期刊文献+
共找到930篇文章
< 1 2 47 >
每页显示 20 50 100
Quantum Computing Based Neural Networks for Anomaly Classification in Real-Time Surveillance Videos
1
作者 MD.Yasar Arafath A.Niranjil Kumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2489-2508,共20页
For intelligent surveillance videos,anomaly detection is extremely important.Deep learning algorithms have been popular for evaluating realtime surveillance recordings,like traffic accidents,and criminal or unlawful i... For intelligent surveillance videos,anomaly detection is extremely important.Deep learning algorithms have been popular for evaluating realtime surveillance recordings,like traffic accidents,and criminal or unlawful incidents such as suicide attempts.Nevertheless,Deep learning methods for classification,like convolutional neural networks,necessitate a lot of computing power.Quantum computing is a branch of technology that solves abnormal and complex problems using quantum mechanics.As a result,the focus of this research is on developing a hybrid quantum computing model which is based on deep learning.This research develops a Quantum Computing-based Convolutional Neural Network(QC-CNN)to extract features and classify anomalies from surveillance footage.A Quantum-based Circuit,such as the real amplitude circuit,is utilized to improve the performance of the model.As far as my research,this is the first work to employ quantum deep learning techniques to classify anomalous events in video surveillance applications.There are 13 anomalies classified from the UCF-crime dataset.Based on experimental results,the proposed model is capable of efficiently classifying data concerning confusion matrix,Receiver Operating Characteristic(ROC),accuracy,Area Under Curve(AUC),precision,recall as well as F1-score.The proposed QC-CNN has attained the best accuracy of 95.65 percent which is 5.37%greater when compared to other existing models.To measure the efficiency of the proposed work,QC-CNN is also evaluated with classical and quantum models. 展开更多
关键词 Deep learning video surveillance quantum computing anomaly detection convolutional neural network
下载PDF
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology 被引量:3
2
作者 Emad Felemban 《International Journal of Communications, Network and System Sciences》 2013年第5期251-259,共9页
Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, sma... Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical applications such as military applications. This paper surveys the literature for experimenting work done in border surveillance and intrusion detection using the technology of WSN. The potential benefits of using WSN in border surveillance are huge;however, up to our knowledge very few attempts of solving many critical issues about this application could be found in the literature. 展开更多
关键词 Wireless Sensor network INTRUSION Detection BORDER surveillance PERIMETER surveillance REMOTE Monitoring
下载PDF
Data network traffic analysis and optimization strategy of real-time power grid dynamic monitoring system for wide-frequency measurements 被引量:4
3
作者 Jinsong Li Hao Liu +2 位作者 Wenzhuo Li Tianshu Bi Mingyang Zhao 《Global Energy Interconnection》 EI CAS CSCD 2022年第2期131-142,共12页
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ... The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests. 展开更多
关键词 Power system Data network Wide-frequency information real-time system Traffic analysis Optimization strategy
下载PDF
Social network analysis and modeling of cellphone-based syndromic surveillance data for ebola in Sierra Leone 被引量:1
4
作者 Jia B Kangbai 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2016年第9期829-833,共5页
Objective:To explore and visualize the connectivity of suspected Ebola cases and surveillance callers who used cellphone technology in Moyamba District in Sierra Leone for Ebola surveillance,and to examine the demogra... Objective:To explore and visualize the connectivity of suspected Ebola cases and surveillance callers who used cellphone technology in Moyamba District in Sierra Leone for Ebola surveillance,and to examine the demographic differences and characteristics of Ebola surveillance callers who make more calls as well as those callers who are more likely to make at least one positive Ebola call.Methods:Surveillance data for 393 suspected Ebola cases(192 males,201 females) were collected from October 23,2014 to June 28,2015 using cellphone technology.UCINET and Net Draw software were used to explore and visualize the social connectivity between callers and suspected Ebola cases.Poisson and logistic regression analyses were used to do multivariable analysis.Results:The entire social network was comprised of 393 ties and 745 nodes.Women(AOR=0.33,95% CI [0.14,0.81]) were associated with decreased odds of making at least one positive Ebola surveillance call compared to men.Women(IR= 0.63,95% CI [0.49,0.82]) were also associated with making fewer Ebola surveillance calls compared to men.Conclusion:Social network visualization can analyze syndromic surveillance data for Ebola collected by cellphone technology with unique insights. 展开更多
关键词 EBOLA SYNDROMIC surveillance SOCIAL network Analysis Cellphone Outdegree CENTRALITY
下载PDF
A deep reinforcement learning approach to gasoline blending real-time optimization under uncertainty
5
作者 Zhiwei Zhu Minglei Yang +3 位作者 Wangli He Renchu He Yunmeng Zhao Feng Qian 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第7期183-192,共10页
The gasoline inline blending process has widely used real-time optimization techniques to achieve optimization objectives,such as minimizing the cost of production.However,the effectiveness of real-time optimization i... The gasoline inline blending process has widely used real-time optimization techniques to achieve optimization objectives,such as minimizing the cost of production.However,the effectiveness of real-time optimization in gasoline blending relies on accurate blending models and is challenged by stochastic disturbances.Thus,we propose a real-time optimization algorithm based on the soft actor-critic(SAC)deep reinforcement learning strategy to optimize gasoline blending without relying on a single blending model and to be robust against disturbances.Our approach constructs the environment using nonlinear blending models and feedstocks with disturbances.The algorithm incorporates the Lagrange multiplier and path constraints in reward design to manage sparse product constraints.Carefully abstracted states facilitate algorithm convergence,and the normalized action vector in each optimization period allows the agent to generalize to some extent across different target production scenarios.Through these well-designed components,the algorithm based on the SAC outperforms real-time optimization methods based on either nonlinear or linear programming.It even demonstrates comparable performance with the time-horizon based real-time optimization method,which requires knowledge of uncertainty models,confirming its capability to handle uncertainty without accurate models.Our simulation illustrates a promising approach to free real-time optimization of the gasoline blending process from uncertainty models that are difficult to acquire in practice. 展开更多
关键词 Deep reinforcement learning Gasoline blending real-time optimization PETROLEUM Computer simulation Neural networks
下载PDF
Effects of real-time traffic information systems on traffic performance under different network structures 被引量:3
6
作者 YAO Xue-heng F.Benjamin ZHAN +1 位作者 LU Yong-mei YANG Min-hua 《Journal of Central South University》 SCIE EI CAS 2012年第2期586-592,共7页
The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage de... The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage depend on the road network structures.For traffic on a parallel network,the performance of groups with and without RTTIS level is improved when the proportion of vehicles using RTTIS is greater than 0 and less than 30%,and a proportion of RTTIS usage higher than 90%would actually deteriorate the performance.For both grid and ring networks,a higher proportion of RTTIS usage always improves the performance of groups with and without RTTIS.For all three network structures,vehicles without RTTIS benefit from some proportion of RTTIS usage in a system. 展开更多
关键词 real-time traffic information traffic network traffic efficiency optimization of urban traffic
下载PDF
A Real-Time TCP Stream Reassembly Mechanism in High-Speed Network 被引量:3
7
作者 熊兵 陈晓苏 陈宁 《Journal of Southwest Jiaotong University(English Edition)》 2009年第3期185-191,共7页
With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network str... With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network stream to perform packet processing at a semantic level above the network layer. This paper presents an efficient TCP stream reassembly mechanism for real-time processing of high-speed network traffic. By analyzing the characteristics of network stream in high-speed network and TCP connection establishment process, several polices for designing the reassembly mechanism are built. Then, the reassembly implementation is elaborated in accordance with the policies. Finally, the reassembly mechanism is compared with the traditional reassembly mechanism by the network traffic captured in a typical gigabit gateway. Experiment results illustrate that the reassembly mechanism is efficient and can satisfy the real-time property requirement of traffic analysis system in high-speed network. 展开更多
关键词 TCP stream reassembly High-speed network real-time property Reassembly policy
下载PDF
Anomaly Based Camera Prioritization in Large Scale Surveillance Networks 被引量:1
8
作者 Altaf Hussain Khan Muhammad +5 位作者 Hayat Ullah Amin Ullah Ali Shariq Imran Mi Young Lee Seungmin Rho Muhammad Sajjad 《Computers, Materials & Continua》 SCIE EI 2022年第2期2171-2190,共20页
Digital surveillance systems are ubiquitous and continuously generate massive amounts of data,and manual monitoring is required in order to recognise human activities in public areas.Intelligent surveillance systems t... Digital surveillance systems are ubiquitous and continuously generate massive amounts of data,and manual monitoring is required in order to recognise human activities in public areas.Intelligent surveillance systems that can automatically identify normal and abnormal activities are highly desirable,as these would allow for efficient monitoring by selecting only those camera feeds in which abnormal activities are occurring.This paper proposes an energy-efficient camera prioritisation framework that intelligently adjusts the priority of cameras in a vast surveillance network using feedback from the activity recognition system.The proposed system addresses the limitations of existing manual monitoring surveillance systems using a three-step framework.In the first step,the salient frames are selected from the online video stream using a frame differencing method.A lightweight 3D convolutional neural network(3DCNN)architecture is applied to extract spatio-temporal features from the salient frames in the second step.Finally,the probabilities predicted by the 3DCNN network and the metadata of the cameras are processed using a linear threshold gate sigmoid mechanism to control the priority of the camera.The proposed system performs well compared to state-of-theart violent activity recognition methods in terms of efficient camera prioritisation in large-scale surveillance networks.Comprehensive experiments and an evaluation of activity recognition and camera prioritisation showed that our approach achieved an accuracy of 98%with an F1-score of 0.97 on the Hockey Fight dataset,and an accuracy of 99%with an F1-score of 0.98 on the Violent Crowd dataset. 展开更多
关键词 Camera prioritisation surveillance networks convolutional neural network computer vision deep learning resource-constrained device violent activity recognition
下载PDF
UTILITY OPTIMIZATION SCHEDULING FOR MULTI-POINT VIDEO SURVEILLANCE IN UBIQUITOUS NETWORK 被引量:1
9
作者 Zhang Chen Huang Liusheng Xu Hongli 《Journal of Electronics(China)》 2013年第1期1-8,共8页
Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless networks are not suitable for the ubiquitous network environment, and they ... Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless networks are not suitable for the ubiquitous network environment, and they will harm the interest of individual users with instable resource requirements. This paper considers the multi-point video surveillance scenarios in a complex network environment with both wired and wireless networks. We introduce the utility estimated by the total costs of an individual network user. The problem is studied through mathematical modeling and we propose an improved problem-specific branch-and-cut algorithm to solve it. The algorithm follows the divide-and-conquer principle and fully considers the duality feature of network selection. The experiment is conducted by simulation through C and Lingo. And it shows that compared with a centralized random allocation scheme and a cost greed allocation scheme, the proposed scheme has better per- formance of reducing the total costs by 13.0% and 30.6% respectively for the user. 展开更多
关键词 Ubiquitous network Multi-point video surveillance Resource allocation
下载PDF
DuFNet:Dual Flow Network of Real-Time Semantic Segmentation for Unmanned Driving Application of Internet of Things 被引量:1
10
作者 Tao Duan Yue Liu +2 位作者 Jingze Li Zhichao Lian d Qianmu Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期223-239,共17页
The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving sy... The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving system by achieving road accessibility analysis.Semantic segmentation is also a challenging technology for image understanding and scene parsing.We focused on the challenging task of real-time semantic segmentation in this paper.In this paper,we proposed a novel fast architecture for real-time semantic segmentation named DuFNet.Starting from the existing work of Bilateral Segmentation Network(BiSeNet),DuFNet proposes a novel Semantic Information Flow(SIF)structure for context information and a novel Fringe Information Flow(FIF)structure for spatial information.We also proposed two kinds of SIF with cascaded and paralleled structures,respectively.The SIF encodes the input stage by stage in the ResNet18 backbone and provides context information for the feature fusionmodule.Features from previous stages usually contain rich low-level details but high-level semantics for later stages.Themultiple convolutions embed in Parallel SIF aggregate the corresponding features among different stages and generate a powerful global context representation with less computational cost.The FIF consists of a pooling layer and an upsampling operator followed by projection convolution layer.The concise component provides more spatial details for the network.Compared with BiSeNet,our work achieved faster speed and comparable performance with 72.34%mIoU accuracy and 78 FPS on Cityscapes Dataset based on the ResNet18 backbone. 展开更多
关键词 real-time semantic segmentation convolutional neural network feature fusion unmanned driving fringe information flow
下载PDF
Two-Phase Rate Adaptation Strategy for Improving Real-Time Video QoE in Mobile Networks 被引量:3
11
作者 Ailing Xiao Jie Liu +2 位作者 Yizhe Li Qiwei Song Ning Ge 《China Communications》 SCIE CSCD 2018年第10期12-24,共13页
With the popularity of smart handheld devices, mobile streaming video has multiplied the global network traffic in recent years. A huge concern of users' quality of experience(Qo E) has made rate adaptation method... With the popularity of smart handheld devices, mobile streaming video has multiplied the global network traffic in recent years. A huge concern of users' quality of experience(Qo E) has made rate adaptation methods very attractive. In this paper, we propose a two-phase rate adaptation strategy to improve users' real-time video Qo E. First, to measure and assess video Qo E, we provide a continuous Qo E prediction engine modeled by RNN recurrent neural network. Different from traditional Qo E models which consider the Qo E-aware factors separately or incompletely, our RNN-Qo E model accounts for three descriptive factors(video quality, rebuffering, and rate change) and reflects the impact of cognitive memory and recency. Besides, the video playing is separated into the initial startup phase and the steady playback phase, and we takes different optimization goals for each phase: the former aims at shortening the startup delay while the latter ameliorates the video quality and the rebufferings. Simulation results have shown that RNN-Qo E can follow the subjective Qo E quite well, and the proposed strategy can effectively reduce the occurrence of rebufferings caused by the mismatch between the requested video rates and the fluctuated throughput and attains standout performance on real-time Qo E compared with classical rate adaption methods. 展开更多
关键词 continuous quality of experience (QoE) model recurrent neural network(RNN) real-time video QoE improving dynamic adaptive streaming over HTTP (DASH)
下载PDF
Modeling and Statistical Properties Research on Online Real-Time Information Transmission Network 被引量:2
12
作者 Guangming Deng Zhen Jia 《Open Journal of Applied Sciences》 2014年第5期234-241,共8页
In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real... In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real-time information transmission network, and combined with the local world evolving characteristics in complex network, then the statistical topological properties of the network is obtained by numerical simulation. Furthermore, we simulated the process of information transmission on the network, according to the actual characteristics of the online real-time information transmission. Statistics show that the degree distribution presents the characteristics of scale free network, presenting power law distribution, while the average path length, the average clustering coefficient and the average size of the network also has a power-law relationship, moreover, the model parameters has no effect on power-law exponent. The spread of information on the network represents obvious fluctuation scaling, reflecting the characteristics that information transmission fluctuates over time. 展开更多
关键词 network INFORMATION TRANSMISSION real-time INFORMATION FLUCTUATION SCALING
下载PDF
A CNN-Based Single-Stage Occlusion Real-Time Target Detection Method
13
作者 Liang Liu Nan Yang +4 位作者 Saifei Liu Yuanyuan Cao Shuowen Tian Tiancheng Liu Xun Zhao 《Journal of Intelligent Learning Systems and Applications》 2024年第1期1-11,共11页
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m... Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection. 展开更多
关键词 real-time Mask Target CNN (Convolutional Neural network) Single-Stage Detection Multi-Scale Feature Perception
下载PDF
Action Recognition in Surveillance Videos with Combined Deep Network Models
14
作者 ZHANG Diankai ZHAO Rui-Wei +3 位作者 SHEN Lin CHEN Shaoxiang SUN Zhenfeng JIANG Yu-Gang 《ZTE Communications》 2016年第B12期54-60,共7页
Action recognition is an important topic in computer vision. Recently, deep learning technologies have been successfully used in lots of applications including video data for sloving recognition problems. However, mos... Action recognition is an important topic in computer vision. Recently, deep learning technologies have been successfully used in lots of applications including video data for sloving recognition problems. However, most existing deep learning based recognition frameworks are not optimized for action in the surveillance videos. In this paper, we propose a novel method to deal with the recognition of different types of actions in outdoor surveillance videos. The proposed method first introduces motion compensation to improve the detection of human target. Then, it uses three different types of deep models with single and sequenced images as inputs for the recognition of different types of actions. Finally, predictions from different models are fused with a linear model. Experimental results show that the proposed method works well on the real surveillance videos. 展开更多
关键词 action recognition deep network models model fusion surveillance video
下载PDF
Real-Time Prediction Algorithm for Intelligent Edge Networks with Federated Learning-Based Modeling
15
作者 Seungwoo Kang Seyha Ros +3 位作者 Inseok Song Prohim Tam Sa Math Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2023年第11期1967-1983,共17页
Intelligent healthcare networks represent a significant component in digital applications,where the requirements hold within quality-of-service(QoS)reliability and safeguarding privacy.This paper addresses these requi... Intelligent healthcare networks represent a significant component in digital applications,where the requirements hold within quality-of-service(QoS)reliability and safeguarding privacy.This paper addresses these requirements through the integration of enabler paradigms,including federated learning(FL),cloud/edge computing,softwaredefined/virtualized networking infrastructure,and converged prediction algorithms.The study focuses on achieving reliability and efficiency in real-time prediction models,which depend on the interaction flows and network topology.In response to these challenges,we introduce a modified version of federated logistic regression(FLR)that takes into account convergence latencies and the accuracy of the final FL model within healthcare networks.To establish the FLR framework for mission-critical healthcare applications,we provide a comprehensive workflow in this paper,introducing framework setup,iterative round communications,and model evaluation/deployment.Our optimization process delves into the formulation of loss functions and gradients within the domain of federated optimization,which concludes with the generation of service experience batches for model deployment.To assess the practicality of our approach,we conducted experiments using a hypertension prediction model with data sourced from the 2019 annual dataset(Version 2.0.1)of the Korea Medical Panel Survey.Performance metrics,including end-to-end execution delays,model drop/delivery ratios,and final model accuracies,are captured and compared between the proposed FLR framework and other baseline schemes.Our study offers an FLR framework setup for the enhancement of real-time prediction modeling within intelligent healthcare networks,addressing the critical demands of QoS reliability and privacy preservation. 展开更多
关键词 Edge computing federated logistic regression intelligent healthcare networks prediction modeling privacy-aware and real-time learning
下载PDF
A Novel Real-Time Fault Diagnostic System for Steam Turbine Generator Set by Using Strata Hierarchical Artificial Neural Network
16
作者 Changfeng YAN Hao ZHANG Lixiao WU 《Energy and Power Engineering》 2009年第1期7-16,共10页
The real-time fault diagnosis system is very great important for steam turbine generator set due to a serious fault results in a reduced amount of electricity supply in power plant. A novel real-time fault diagnosis s... The real-time fault diagnosis system is very great important for steam turbine generator set due to a serious fault results in a reduced amount of electricity supply in power plant. A novel real-time fault diagnosis system is proposed by using strata hierarchical fuzzy CMAC neural network. A framework of the fault diagnosis system is described. Hierarchical fault diagnostic structure is discussed in detail. The model of a novel fault diagnosis system by using fuzzy CMAC are built and analyzed. A case of the diagnosis is simulated. The results show that the real-time fault diagnostic system is of high accuracy, quick convergence, and high noise rejection. It is also found that this model is feasible in real-time fault diagnosis. 展开更多
关键词 real-time FAULT diagnosis STRATA HIERARCHICAL artificial neural network fuzzy CMAC
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
17
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security network Security Cyber Resilience real-time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Real-Time Upstream Services Demonstration in Orthogonal Frequency Division Multiplexing- Passive Optical Network System
18
作者 LI Ming Andrey Lukyanenko +1 位作者 Sasu Tarkoma Antti Yl-Jski 《China Communications》 SCIE CSCD 2014年第1期26-33,共8页
Abstract: Real-time digital service and mul- timedia service upstream transmission in Dig- ital Signal Processing (DSP)-based Orthogo- nal Frequency Division Multiplexing-Passive Optical Network (OFDM-PON) is exp... Abstract: Real-time digital service and mul- timedia service upstream transmission in Dig- ital Signal Processing (DSP)-based Orthogo- nal Frequency Division Multiplexing-Passive Optical Network (OFDM-PON) is experimen- tally demonstrated with Centralised Light Sou- rce (CLS) configuration in this paper. After transmitted over 25 km Standard Single Mode Fibre (SSMF) with -16.5 dBm optical power at receiver, the Bit Error Rate (BER) is 9.5 ×10^-11. The implementations of digital domain up-conversion and down-conversion based on Field Programmable Gate Array (FPGA) are int- roduced, which can reduce the cost of In-ph- ase and Quadrature (IQ) radio frequency mix- ers utilised at transmitter and receiver. A car- rier synchronization algorithm is implemented for compensating carrier offset. A channel eq- ualization algorithm is adopted for compen- sating the damage of channel. A new structure of Frequency Synchronization Unit (FSU) des- igned in FPGA is also proposed to cope with the frequency shifting at receiver. 展开更多
关键词 orthogonal frequency division multiplexing-passive optical network real-time field programmable gate array wavelength division multiplexing-OFDM-PON frequency synchronization
下载PDF
A Method for Detecting Intrusion on Networks in Real-time Based on IP Weight
19
作者 黄本雄 Lu +2 位作者 Wei Huang Zailu 《High Technology Letters》 EI CAS 2001年第2期34-38,共5页
A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analys... A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analysis to packet content. The method also provides a real-time efficient way to analyze traffic on high-speed network and can help to increase valid usage rates of network resources. Practical implementation as a rule in the rule base of our NMS has verified that the rule can detect not only attacks on network, but also other unusual behaviors. 展开更多
关键词 network security Intrusion detecting IP weight Detection of attacks real-time analysis
下载PDF
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
20
作者 Zheng Teng Ki-Il Kim 《Communications and Network》 2010年第2期104-112,共9页
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall... As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end. 展开更多
关键词 WIRELESS Sensor networks MEDIUM ACCESS Control (MAC) real-time
下载PDF
上一页 1 2 47 下一页 到第
使用帮助 返回顶部