期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Meteorological Sensitivity Analysis of Kangbao Economic Development Zone
1
作者 Riyuan HAO xinglu li +4 位作者 Xue HU Haijiang ZHAO Lulu WANG Yuezhu HAO Fanhua MENG 《Meteorological and Environmental Research》 2025年第2期45-48,52,共5页
Kangbao County is located in the northwest of Bashang in Hebei Province,which is a sub-arid area in the middle temperate zone,with a cold and arid climate and frequent disastrous weather.The meteorological data of Kan... Kangbao County is located in the northwest of Bashang in Hebei Province,which is a sub-arid area in the middle temperate zone,with a cold and arid climate and frequent disastrous weather.The meteorological data of Kangbao County Meteorological Station from 1994 to 2023 were selected,and the meteorological elements such as air pressure,temperature,precipitation,wind,relative humidity,sunshine,thunderstorm,hail,gale,rainstorm,fog,and snow cover were counted.The climate background analysis and high-impact weather analysis were carried out in combination with the topographic characteristics,geographical location,and climate characteristics.The results of meteorological sensitivity survey in the park showed that industries such as food,agriculture and new energy are very sensitive to temperature.During the visit to the enterprises in the park,it was found that heavy precipitation,snow,strong winds and hail had a great impact on many industries,and it was recommended to carry out long-term planning and reasonable design of buildings.It should pay close attention to forecasts and early warnings,formulate emergency plans for high-impact weather defense,and actively take preventive measures. 展开更多
关键词 Climatic background analysis High-impact weather Sensitivity survey analysis Kangbao County
在线阅读 下载PDF
A Physical Layer Authentication Mechanism for IoT Devices 被引量:2
2
作者 xinglu li Kaizhi Huang +1 位作者 Shaoyu Wang Xiaoming Xu 《China Communications》 SCIE CSCD 2022年第5期129-140,共12页
When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to ... When Internet of Things(IoT)nodes access the network through wireless channels,the network is vulnerable to spoofing attacks and the Sybil attack.However,the connection of massive devices in IoT makes it difficult to manage and distribute keys,thus limiting the application of traditional high-level authentication schemes.Compared with the high-level authentication scheme,the physical layer authentication scheme realizes the lightweight authentication of users by comparing the wireless channel characteristics of adjacent packets.However,traditional physical layer authentication schemes still adopt the one-to-one authentication method,which will consume numerous network resources in the face of large-scale IoT node access authentication.In order to realize the secure access authentication of IoT nodes and regional intrusion detection with low resource consumption,we propose a physical layer authentication mechanism based on convolution neural network(CNN),which uses the deep characteristics of channel state information(CSI)to identify sending nodes in different locations.Specifically,we obtain the instantaneous CSI data of IoT sending nodes at different locations in the pre-set area,and then feed them into CNN for training to procure a model for IoT node authentication.With its powerful ability of data analysis and feature extraction,CNN can extract deep Spatio-temporal environment features of CSI data and bind them with node identities.Accordingly,an authentication mechanism which can distinguish the identity types of IoT nodes located in different positions is established to authenticate the identity of unknown nodes when they break into the pre-set area.Experimental results show that this authentication mechanism can still achieve 94.7%authentication accuracy in the case of a low signalto-noise ratio(SNR)of 0 dB,which means a significant improvement in authentication accuracy and robustness. 展开更多
关键词 IOT CSI CNN access authentication intrusion detection
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部