首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   1篇
工业技术   5篇
  2021年   1篇
  2016年   1篇
  2012年   1篇
  2004年   1篇
  2001年   1篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. It supervises the physical process from sensor data and performs remote monitoring control and diagnostic functions in critical infrastructures. The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. The machine learning algorithms have been performed with labeled output for prediction classification. The activity traffic between ICS components is analyzed and packet inspection of the dataset is performed for the ICS network. The features of flow-based network traffic are extracted for behavior analysis with port-wise profiling based on the data baseline, and anomaly detection classification and prediction using machine learning algorithms are performed.  相似文献   
2.
Multimedia traffic is expected to be included in the next generation of wireless networks. As in wireline networks, the wireless network must also be capable of providing guaranteed quality-of-service (QoS) over the lifetime of mobile connections. In this paper, a bandwidth reservation scheme incorporating a user mobility prediction is proposed to manage the QoS of the networks. The mobility prediction scheme is developed based on the aggregate history of mobile users. Based on the mobility prediction, bandwidth is reserved to guarantee the uninterrupted handoff process. Simulation results demonstrate that the proposed scheme can guarantee the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization.  相似文献   
3.
Cooperative multicast communication techniques for emerging broadband multimedia services over WiMAX reduces network resource consumption, by broadcasting the data simultaneously to multiple users independently of their number, on a common shared downlink channel. Users distributed around the cell face different channel conditions due to fading, user location, mobility, and other related issues. Recently, several schemes were reported in the literature that attempt to introduce cooperative multicasting reliably and efficiently, some of which utilize subscribers with good-channel as Relay Agents (RAs) to provide coverage for subscribers suffering bad-channel conditions but ignore the large amount of energy consumed in the process. In this paper, we propose energy-efficient cooperative multicasting schemes by properly selecting RAs based on their location, channel condition and coverage. By exploiting the channel state information (CSI) and the location based service (LBS), three protocols based on nearest neighbor, transmission distance and subscriber-subscriber interlink instantaneous CSI were proposed and implemented in order to improve the system’s energy consumption performance. Number of RAs was varied according to channel conditions on a frame-per-frame basis. This approach considerably reduces the amount of energy consumed as proven by analysis and simulation models, providing a lower cost coverage solution with no dereliction in achieved throughput.  相似文献   
4.
Green Internet of things (IoT) has been heralded as the next big thing waiting to be realized in energy-efficient ubiquitous computing. Green IoT revolves around increased machine-to-machine communications and encompasses energy-efficient wireless embedded sensors and actuators that assist in monitoring and controlling home appliances. Energy efficiency in home applications can be achieved by better monitoring of the specific energy consumption by the appliances. There are many wireless standards that can be adopted for the design of such embedded devices in IoT. These communication technologies cater to different requirements and are classified as the short-range and long-range ones. To select the best communication method, this paper surveys various IoT communication technologies and discusses the advantages and disadvantages to develop an energy monitoring system. An IoT device based on the Wi-Fi technology system is developed and tested for usage in the home energy monitoring environment. The performance of this system is then evaluated by the measurement of power consumption metrics. In the efficient deep-sleep mode, the system saves up to 0.3 W per cycle with an average power dissipation of less than 0.1 W/s.  相似文献   
5.
In this paper, we propose a new priority algorithm to control the access to the wireless ATM MAC uplink frame, for multimedia traffic like wireless ATM, similar to the Pseudo-Bayesian algorithm presented in [1]. The adaptive framed Pseudo-Bayesian Aloha (AFPBA) algorithm ensures minimum access delay for high priority traffic classes with small delay degradation to low priority traffic classes. Control packets are transmitted in each slot according to transmission probabilities based on the history of the channel and in contention with other packets of the same priority class. The number of contention slots assigned for each priority class, on a given frame, changes adaptively according to its priority index and the estimated arrival rate on each frame using an adaptive slot assignment mechanism. Finally, the throughput analysis of the algorithm is presented and the delay performance is evaluated by simulation on a wireless channel in the presence of shadowing, Rayleigh fading and capture. Results show that the wireless channel offers significant delay improvements to all priority packets, especially in the presence of fast fading.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号