Pilot-operated solenoid valves have the advantage of fast response times and can meet high pressure and large diameter requirements through their structural characteristics, making them widely used in various fields. ...
详细信息
To transmit big graph data emerging from prevalent social networks and biological networks over mobile devices has become challenging nowadays. Since graphs are usually represented by the associated adjacency matrices...
详细信息
The rapid adoption of software as a medical device (SAMD) driven by artificial intelligence and machine learning has brought about a fundamental shift in the medical industry. This shift has the potential to greatly i...
详细信息
A hybrid software-defined network (SDN) is the combination of both traditional network infrastructure and SDN which provides the benefits of centralized SDN control and the distributed nature of legacy networks. Howev...
A hybrid software-defined network (SDN) is the combination of both traditional network infrastructure and SDN which provides the benefits of centralized SDN control and the distributed nature of legacy networks. However, it faces security challenges, particularly SYN spoofing-based Distributed Denial-of-Service (DDoS) attacks. In this attack, malicious hosts send a large number of fake TCP-SYN packets to both controller and victim servers by spoofing the packets’ header fields, leading to network malfunction. Existing solutions are unable to detect low-rate and multi-victim SYN spoofing attacks, leading to a high False Negative Rate (FNR), and indiscriminately block both benign and malicious traffic during an attack, leading to a high False Positive Rate (FPR). To address these challenges, we present SynFloWatch, a live defense system against SYN spoofing based DDoS attacks in hybrid SDN. SynFloWatch is designed at the control layer of SDN and it consists of two modules: (i) DDoS Detection module, and (ii) DDoS Mitigation module. The DDoS Detection module employs Tsallis entropy analysis on network traffic directed towards the controller to identify DDoS traffic, victim servers, and malicious switch ports generating spoofed SYN packets. The DDoS Mitigation module uses a combination of SYN-proxy and SYN-cookie approaches to drop spoofed SYN packets from malicious switch ports while allowing legitimate traffic to proceed. We implement SynFloWatch in Floodlight controller and evaluate its performance under various attack scenarios using Mininet emulator. Experimental results demonstrate that SynFloWatch detects both low and high-rate SYN-flood attacks with a reduced FNR of 25% and effectively mitigates their impact with a decreased FPR of 50% compared to existing state-of-the-art solutions.
This paper proposes an end-of-sentence (EOS) token modeling approach for streaming conformer-based Korean children's speech recognition applied to a social robot. The baseline system for speech recognition is a st...
详细信息
This paper evaluates the performance of incremental-quantity protection elements TD32 and TD21 in hybrid transmission lines (HTLs) that combine overhead transmission lines (OHLs) and underground cables (UGCs). Ground ...
详细信息
ISBN:
(数字)9798331507152
ISBN:
(纸本)9798331507169
This paper evaluates the performance of incremental-quantity protection elements TD32 and TD21 in hybrid transmission lines (HTLs) that combine overhead transmission lines (OHLs) and underground cables (UGCs). Ground faults were simulated using a 380 kV/60 Hz power system in PSCAD, with six configurations and 216 fault scenarios per configuration under varying conditions, including fault time, location, resistance, and phase. Analysis through scatter and boxplot plots revealed significant differences in the operation times of protection functions between HTLs and OHLs, impacting overall system reliability. Specifically, the presence of UGCs alters fault detection times (Start Logic) and the performance of protective relays regarding incremental quantities, potentially leading to delays in fault clearance. These findings underscore the necessity for protective schemes to accommodate the unique dynamics of HTLs, enhancing overall system reliability and operational efficiency.
Human Body Communication (HBC) is an energy-efficient alternative to conventional radio frequency (RF) communication. The HBC in the Electro-Quasistatic (EQS) region is physically secure as the signal is mostly confin...
详细信息
ISBN:
(数字)9798350351057
ISBN:
(纸本)9798350351064
Human Body Communication (HBC) is an energy-efficient alternative to conventional radio frequency (RF) communication. The HBC in the Electro-Quasistatic (EQS) region is physically secure as the signal is mostly confined within 5~10 cm around the human body. However, HBC in the body resonance (BR) region suffers greatly from radiation, which makes the signal easily eavesdropped even at a large distance, and there have not been any efficient shielding methods. This paper, for the first time, introduces a method to shield the BR HBC signal and greatly minimize leakage. Firstly, the transmitter-body interface leakage of the BR HBC signal is measured from 10 cm to 30 cm. Then with the Faraday fabric shielding the transmitter, the interface leakage is measured again for comparison. Moreover, the on-body measurements are implemented with and without the Faraday fabric shield. The measurement results show that the Faraday fabric shield can reduce the leakage by 23.1~48.6 dB at 10 cm, and at 20 cm and 30 cm the leakage from the shielded transmitter is lower than −70 dB. The shield can reduce the channel gain of the on-body receiver by up to 20.41~40.88 dB and makes the leakage channel gain decrease by 10.1 ~ 22 dB more than the on-body scenario. The security benefit achieves the largest around the BR peak frequencies. Beyond the BR peak frequencies, the on-body receiver detects similar or even lower power than the off-body ones. Therefore, the human body plays a major role in the BR peak frequencies while beyond that the transmitter radiation is dominant in transmitting information in the BR HBC system.
The valve positioner control system has the characteristics of nonlinear, time-varying, large inertia and pure hysteresis, etc. Aiming at the problems of the conventional PID control algorithm in its control process, ...
详细信息
Microwave photonics, an interdisciplinary field that combines microwave engineering and photonic technology for the generation, transmission, processing, and control of microwave signals, to take advantage of the broa...
详细信息
Microwave photonics, an interdisciplinary field that combines microwave engineering and photonic technology for the generation, transmission, processing, and control of microwave signals, to take advantage of the broad bandwidth, high frequency, and low loss offered by modern photonics, has been intensively researched for the last few decades, and numerous solutions have been proposed and demonstrated. In this article, an overview about microwave photonics is provided which covers the basic concepts of microwave photonics, photonic-assisted microwave signal generation, photonic-assisted microwave signal processing, and true time delay beamforming. The implementation of microwave photonic systems based on photonic integrated circuits is also reviewed, including the design, fabrication, and material platforms, application-specific photonic integrated circuits for microwave photonics, and programmable integrated microwave *** challenges and future applications of microwave photonics are also discussed.
Passwords (and login credentials) are pivotal in our daily online activities, securing 'things' including emails and e-wallets. Yet, users tend to recycle similar passwords across multiple services, posing a s...
详细信息
暂无评论