With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also *** intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and aler...
详细信息
With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also *** intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious *** is important in developing advanced security *** study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention ***,it focuses on machine learning(ML)and deep learning(DL)techniques for *** paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of *** speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).processingdata are enhanced using the synthetic minority oversampling technique to ensure learning *** nearest class mean classifier is applied during the testing phase to identify new *** results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods.
In order to solve the problem of high frame error rate in electronic communication engineering, the application of artificial intelligence technology in electronic communication engineering is proposed. Taking LPWAN t...
详细信息
In order to solve the problem of high frame error rate in electronic communication engineering, the application of artificial intelligence technology in electronic communication engineering is proposed. Taking LPWAN technology in artificial intelligence technology as an example, a new architecture is proposed to improve the security of wireless communication system of internet of things. The architecture is mainly composed of business layer, data processing layer, terminal access layer and communication technology layer. The experimental results show that the system configuration sends four kinds of information transmission instructions of "temperature, light, air pressure and humidity" every 30 s, and the receiving port collects the above command data continuously for 4 h, compared with the traditional architecture (15.6%), and the packet loss rate is 4%, which can effectively improve the throughput and processing efficiency of the system. The designed architecture runs stably, has low bit error rate, and can better support the wireless communication. It is proved that the new architecture with LPWAN technology as an example has large overall capacity and excellent performance of its electronic communication engineering interface. The frame number error rate is greatly reduced and the result of signal frame number is more accurate.
This paper proposes a special System Architecture for Multi-tenancy SaaS Service (SAMSS), which studies the performance security issues at the business logic layer and data processing layer respectively. The Kalman fi...
详细信息
This paper proposes a special System Architecture for Multi-tenancy SaaS Service (SAMSS), which studies the performance security issues at the business logic layer and data processing layer respectively. The Kalman filtering Admission Control algorithm (KAC) and the Greedy Copy Management algorithm (GCM) are proposed. At the business logic layer, Kalman filtering admission control algorithm is presented. It uses a Kalman filter to conduct the dynamic evaluation for the CPU resource for multi-tenancy SaaS service and reduces the unnecessary performance expenses caused by direct measurement of CPU resources. At the data processing layer, the Greedy Copy Management algorithm (GCM) is presented. It changes the copy placement as a K-partitioning set partitioning problem and adopts a greedy strategy to reduce the number of times for creating a data copy. Finally, the experimental analysis and results prove the feasibility and efficiency of the algorithms proposed.
The design of the real-time state supervisory system based on the CAN (controller area network) bus for wind power plants is presented, including the network structure of the whole system, the design of hardware and s...
详细信息
ISBN:
(纸本)9781424404964
The design of the real-time state supervisory system based on the CAN (controller area network) bus for wind power plants is presented, including the network structure of the whole system, the design of hardware and software. The supervisory system has four layers, namely, the data acquisition layer, the data processing layer, the data transport layer and the user layer. The electricity data that are processed by the industrial computers are transmitted by the CAN bus to top-layer computer to be managed and displayed. This system has been put into operation in a wind power plant in Guangdong and achieved favorable effects.
暂无评论