The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a...The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.展开更多
National Auditing is established to sustain the Superstructure and supervise the economic order. In this article, the relative content and basic characters of Legislative Model National Auditing will be analyzed and e...National Auditing is established to sustain the Superstructure and supervise the economic order. In this article, the relative content and basic characters of Legislative Model National Auditing will be analyzed and evaluated. Some apocalypses which are useful to the auditing reformation of our country hope to find.展开更多
An N-gram Chinese language model incorporating linguistic rules is presented. By constructing elements lattice, rules information is incorporated in statistical frame. To facilitate the hybrid modeling, novel methods ...An N-gram Chinese language model incorporating linguistic rules is presented. By constructing elements lattice, rules information is incorporated in statistical frame. To facilitate the hybrid modeling, novel methods such as MI-based rule evaluating, weighted rule quantification and element-based n-gram probability approximation are presented. Dynamic Viterbi algorithm is adopted to search the best path in lattice. To strengthen the model, transformation-based error-driven rules learning is adopted. Applying proposed model to Chinese Pinyin-to-character conversion, high performance has been achieved in accuracy, flexibility and robustness simultaneously. Tests show correct rate achieves 94.81% instead of 90.53% using bi-gram Markov model alone. Many long-distance dependency and recursion in language can be processed effectively.展开更多
The IEC 61850 standard stipulates the Substation Configuration Description Language (SCL) file as a means to define the substation equipment, IED function and also the communication mechanism for the substation area n...The IEC 61850 standard stipulates the Substation Configuration Description Language (SCL) file as a means to define the substation equipment, IED function and also the communication mechanism for the substation area network. The SCL is an eXtensible Markup Language (XML) based file which helps to describe the configuration of the substation Intelligent Electronic Devices (IED) including their associated functions. The SCL file is also configured to contain all IED capabilities including data model which is structured into objects for easy descriptive modeling. The effective functioning of this SCL file relies on appropriate validation techniques which check the data model for errors due to non-conformity to the IEC 61850 standard. In this research, we extend the conventional SCL validation algorithm to develop a more advanced validator which can validate the standard data model using the Unified Modeling Language (UML). By using the Rule-based SCL validation tool, we implement validation test cases for a more comprehensive understanding of the various validation functionalities. It can be observed from the algorithm and the various implemented test cases that the proposed validation tool can improve SCL information validation and also help automation engineers to comprehend the IEC 61850 substation system architecture.展开更多
文摘The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults.
文摘National Auditing is established to sustain the Superstructure and supervise the economic order. In this article, the relative content and basic characters of Legislative Model National Auditing will be analyzed and evaluated. Some apocalypses which are useful to the auditing reformation of our country hope to find.
文摘An N-gram Chinese language model incorporating linguistic rules is presented. By constructing elements lattice, rules information is incorporated in statistical frame. To facilitate the hybrid modeling, novel methods such as MI-based rule evaluating, weighted rule quantification and element-based n-gram probability approximation are presented. Dynamic Viterbi algorithm is adopted to search the best path in lattice. To strengthen the model, transformation-based error-driven rules learning is adopted. Applying proposed model to Chinese Pinyin-to-character conversion, high performance has been achieved in accuracy, flexibility and robustness simultaneously. Tests show correct rate achieves 94.81% instead of 90.53% using bi-gram Markov model alone. Many long-distance dependency and recursion in language can be processed effectively.
文摘The IEC 61850 standard stipulates the Substation Configuration Description Language (SCL) file as a means to define the substation equipment, IED function and also the communication mechanism for the substation area network. The SCL is an eXtensible Markup Language (XML) based file which helps to describe the configuration of the substation Intelligent Electronic Devices (IED) including their associated functions. The SCL file is also configured to contain all IED capabilities including data model which is structured into objects for easy descriptive modeling. The effective functioning of this SCL file relies on appropriate validation techniques which check the data model for errors due to non-conformity to the IEC 61850 standard. In this research, we extend the conventional SCL validation algorithm to develop a more advanced validator which can validate the standard data model using the Unified Modeling Language (UML). By using the Rule-based SCL validation tool, we implement validation test cases for a more comprehensive understanding of the various validation functionalities. It can be observed from the algorithm and the various implemented test cases that the proposed validation tool can improve SCL information validation and also help automation engineers to comprehend the IEC 61850 substation system architecture.