期刊文献+
共找到286篇文章
< 1 2 15 >
每页显示 20 50 100
An ECG Monitoring and Alarming System Based On Android Smart Phone 被引量:2
1
作者 Xiaoqiang Guo Xiaohui Duan +2 位作者 Hongqiao Gao Anpeng Huang Bingli Jiao 《Communications and Network》 2013年第3期584-589,共6页
ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring an... ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring and alarming system based on Android smart phone. In our system, an ECG device collects the ECG signal and transmits it to an Android phone. The Android phone detects alarms which come from the ECG devices. When alarms occur, Android phone will capture the ECG images and the details about the alarms, and sends them to the cloud Alarm Server (AS). Once received, AS push the messages to doctors’ phone, so the doctors could see the ECG images and alarm details on their mobile phone. In our system, high resolution ECG pictures are transmitted to doctors’ phone in a user-friendly way, which can help doctors keep track of their patient’s condition easily. 展开更多
关键词 ECG MONITORING system ANDROID SMART PHONE ALARM
暂未订购
Design Discussion of a Wireless Fire Alarm System Based on Data Fusion Technology 被引量:1
2
作者 Qun Wu Jinyang Wu 《Journal of Electronic Research and Application》 2025年第2期58-64,共7页
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi... This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system. 展开更多
关键词 Data fusion technology Fire alarm system Wireless alarm Hardware design Software design
在线阅读 下载PDF
High-precision laser monitoring system with enhanced non-uniform scanning for railway safety
3
作者 Yingying Yang Cheng Wang +6 位作者 Xiaoqi Liu Yu Liu Weier Lu Zhonglin Zhu Hongye Yan Guotang Zhao Xuechun Lin 《Railway Engineering Science》 2025年第1期79-93,共15页
The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railw... The intrusion of obstacles onto railway tracks presents a significant threat to train safety,characterized by sudden and unpredictable occurrences.With China leading the world in high-speed rail mileage,ensuring railway security is paramount.The current laser monitoring technologies suffer from high false alarm rates and unreliable intrusion identification.This study addresses these issues by investigating high-resolution laser monitoring technology for railway obstacles,focusing on key parameters such as monitoring range and resolution.We propose an enhanced non-uniform laser scanning method,developing a laser monitoring system that reduces the obstacle false alarm rate to 2.00%,significantly lower than the 20%standard(TJ/GW135-2015).This rate is the best record for laser monitoring systems on China Railway.Our system operates seamlessly in all weather conditions,providing superior accuracy,resolution,and identification efficiency.It is the only 3D LiDAR system certified by the China State Railway Group Co.,Ltd.(Certificate No.[2023]008).Over three years,our system has been deployed at numerous points along various lines managed by the China State Railway Group,accumulating a dataset of 300,000 observations.This extensive deployment has significantly enhanced railway safety.The development and implementation of our railway laser monitoring system represent a substantial advancement in railway safety technology.Its low false alarm rate(2.00%),high accuracy(20 cm×20 cm×20 cm),and robust performance in diverse conditions underscore its potential for widespread adoption,promising to enhance railway safety in China and internationally. 展开更多
关键词 Laser monitoring technology Non-uniform laser scanning method False alarm rate Railway safety
在线阅读 下载PDF
Feature extraction and damage alarming using time series analysis 被引量:4
4
作者 刘毅 李爱群 +1 位作者 费庆国 丁幼亮 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期86-91,共6页
Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis i... Aiming at the problem of on-line damage diagnosis in structural health monitoring (SHM), an algorithm of feature extraction and damage alarming based on auto-regressive moving-average (ARMA) time series analysis is presented. The monitoring data were first modeled as ARMA models, while a principalcomponent matrix derived from the AR coefficients of these models was utilized to establish the Mahalanobisdistance criterion functions. Then, a new damage-sensitive feature index DDSF is proposed. A hypothesis test involving the t-test method is further applied to obtain a decision of damage alarming as the mean value of DDSF had significantly changed after damage. The numerical results of a three-span-girder model shows that the defined index is sensitive to subtle structural damage, and the proposed algorithm can be applied to the on-line damage alarming in SHM. 展开更多
关键词 feature extraction damage alarming time series analysis structural health monitoring
在线阅读 下载PDF
Theoretical research on structural damage alarming of long-span bridges using wavelet packet analysis 被引量:5
5
作者 丁幼亮 李爱群 缪长青 《Journal of Southeast University(English Edition)》 EI CAS 2005年第4期459-462,共4页
The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response un... The state equation and observation equation of the structural dynamic systems under various analysis scales are derived based on wavelet packet analysis. The time-frequency properties of structural dynamic response under various scales are further formulated. The theoretical analysis results reveal that the wavelet packet energy spectrum (WPES) obtained from wavelet packet decomposition of structural dynamic response will detect the presence of structural damage. The sensitivity analysis of the WPES to structural damage and measurement noise is also performed. The transfer properties of the structural system matrix and the observation noise under various analysis scales are formulated, which verify the damage alarming reliability using the proposed WPES with preferable damage sensitivity and noise robusticity. 展开更多
关键词 structural damage alarming wavelet packet analysis wavelet packet energy spectrum long-span bridge
在线阅读 下载PDF
Multitask Data Processing in a Wireless Alarm System
6
作者 刘杰 韩月秋 宋雯霞 《Journal of Beijing Institute of Technology》 EI CAS 1998年第3期311-315,共5页
Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmi... Aim To achieve multitask data procssing in a wireless alarm system by computer. Methods The alarm system was composed of hardware and software. The hardware was composed of a master master computer and slave transmitters. On urgent ugent occasion, one or more of the transmitters transmitted alarm signals and the master computer received the signals; interruption, residence, graph and word processing were utilized in software to achieve multitiask data processing . Results The main computer can conduct precise and quick multitask data procesing in any condition so long as alarm signals are received. The processing speed is higher than ordinary alarm System. Conclusion The master computer can conduct safe and quick multitask data processing by way of reliable design of software and hardware , so there is no need of special processor. 展开更多
关键词 alarm system COMMUNICATION multitasks processing INTERRUPTION RESIDENCE
在线阅读 下载PDF
Useful Apps
7
作者 Christine Bedwell 《空中英语教室(初级版.大家说英语)》 2025年第10期42-43,55,56,共4页
Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short... Apps can help you in your daily life.For example,the app Kiwake helps you wake up.Its special alarm won't turn off until you do three things.You must take a picture of something far from your bed.Then play a short game to wake up your mind.After that,you must review your goals for the day. 展开更多
关键词 take picture something GAME play short game kiwake ALARM wake up useful apps PICTURE
原文传递
How nestlings of Oriental Reed Warbler respond to adult alarm calls
8
作者 Jiaojiao Wang Yongrui Feng +3 位作者 Laikun Ma Longwu Wang Canchao Yang Jianhua Hou 《Avian Research》 2025年第3期389-396,共8页
Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been exten... Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation. 展开更多
关键词 Alarm call Altricial nestling Oriental Reed Warbler PARASITE PREDATOR
在线阅读 下载PDF
Antipredator decisions of male Trinidadian guppies(Poecilia reticulata) depend on social cues from females
9
作者 Alix J.P.Brusseau Laurence E.A.Feyten +3 位作者 Adam L.Crane Indar W.Ramnarine Maud C.O.Ferrari Grant E.Brown 《Current Zoology》 2025年第2期205-211,共7页
Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,mal... Many prey species rely on publicly available personal and social information regarding local predation threats to assess risks and make contextappropriate behavioral decisions.However,in sexually dimorphic species,males and females are expected to differ in the perceived costs and/orbenefts associated with predator avoidance decisions.Recent studies suggest that male Trinidadian guppies(Poecilia reticulata)show reducedor absent responses to acute personal information cues,placing them at greater risk of predation relative to females.Our goal here was totest the hypothesis that adult(reproductively active)male guppies rely on social information to limit potential costs associated with their lack ofresponse to risky personal cues.Adult male guppies were exposed to personal chemosensory cues(either conspecifc alarm cues(AC),a novelodor,or a water control)in the presence of a shoal of three females inside a holding container that allowed the transmission of visual but notchemical cues.At the same time,we exposed females to either risk from AC or no risk,resulting in the display of a range of female behavior,from calm to alarmed,available as social information for males.Alarmed females caused male fright activity to increase and male interest infemales to decrease,regardless of the personal cue treatment.These results indicate that male guppies rely more on female information regarding predation risk than their own personal information,probably to balance trade-offs between reproduction and predator avoidance. 展开更多
关键词 alarm cues information sources predation risk sex differences trade-off
原文传递
Costly calling:Marmots who alarm call at higher rates are less likely to survive the summer and live shorter lives
10
作者 Daniel T.Blumstein Katie A.Adler Jazmine Uy 《Current Zoology》 2025年第4期425-431,共7页
Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on ... Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior. 展开更多
关键词 alarm calling predator deterrence PREDATION LONGEVITY
原文传递
Sparrowhawk imitation or convergent alarm signal?A new hypothesis for bubbling call of cuckoos with empirical testing
11
作者 Huisheng Wang Xiangyang Chen +2 位作者 Jiaojiao Wang Laikun Ma Canchao Yang 《Current Zoology》 2025年第4期449-455,共7页
Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of ot... Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry. 展开更多
关键词 acoustic mimicry anti-parasite strategy avian brood parasitism convergent alarm call syllable rate
原文传递
Research on Micro-vibration Generator for Powering Tire Pressure Alarm System
12
作者 张文静 闫海涛 +2 位作者 郑喜明 闫震 王东平 《Agricultural Science & Technology》 CAS 2015年第2期400-403,共4页
In order to meet the self-powered requirement by microelectronic products and micro-electrostatic vibration generator and avoid the environmental pollution caused by waste batteries,many countries have started their r... In order to meet the self-powered requirement by microelectronic products and micro-electrostatic vibration generator and avoid the environmental pollution caused by waste batteries,many countries have started their researches on piezoelectric power generation based on the researches on the recovery device of rotational energy of piezoelectric effect.The piezoelectric power generation has many advantages compared with other generation patterns.The piezoelectric power generation has become a new field of research.In this study,the piezoelectric vibrators were used to convert energy.According to the requirements by tire pressure alarm system,the energy conversion and storage were researched and analyzed by using the passive sensing device used in automotive inspection.The converted energy was then provided to the alarm,achieving intelligent control and utilization of piezoelectric vibrators. 展开更多
关键词 Piezoelectric power generation TIRE Alarm system
在线阅读 下载PDF
Damage alarming for bridge expansion joints using novelty detection technique based on long-term monitoring data 被引量:4
13
作者 缪长青 邓扬 +1 位作者 丁幼亮 李爱群 《Journal of Central South University》 SCIE EI CAS 2013年第1期226-235,共10页
Damage alarming and safety evaluation using long-term monitoring data is an area of significant research activity for long-span bridges. In order to extend the research in this field, the damage alarming technique for... Damage alarming and safety evaluation using long-term monitoring data is an area of significant research activity for long-span bridges. In order to extend the research in this field, the damage alarming technique for bridge expansion joints based on long-term monitoring data was developed. The effects of environmental factors on the expansion joint displacement were analyzed. Multiple linear regression models were obtained to describe the correlation between displacements and the dominant environmental factors. The damage alarming index was defined based on the multiple regression models. At last, the X-bar control chart was utilized to detect the abnormal change of the displacements. Analysis results reveal that temperature and traffic condition are the dominant environmental factors to influence the displacement. When the confidence level of X-bar control chart is set to be 0.003, the false-positive indications of damage can be avoided. The damage sensitivity analysis shows that the proper X-bar control chart can detect 0.1 cm damage-induced change of the expansion joint displacement. It is reasonably believed that the proposed technique is robust against false-positive indication of damage and suitable to alarm the possible future damage of the expansion joints. 展开更多
关键词 damage alarming expansion joint TEMPERATURE traffic condition control chart suspension bridge
在线阅读 下载PDF
Design of Intelligent Fire Alarm System for Large Storage Places Based on AVRmega128 Single Chip Microcomputer
14
作者 杨东星 李明儒 +1 位作者 刘南君 毛培宏 《Agricultural Science & Technology》 CAS 2014年第4期692-696,共5页
With principles of reliability, independence, practicality and economical effi- ciency, a set of intelligent fire alarm system based on AVRmega128 single chip microcomputer was designed to solve problems of fire alarm... With principles of reliability, independence, practicality and economical effi- ciency, a set of intelligent fire alarm system based on AVRmega128 single chip microcomputer was designed to solve problems of fire alarm system in many large- scale warehouses. Using advanced flame sensor, 485 bus communication, computer interactive software and related peripheral devices, this intelligent fire alarm system has functions of sound-light alarm and intelligent fire extinguishing. The human-com- puter interactive software was adopted for the remote control of the alarm main control panel through the 485 bus communication. This design of intelligent fire alarm system shows high reference and practical value to the development of intel- ligent alarm products with high integration and high reliability. 展开更多
关键词 AVRmega128 single chip microcomputer 485 bus communication Audi- ble and visual alarm Intelligent fire extinguishing Human-computer interaction
在线阅读 下载PDF
Sensor/Actuator Faults Detection for Networked Control Systems via Predictive Control 被引量:3
15
作者 Yu-Yan Zhang Jun-Ling Zhang +1 位作者 Xiao-Yuan Luo Xin-Ping Guan 《International Journal of Automation and computing》 EI CSCD 2013年第3期173-180,共8页
Quantized fault detection for sensor/actuator faults of networked control systems (NCSs) with time delays both in the sensor-to-controller channel and controller-to-actuator channel is concerned in this paper. A fau... Quantized fault detection for sensor/actuator faults of networked control systems (NCSs) with time delays both in the sensor-to-controller channel and controller-to-actuator channel is concerned in this paper. A fault model is set up based on the possible cases of sensor/atuator faults. Then, the model predictive control is used to compensate the time delay. When the sensors and actuators are healthy, an H stability criterion of the state predictive observer is obtained in terms of linear matrix inequality. A new threshold computational method that conforms to the actual situation is proposed. Then, the thresholds of the false alarm rate (FAR) and miss detection rate (MDR) are presented by using our proposed method, which are also compared with the ones given in the existin~ literatures. Finally, some numerical simulations are shown to demonstrate the effectiveness of the proposed method. 展开更多
关键词 Networked control system fault detection false alarm rate (FAR) miss detection rate (MDR) predictive control.
原文传递
Damage alarming of long-span suspension bridge based on GPS-RTK monitoring 被引量:8
16
作者 缪长青 王蔓 +2 位作者 田洪金 冯兆祥 陈策 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2800-2808,共9页
Structure damage identification and alarming of long-span bridge were conducted with three-dimensional dynamic displacement data collected by GPS subsystem of health monitoring system on Runyang Suspension Bridge.Firs... Structure damage identification and alarming of long-span bridge were conducted with three-dimensional dynamic displacement data collected by GPS subsystem of health monitoring system on Runyang Suspension Bridge.First,the effects of temperature on the main girder spatial position coordinates were analyzed from the transverse,longitudinal and vertical directions of bridge,and the correlation regression models were built between temperature and the position coordinates of main girder in the longitudinal and vertical directions;then the alarming indices of coordinate residuals were conducted,and the mean-value control chart was applied to making statistical pattern identification for abnormal changes of girder dynamic coordinates;and finally,the structural damage alarming method of main girder was established.Analysis results show that temperature has remarkable correlation with position coordinates in the longitudinal and vertical directions of bridge,and has weak correlation with the transverse coordinates.The 3%abnormal change of the longitudinal coordinates and 5%abnormal change of the vertical ones caused by structural damage are respectively identified by the mean-value control chart method based on GPS dynamic monitoring data and hence the structural abnormalities state identification and damage alarming for main girder of long-span suspension bridge can be realized in multiple directions. 展开更多
关键词 long-span suspension bridge damage alarming mean-value control chart GPS displacement temperature correlation
在线阅读 下载PDF
Systematic rationalization approach for multivariate correlated alarms based on interpretive structural modeling and Likert scale 被引量:5
17
作者 高慧慧 徐圆 +2 位作者 顾祥柏 林晓勇 朱群雄 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2015年第12期1987-1996,共10页
Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalizati... Alarm flood is one of the main problems in the alarm systems of industrial process. Alarm root-cause analysis and alarm prioritization are good for alarm flood reduction. This paper proposes a systematic rationalization method for multivariate correlated alarms to realize the root cause analysis and alarm prioritization. An information fusion based interpretive structural model is constructed according to the data-driven partial correlation coefficient calculation and process knowledge modification. This hierarchical multi-layer model is helpful in abnormality propagation path identification and root-cause analysis. Revised Likert scale method is adopted to determine the alarm priority and reduce the blindness of alarm handling. As a case study, the Tennessee Eastman process is utilized to show the effectiveness and validity of proposed approach. Alarm system performance comparison shows that our rationalization methodology can reduce the alarm flood to some extent and improve the performance. 展开更多
关键词 Alarm rationalization Root-cause analysis Alarm priority Interpretive structural modeling Likert scale Tennessee Eastman process
在线阅读 下载PDF
Fire-Detectors Review and Design of an Automated, Quick Responsive Fire-Alarm System Based on SMS 被引量:2
18
作者 Omar Asif Md. Belayat Hossain +2 位作者 Mamun Hasan Mir Toufikur Rahman Muhammad E. H. Chowdhury 《International Journal of Communications, Network and System Sciences》 2014年第9期386-395,共10页
In this work a review of existing fire-detector types has been carried out along with the development of a low cost, portable, and reliable microcontroller based automated fire alarm system for remotely alerting any f... In this work a review of existing fire-detector types has been carried out along with the development of a low cost, portable, and reliable microcontroller based automated fire alarm system for remotely alerting any fire incidents in household or industrial premises. The aim of the system designed is to alert the distant property-owner efficiently and quickly by sending short message (SMS) via GSM network. A Linear integrated temperature sensor detects temperature beyond preset value whereas semiconductor type sensor detects presence of smoke or gas from fire hazards. The sensor units are connected via common data line to ATMega8L AVR microcontroller. A SIM300CZ GSM kit based network module, capable of operating in standard GSM bands, has been used to send alert messages. The system is implemented on printed circuit board (PCB) and tested under different experimental conditions to evaluate its performances. 展开更多
关键词 Fire-Detector MICROCONTROLLER FIRE ALARM Temperature Sensor SMS GSM Network
暂未订购
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network 被引量:1
19
作者 Tarcizio Ferrao Franklin Manene Adeyemi Abel Ajibesin 《Computers, Materials & Continua》 SCIE EI 2023年第6期4985-5007,共23页
Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,f... Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset. 展开更多
关键词 Dataset selection false alarm intrusion detection systems IoT security machine learning SDN-IoT security software-defined networks
在线阅读 下载PDF
New acquisition decision algorithm for multiple access interference suppression in DSSS system 被引量:1
20
作者 Yongqing Wang Siliang Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第1期157-163,共7页
For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is ... For decreasing the multiple access interference of weaker signal acquisition in direct sequence spread spectrum(DSSS) systems,a new single decision algorithm is presented.The maximum value of correlation results is conventionally detected.However,there may be not only one strong peak among correlation results when the cross-correlation noise is strong enough to affect the correlation results.The proposed algorithm decreases the false alarm probability through the decision of the ratio of the maximum value and the second maximum value of the correlation results.Theoretical analysis and simulation results indicate that the proposed algorithm effectively suppresses the acquisition problem of multiple access interference in DSSS system. 展开更多
关键词 direct sequence spread spectrum(DSSS) multiple access interference ACQUISITION false alarm probability.
在线阅读 下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部