To solve the problem of low performance of network intrusion detection,a deep learning intrusion detection model based on space-time fusion features and attention mechanism—CLT-net is *** this model,space-time fusion...
详细信息
ISBN:
(纸本)9781665431293
To solve the problem of low performance of network intrusion detection,a deep learning intrusion detection model based on space-time fusion features and attention mechanism—CLT-net is *** this model,space-time fusion features are obtained by integrating convolutional neural network and long short-time memory network,and attention module is added to calculate the importance of the input features,and softmax function is used for *** a large number of simulation experiments on NSL-KDD data sets,CLT-net has significantly improved the convergence of the training set and the accuracy of the test *** with the traditional CNN model with similar structure and the space-time fusion CLSTM the accuracy of the model increased by 11.8% and 10.9%*** shows that this model has great potential in the application field of network intrusion detection.
In this paper, the master-slave synchronization issue of chaotic Lur'e systems with time-varying-delay feedback control is investigated. Firstly, the synchronization problem of chaotic system is transformed into t...
In this paper, the master-slave synchronization issue of chaotic Lur'e systems with time-varying-delay feedback control is investigated. Firstly, the synchronization problem of chaotic system is transformed into the stability problem of chaotic synchronization error system, which is studied based on Lyapunov-Krasovskii functional(LKF) method. Secondly, a novel augmented LKF with more cross terms that related to time-varying delay is proposed. Based on the application of the relaxation integral inequality and the reciprocally convex matrix inequality, an improved synchronization criterion is derived by using the cubic function negative-determination lemma. Finally, a numerical simulation example demonstrates the effectiveness and advantages of the proposed methods.
At present, most research on the coverage of multi-agent systems is based on Euclidean distance. This does not consider the existence of obstacles and has great limitations in the application. In this paper, a kind of...
At present, most research on the coverage of multi-agent systems is based on Euclidean distance. This does not consider the existence of obstacles and has great limitations in the application. In this paper, a kind of coverage control problem based on high-order geodesic Voronoi partition is practically investigated. It allows multiple agents to monitor an area with obstacles to achieve the monitoring of the overall environment. As a result, the geodesic distance is introduced as a metric *** on the geodesic distance, point-by-point scanning on the layer is taken to achieve high-order Voronoi diagram *** coverage algorithm can be implemented in a distributed manner through the exchange of location information with each other, and the Lloyd algorithm is added to realize the movement of the sensor toward the optimal position.
A high-reliability constant current to constant voltage power supply system has the advantages of small volume of switching power supply,high power density,high efficiency was propos *** paper use two controllers to c...
A high-reliability constant current to constant voltage power supply system has the advantages of small volume of switching power supply,high power density,high efficiency was propos *** paper use two controllers to control the shunt regulator (SR) circuit and single-end flyback converter part,and separate the two parts for small signal modeling and give the parameters to stabilize the closed *** state space average modeling idea was used to solve the state equ ations for th e modes of the converters in a switching *** order to ensure the stability of cascade system,this paper collaborative optimization of hardware filter parameters and the appropriate PI parameter *** experimentals verify the correctness of our theory,and the system has good stability under closed-loop conditions.
The operations of blast furnaces(BFs) are very vital for the long-term stability of the iron making *** burden distribution and blast supply are the two major operation systems of *** present,the researches are lack e...
The operations of blast furnaces(BFs) are very vital for the long-term stability of the iron making *** burden distribution and blast supply are the two major operation systems of *** present,the researches are lack effective adjustment methods for the BF operations combined with burden distribution and blast *** burden distribution affects the iron making process on a long time scale,while the blast supply afects the iron making process on a short time *** paper presents a multi-time sampling-data adjustment strategy for the BF operations aiming at optimizing *** multiple time ***,this paper analyzes the relationship between the gas utilization ratio(GUR) and the burden distribution,the blast supply on multiple time ***,this paper establishes a prediction model of *** the long time scale and the short time scale based on autoregressive integrated moving average(ARIMA).Next,this paper provides a control strategy of burden distribution and a control strategy of blast supply by a prediction model based on support vector regression(SVR).Finally,this paper makes experiments and applies this method in a real-world *** analysis of the results shows the control strategy of the BF operations provides a good guide on making a suitable decision for burden distribution and blast supply.
In this paper, the stability of Amplidyne Electrical systems(AESs) with a time-varying delay is studied. Firstly,the model of AESs with a time-varying delay is established. Secondly, an augmented Lyapunov-Krasovskii f...
In this paper, the stability of Amplidyne Electrical systems(AESs) with a time-varying delay is studied. Firstly,the model of AESs with a time-varying delay is established. Secondly, an augmented Lyapunov-Krasovskii functional(LKF)is constructed. Then, a less conservative delay-dependent stability criterion for AESs with a time-varying delay is obtained by utilizing the generalized reciprocally convex combination and an advanced negative-determination quadratic function ***, the superiority and effectiveness of the proposed criterion is verified by a numerical example.
Landslide disasters are extremely *** identification of landslides plays an important role in disaster assessment,loss control and post-disaster *** paper proposes a semantic segmentation landslide identification meth...
Landslide disasters are extremely *** identification of landslides plays an important role in disaster assessment,loss control and post-disaster *** paper proposes a semantic segmentation landslide identification method based on improved *** deep convolution neural network and jump connection method is used for end-toend semantic segmentation to achieve deep feature extraction and fusion of different receptive fields,thus enriching feature *** modules are adopted to enhance the ability of the model to extract important features,so as to further improve the accuracy of model *** experiments show that our improved U-Net achieves better performance than the original algorithm on our landslide *** results of lou are improved by 4.12% which demonstrates our work is of great significance for the research of landslide area ***,the model is deployed to the web and applied to the geological hazard intelligent monitoring system to realize the landslide identification task.
This paper addresses the problem of state estimation for Markov jump genetic oscillator networks with time-varying delays based on hidden Markov model. Two non-identical types of time-varying delays, that is, the inte...
This paper addresses the problem of state estimation for Markov jump genetic oscillator networks with time-varying delays based on hidden Markov model. Two non-identical types of time-varying delays, that is, the intercellular coupling delay,and the regulatory delay are considered in consideration in genetic oscillator networks. Then a state estimator is designed by solving a set of linear matrix inequalities that can be solved with existing software. Finally, The effectiveness of state estimation approach can then be demonstrated through a numerical example.
This paper presents an improved stability criterion and controller design scheme condition for a networked controlsystem under denial of service(DoS) attack. Firstly, the DoS attack interval is divided into attack in...
This paper presents an improved stability criterion and controller design scheme condition for a networked controlsystem under denial of service(DoS) attack. Firstly, the DoS attack interval is divided into attack interval and no attack interval, therefore, a switching-like event-triggered control can be established to reduce the waste of network resources and improve network efficiency. Then, the studied system is transformed into a time-delay system, and an improved stability criterion and controller design method are established by using Lyapunov-Krasovskii functional(LKF). Finally, the effectiveness of the proposed method is verified by a simulation example.
A fault diagnosis method based on Discrete Hidden Markov Models is proposed in this paper to identify the fault causing alarm flood sequences. The proposed method consists of the following steps: First, the alarm floo...
A fault diagnosis method based on Discrete Hidden Markov Models is proposed in this paper to identify the fault causing alarm flood sequences. The proposed method consists of the following steps: First, the alarm flood data is pre-processed to ensure that all sequences are of uniform length, and a separate Discrete Hidden Markov model is trained for each fault to capture the relationship between the fault and the alarm sequences. Second, given an observation sequence, the log-likelihood probability values under different Discrete Hidden Markov models are calculated and the maximum probability is selected to determine the type of corresponding fault. Last, the feasibility of the proposed method is verified by simulation data obtained from a public industrial model. The results show that the method can effectively identify the faults that trigger alarm floods.
暂无评论