can communicate with one another and various other systems and devices via these components and the internet. It's important to note that the IoT lacks internal security. No organization is in charge of handling the enormous amount of data created by IoT devices since distributed ledger technology, which is a component of blockchain, is decentralized. Decentralization improves privacy and security. By making it extremely difficult for unauthorized users to alter current data record. Blockchain technology is used to safely store IoT data. Secure machine-to-machine transactions are made possible by the IoT and blockchain, boosting security and transparency for all parties involved. IoT devices can interact with private blockchain networks to guarantee the accuracy of transaction records by utilizing the features such as immutability and data encryption. This paper examines the business strategy that can aid in preventing the manipulation of sensitive data.
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model o...
ISBN:
(纸本)9798400711688
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model of tennis match situation change;supplement to decomposition of mean squared error of weighted geometric mean combined forecasting method;reconstructing cosmic observations with artificial neural networks: a test of Hubble constant;a routing method for flying ad hoc networks based on node degree estimation and game-theoretic forwarding strategy;the study of a distributed networking method based on an improved raft protocol;research on network security spatial data asset protection technology based on deep learning;and introduction to integration technology based on dispatch telephone and human machine workstation.
machine Translation (MT) has made significant advancements due to the rapid expansion of natural language processing. Even though several machine translation methods have been released in recent years, there hasn'...
详细信息
machine Translation (MT) has made significant advancements due to the rapid expansion of natural language processing. Even though several machine translation methods have been released in recent years, there hasn't been enough focus on automated and intelligent quality detection for translation outcomes. Neural machine Translation (NMT), a machine translation method that is datadriven, is more effective in large corpora but with restricted corpus resources, there is still a sizable range of opportunity for advancement. To overcome these issues, design a system module of sentence translator using Neural machine Translation is presented. This analysis will construct a translation system depending on the GRNN (Gated Recurrent Neural network) deep learning algorithm and comprises the creation of the attention, pre-processing, coding, and decoding modules. This system does the Language translation with improved Accuracy and performance.
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh...
详细信息
The advancement of technology in the automotive industry has led to the emergence of smart cities where vehicles are interconnected through communicationnetworks. This inter-vehicle communication (IVC) is crucial for...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
The advancement of technology in the automotive industry has led to the emergence of smart cities where vehicles are interconnected through communicationnetworks. This inter-vehicle communication (IVC) is crucial for enabling various intelligent transportation system (ITS) applications, such as traffic management, collision avoidance, and autonomous driving. The wireless communication for IVC exposes the system to security threats, including intrusion attacks. This paper presents intrusion detection techniques for IVC in smart cities, where KNN provides amore significant outcome than linear regression, logistic regression, and linear support vector machine classifiers. It finds the securing IVC and the different types of intrusion attacks. This approach additionally provides an overview of the existing intrusion detection systems (IDS) and their mechanisms for detecting and mitigating attacks in inter-vehicular communication. The paper illustrates an intrusion detection approach that leverages machinelearning algorithms to analyze the network traffic and detect anomalies indicative of intrusion attempts. The proposed approach outperforms intrusion detection, where the achieved accuracy is 98.3%.
Wireless communication is one of the most substantial types of communication nowadays, leading to the IoT revolution and increasing demand for IoT networks. On the other hand, this demand also leads to an increase in ...
详细信息
In recent years, the rapid development of the Internet industry has made the network traffic show a diversified trend. Different application services have different characteristics and have different requirements on n...
详细信息
暂无评论