期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
1
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
A novel AE source localization method using clustering detection to eliminate abnormal arrivals
2
作者 Yichao Rui Zilong Zhou +2 位作者 Jianyou Lu Barkat Ullah Xin Cai 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2022年第1期51-62,共12页
Due to the significant effect of abnormal arrivals on localization accuracy,a novel acoustic emission(AE)source localization method using clustering detection to eliminate abnormal arrivals is proposed in the paper.Fi... Due to the significant effect of abnormal arrivals on localization accuracy,a novel acoustic emission(AE)source localization method using clustering detection to eliminate abnormal arrivals is proposed in the paper.Firstly,iterative weight estimation is utilized to obtain accurate equation residuals.Secondly,according to the distribution of equation residuals,clustering detection is used to identify and exclude abnormal arrivals.Thirdly,the AE source coordinate is recalculated with remaining normal arrivals.Experimental results of pencil-lead breaks indicate that the proposed method can achieve a better localization result with and without abnormal arrivals.The results of simulation tests further demonstrate that the proposed method possesses higher localization accuracy and robustness under different anomaly ratios and scales;even with abnormal arrivals as high as 30%,the proposed localization method still holds a correct detection rate of 91.85%. 展开更多
关键词 Acoustic emission Source localization Abnormal arrivals clustering detection
下载PDF
Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks
3
作者 Khairol Amali bin Ahmad Mohammad Nazmul Hasan +1 位作者 Md.Sharif Hossen Khaleel Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第3期3075-3087,共13页
Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where t... Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT. 展开更多
关键词 Pocket switched networks routings distributed cluster detections delay tolerant networks mobility in network
下载PDF
Association discovery and outlier detection of air pollution emissions from industrial enterprises driven by big data
4
作者 Zhen Peng Yunxiao Zhang +1 位作者 Yunchong Wang Tianle Tang 《Data Intelligence》 EI 2023年第2期438-456,共19页
Air pollution is a major issue related to national economy and people's livelihood.At present,the researches on air pollution mostly focus on the pollutant emissions in a specific industry or region as a whole,and... Air pollution is a major issue related to national economy and people's livelihood.At present,the researches on air pollution mostly focus on the pollutant emissions in a specific industry or region as a whole,and is a lack of attention to enterprise pollutant emissions from the micro level.Limited by the amount and time granularity of data from enterprises,enterprise pollutant emissions are stll understudied.Driven by big data of air pollution emissions of industrial enterprises monitored in Beijing-Tianjin-Hebei,the data mining of enterprises pollution emissions is carried out in the paper,including the association analysis between different features based on grey association,the association mining between different data based on association rule and the outlier detection based on clustering.The results show that:(1)The industries affecting NOx and SO2 mainly are electric power,heat production and supply industry,metal smelting and processing industries in Beijing-Tianjin-Hebei;(2)These districts nearby Hengshui and Shijiazhuang city in Hebei province form strong association rules;(3)The industrial enterprises in Beijing-Tianjin-Hebei are divided into six clusters,of which three categories belong to outliers with excessive emissions of total vOCs,PM and NH3 respectively. 展开更多
关键词 Air Pollution Emissions of Enterprises Outlier detection based on clustering Association Rule Mining Grey Association Analysis Big data
原文传递
Simulating orthokinetic heterocoagulation and cluster growth in destabilizing suspensions
5
作者 Fabian Billow Hermann Nirschl Willy Dorfler 《Particuology》 SCIE EI CAS CSCD 2017年第2期117-128,共12页
Using direct numerical simulation, we investigate the coagulation behavior of non-Brownian colloidal particles as exemplified by Al2O3 particles. This yields the so-called capture efficiency, for which we give an anal... Using direct numerical simulation, we investigate the coagulation behavior of non-Brownian colloidal particles as exemplified by Al2O3 particles. This yields the so-called capture efficiency, for which we give an analytical expression, as well as other time-dependent variables such as the cluster growth rate. Instead of neglecting or strongly approximating the hydrodynamic interactions between particles, we include hydrodynamic and non-hydrodynamic interactions in a Stokesian dynamics approach and a comprehensive modeling of the interparticle forces. The resulting parallelized simulation framework enables us to investigate the dynamics of polydisperse particle systems composed of several hundred particles at the same high level of modeling we used for a close investigation of the coagulation behavior of two unequal particles in shear flow. Appropriate cluster detection yields all the information about large destabilizing systems, which is needed for models used in flow-sheet simulations. After non-dimensionalization, the results can be generalized and applied to other systems tending to secondary coagulation 展开更多
关键词 Destabilization Coagulation Capture efficiency Al2O3 cluster detection Stokesian dynamics
原文传递
Fast Community Detection Based on Distance Dynamics 被引量:2
6
作者 Lei Chen Jing Zhang +1 位作者 Lijun Cai Ziyun Deng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第6期564-585,共22页
The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this model is its very long computation time in large-scale netwo... The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this model is its very long computation time in large-scale networks. To identify the community structure of a large-scale network with high speed and high quality, in this paper, we propose a fast community detection algorithm, the F-Attractor, which is based on the distance dynamics model. The main contributions of the F-Attractor are as follows. First, we propose the use of two prejudgment rules from two different perspectives: node and edge. Based on these two rules, we develop a strategy of internal edge prejudgment for predicting the internal edges of the network. Internal edge prejudgment can reduce the number of edges and their neighbors that participate in the distance dynamics model. Second, we introduce a triangle distance to further enhance the speed of the interaction process in the distance dynamics model. This triangle distance uses two known distances to measure a third distance without any extra computation. We combine the above techniques to improve the distance dynamics model and then describe the community detection process of the F-Attractor. The results of an extensive series of experiments demonstrate that the F-Attractor offers high-speed community detection and high partition quality. 展开更多
关键词 community detection interaction model complex network graph clustering graph mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部