With the rapid development and popularization of mobile Internet in recent years, security issues have become increasingly prominent. Based on the mobile Internet, this paper studies the security issues caused by abno...
详细信息
ISBN:
(纸本)9781665426428
With the rapid development and popularization of mobile Internet in recent years, security issues have become increasingly prominent. Based on the mobile Internet, this paper studies the security issues caused by abnormal users for users, mobile devices, and social network service platforms. Aiming at the needs of users for detecting abnormal network behaviors in a real-time network environment, this paper designs and implements a data-based Layered network abnormal behavior detection system. The system is divided into a data acquisition module, a data conversion module, a rule editing module, an anomaly detection module, and a detection result visualization module.
The communication between vehicles (V2V) and vehicles to infrastructure (V2I) plays a crucial role in the Vehicular Ad-hoc Network (VANET). Its aim is to enhance road safety, reduce traffic accidents, and improve traf...
详细信息
ISBN:
(纸本)9798350343427;9798350343434
The communication between vehicles (V2V) and vehicles to infrastructure (V2I) plays a crucial role in the Vehicular Ad-hoc Network (VANET). Its aim is to enhance road safety, reduce traffic accidents, and improve traffic efficiency. This necessitates the exchange of critical information among vehicles, static roadside units (RSUs), and traffic control centers. This integration gives rise to Cooperative Intelligent Transport Systems (C-ITS). However, the latency in wireless communication can have adverse effects on safety. To address this, vehicle advancements have led to the formation of platoons, enabling better latency control and safer driving. Nonetheless, platooning also exposes vehicles to significant risks, such as Man-In-The-Middle (MITM) attacks. These attacks can result in message delays, juggling, and drop-offs, particularly affecting time-sensitive messages like accident notifications. This research paper focuses on analyzing the impact of MITM attacks that cause message delays and proposes measures to detect and sever connections with malicious vehicles. By establishing secure paths, this solution aims to enhance VANET security and optimize network performance.
Aiming at the problems of parameter optimization and insufficient utilization of split reads in the detection for copy number variation (CNV), a new definition of relative read depth (RRD) and a randomized sampling st...
详细信息
Aiming at the problems of parameter optimization and insufficient utilization of split reads in the detection for copy number variation (CNV), a new definition of relative read depth (RRD) and a randomized sampling strategy (RGN) are proposed in this paper. Compared to the raw read depth, the RRD parameter has weak correlation with GC content, mappability and the width of analysis windows tiled along the genome. The RGN strategy is based on the weighted sampling strategy which can speed up the read count data analysis. Subsequently, we propose an improved detection algorithm for CNV based on hidden Markov model (CNV-HMM). The HMM detects the abnormal signal of read count data and outputs the detection results of candidate CNVs. At the end of the algorithm, we filter out the results of candidate CNVs using the split reads to improve the performance of CNV-HMM algorithm. Finally, the experiment results show that our CNV-HMM algorithm has higher sensitivity and accuracy for CNVs detection than most of current detection algorithms and applicative both for diploid animal and plant.
In the coming 6th generation (6G) and beyond in wireless communication, an increasing number of ultrascale intelligent factors, including mobile robot users and smart cars, will result in interference exploitation. Th...
详细信息
In the coming 6th generation (6G) and beyond in wireless communication, an increasing number of ultrascale intelligent factors, including mobile robot users and smart cars, will result in interference exploitation. The management of this exploitation will be a great challenge for detection algorithms in uplink massive multiple-input and multiple-output (MIMO) systems, especially for high-order quadrature amplitude modulation (QAM) signals. Artificial intelligence technology employing machine learning is one of the key approaches among the 6G technical solutions. In this paper, a convolutional-neural-network-based likelihood ascent search (CNNLAS) detection algorithm is proposed on the basis of a graphical detection model for uplink multiuser massive MIMO systems. Compared with other algorithms, the proposed CNNLAS detection algorithm has a stronger robustness against the channel estimation errors, and requires lower average received signal-to-noise ratios to obtain better bit error rate performance and to achieve the theoretical spectral efficiency with a lower polynomial average per symbol computational complexity, both for the graphical low-order and high-order QAM signals in uplink multiuser massive MIMO systems.
With the rapid development of dc system, the residual current in dc system has become an urgent problem to be solved. However, the type B residual current devices (RCD) for ac systems could not be directly used in dc ...
详细信息
ISBN:
(纸本)9781665422208
With the rapid development of dc system, the residual current in dc system has become an urgent problem to be solved. However, the type B residual current devices (RCD) for ac systems could not be directly used in dc systems. The ac residual current caused by distributed capacitance and the rectifier seriously interferes with the accurate detection of the dc residual current. A detection simulation model of dc residual current based on magnetic modulation was established. The authors also proposed detection algorithms based on Kalman filter and moving average filter separately. The experimental results showed that the proposed model and detection algorithms were effective. They could detect the residual current in the dc system under ac interferences.
Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the developmen...
详细信息
ISBN:
(纸本)9781450376341
Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.
In the process of close-range photogrammetry, it is hard to stick markers directly on the surface of the object to be measured at times. Projecting optical markers is a good solution. However, there are some problems ...
详细信息
ISBN:
(纸本)9789813294417;9789813294400
In the process of close-range photogrammetry, it is hard to stick markers directly on the surface of the object to be measured at times. Projecting optical markers is a good solution. However, there are some problems for the existing optical markers such as difficulty in automatic matching and splicing. Therefore, this paper proposes the design and detection algorithm of white-light markers. White-light marker is composed of collar coded targets and circular non-coded targets. Collar coded targets are designed in the middle of the white-light marker, which can enhance the brightness of the coded strip and improve the recognition accuracy. Circular non-coded targets are designed around the collar coded targets, which can realize matching of non-coded targets among multiple images. Based on Canny operator, feature edges are extracted from the images. According to the criterions of scale, form, etc., the edges of markers are screened out. Markers containing coded strip is decoded to determine the identity. Center of gravity method is used to make the center position of white-light makers come true. The designed white-light marker is applied to the deformation detection experiment of crane girder. Its deformation curve is basically similar with the curve of sticking markers, which verifies the feasibility of the deformation detection of crane girder based on white-light markers.
The ARP protocol is located at the data link layer. Because the ARP protocol itself lacks an authentication mechanism, an attacker can easily masquerade as a gateway or a target server to intercept user data packets t...
详细信息
ISBN:
(纸本)9781728143231;9781728143224
The ARP protocol is located at the data link layer. Because the ARP protocol itself lacks an authentication mechanism, an attacker can easily masquerade as a gateway or a target server to intercept user data packets to achieve malicious purposes. This article first analyzes the behavior characteristics of ARP spoofing on the access switch, and then proposes an algorithm for detecting man-in-the-middle attacks based on ARP spoofing. Experiments show that the algorithm can detect ARP spoofing attacks effectively and locate the attacker quickly.
Fiducial markers are fundamental components of many computer vision systems that help, through their unique features (e.g., shape, color), a fast localization of spatial objects in unstructured scenarios. They find ap...
详细信息
Fiducial markers are fundamental components of many computer vision systems that help, through their unique features (e.g., shape, color), a fast localization of spatial objects in unstructured scenarios. They find applications in many scientific and industrial fields, such as augmented reality, human-robot interaction, and robot navigation. In order to overcome the limitations of traditional paper-printed fiducial markers (i.e. deformability of the paper surface, incompatibility with industrial and harsh environments, complexity of the shape to reproduce directly on the piece), we aim at exploiting existing, or additionally fabricated, structural features on rigid bodies (e.g., holes), developing a fiducial mechanical marker system called MechaTag. Our system, endowed with a dedicated algorithm, is able to minimize recognition errors and to improve repeatability also in case of ill boundary conditions (e.g., partial illumination). We assess MechaTag in a pilot study, achieving a robustness of fiducial marker recognition above 95% in different environment conditions and position configurations. The pilot study was conducted by guiding a robotic platform in different poses in order to experiment with a wide range of working conditions. Our results make MechaTag a reliable fiducial marker system for a wide range of robotic applications in harsh industrial environments without losing accuracy of recognition due to the shape and material.
Recently, visible light communication (VLC) is regarded as a new type of wireless communication that utilizes intensity modulation and direct detection (IM/DD) to realize signal transmission. In order to make better u...
详细信息
ISBN:
(纸本)9781510640702
Recently, visible light communication (VLC) is regarded as a new type of wireless communication that utilizes intensity modulation and direct detection (IM/DD) to realize signal transmission. In order to make better use of spatial resources to realize multi-LED collaborative transmission and dimming control, multi-LED phase-shifted space-time codes (MP-STC) has been proposed for dimmable multi-LED VLC systems. Although the MP-STC scheme has much better communication and illumination performance, the complexity of the traditional maximum likelihood (ML) detection algorithm is too high to implement. In this paper, a low complexity detection algorithm has been proposed for the MP-STC scheme. The simulation results show that the detection algorithm's error performance is close to or even achieving the ML detection algorithm's error performance.
暂无评论