This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte...This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.展开更多
With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve suffi...With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve sufficient extraction of data features,which seriously affects the accuracy and performance of anomaly detection.Therefore,this paper proposes a deep learning-based anomaly detection model for power data,which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction.Aiming at the distribution variability of power data,this paper developed a sliding window-based data adjustment method for this model,which solves the problem of high-dimensional feature noise and low-dimensional missing data.To address the problem of insufficient feature fusion,an adaptive feature fusion method based on feature dimension reduction and dictionary learning is proposed to improve the anomaly data detection accuracy of the model.In order to verify the effectiveness of the proposed method,we conducted effectiveness comparisons through elimination experiments.The experimental results show that compared with the traditional anomaly detection methods,the method proposed in this paper not only has an advantage in model accuracy,but also reduces the amount of parameter calculation of the model in the process of feature matching and improves the detection speed.展开更多
Gravitational wave detection is one of the most cutting-edge research areas in modern physics, with its success relying on advanced data analysis and signal processing techniques. This study provides a comprehensive r...Gravitational wave detection is one of the most cutting-edge research areas in modern physics, with its success relying on advanced data analysis and signal processing techniques. This study provides a comprehensive review of data analysis methods and signal processing techniques in gravitational wave detection. The research begins by introducing the characteristics of gravitational wave signals and the challenges faced in their detection, such as extremely low signal-to-noise ratios and complex noise backgrounds. It then systematically analyzes the application of time-frequency analysis methods in extracting transient gravitational wave signals, including wavelet transforms and Hilbert-Huang transforms. The study focuses on discussing the crucial role of matched filtering techniques in improving signal detection sensitivity and explores strategies for template bank optimization. Additionally, the research evaluates the potential of machine learning algorithms, especially deep learning networks, in rapidly identifying and classifying gravitational wave events. The study also analyzes the application of Bayesian inference methods in parameter estimation and model selection, as well as their advantages in handling uncertainties. However, the research also points out the challenges faced by current technologies, such as dealing with non-Gaussian noise and improving computational efficiency. To address these issues, the study proposes a hybrid analysis framework combining physical models and data-driven methods. Finally, the research looks ahead to the potential applications of quantum computing in future gravitational wave data analysis. This study provides a comprehensive theoretical foundation for the optimization and innovation of gravitational wave data analysis methods, contributing to the advancement of gravitational wave astronomy.展开更多
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili...In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value.展开更多
As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and cha...As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies.展开更多
Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for position...Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for positioning of general aviation aircraft.Aim to acquire the accurate position information of aircraft and detect anomaly data,the ADS-B anomaly data detection model based on deep learning and difference of Gaussian(DoG)approach is proposed.First,according to the characteristic of ADS-B data,the ADS-B position data are transformed into the coordinate system.And the origin of the coordinate system is set up as the take-off point.Then,based on the kinematic principle,the ADS-B anomaly data can be removed.Moreover,the details of the ADS-B position data can be got by the DoG approach.Finally,the long short-term memory(LSTM)neural network is used to optimize the recurrent neural network(RNN)with severe gradient reduction for processing ADS-B data.The position data of ADS-B are reconstructed by the sequence to sequence(seq2seq)model which is composed of LSTM neural network,and the reconstruction error is used to detect the anomalous data.Based on the real flight data of general aviation aircraft,the simulation results show that the anomaly data can be detected effectively by the proposed method of reconstructing ADS-B data with the seq2seq model,and its running time is reduced.Compared with the RNN,the accuracy of anomaly detection is increased by 2.7%.The performance of the proposed model is better than that of the traditional anomaly detection models.展开更多
In order to improve the accuracy and consistency of data in health monitoring system,an anomaly detection algorithm for stay cables based on data fusion is proposed.The monitoring data of Nanjing No.3 Yangtze River Br...In order to improve the accuracy and consistency of data in health monitoring system,an anomaly detection algorithm for stay cables based on data fusion is proposed.The monitoring data of Nanjing No.3 Yangtze River Bridge is used as the basis of study.Firstly,an adaptive processing framework with feedback control is established based on the concept of data fusion.The data processing contains four steps:data specification,data cleaning,data conversion and data fusion.Data processing information offers feedback to the original data system,which further gives guidance for the sensor maintenance or replacement.Subsequently,the algorithm steps based on the continuous data distortion is investigated,which integrates the inspection data and the distribution test method.Finally,a group of cable force data is utilized as an example to verify the established framework and algorithm.Experimental results show that the proposed algorithm can achieve high detection accuracy,providing a valuable reference for other monitoring data processing.展开更多
This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Fr...This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Frequency Division Multiplexing(OFDM)receivers used for high speed and high spectral efficient wireless communication systems.The MAP cost function for joint estimation and detection is derived and optimized further with the proposed cyclic gradient descent optimization algorithm.The proposed joint estimation and detection algorithm relaxes the restriction of small PHN assumptions and utilizes the prior statistical knowledge of PHN spectral components to produce a statistically optimal solution.The frequency-domain estimation of Channel Transfer Function(CTF)in frequency selective fading makes the method simpler,compared with the estimation of Channel Impulse Response(CIR)in the time domain.Two different time-varying PHN models,produced by Free Running Oscillator(FRO)and Phase-Locked Loop(PLL)oscillator,are presented and compared for performance difference with proposed OFDM receiver.Simulation results for joint MAP channel estimation are compared with Cramer-Rao Lower Bound(CRLB),and the simulation results for joint MAP data detection are compared with“NO PHN"performance to demonstrate that the proposed joint MAP estimation and detection algorithm achieve near-optimum performance even under multipath channel fading.展开更多
The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional...The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining.展开更多
Microwave radiometer SSM/I data and scatterometer QuikSCAT data have been widely used for the icesheet near-surface snowmelt detection based on their sensitivity to liquid water present in snow. In order to improve th...Microwave radiometer SSM/I data and scatterometer QuikSCAT data have been widely used for the icesheet near-surface snowmelt detection based on their sensitivity to liquid water present in snow. In order to improve the Antarctic ice-sheet near-surface snowmelt detection accuracy, a new Antarctic icesheet near-surface snowmelt synergistic detection method was proposed based on the principle of complementary advantages of SSM/I data(high reliability) and QuikSCAT data(high sensitivity) by the use of edge detection model to automatically extract the edge information to get the distribution of Antarctic snowmelt onset date, snowmelt duration and snowmelt end date. The verification result shows that the proposed snowmelt synergistic detection method improves the detection accuracy from about 75% to 86% based on AWS(Automatic Weather Stations) Butler Island and Larsen Ice Shelf. The algorithm can also be applied to other regions, which provides methodological support and supplement for the global snowmelt detection.展开更多
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wirele...With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks.展开更多
Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,th...Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,the state observers of the system are designed to detect faults when they occur in the system.When the system is normal,the observers system is modeled as an uncertain switched system.Based on the model,stability condition of the whole system is given.When conditions are satisfied,the system is asymptotically stable.When a fault occurs,the observers residual can change rapidly to detect the fault.A numerical example shows the effectiveness of the proposed method.展开更多
Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclu...Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclusion of noise, inconsistent supply voltage and delay or loss of data in transfer. In order to manage, query or mine such data, data uncertainty needs to be considered. Hence,this paper studies the problem of top-k distance-based outlier detection from uncertain data objects. In this work, an uncertain object is modelled by a probability density function of a Gaussian distribution. The naive approach of distance-based outlier detection makes use of nested loop. This approach is very costly due to the expensive distance function between two uncertain objects. Therefore,a populated-cells list(PC-list) approach of outlier detection is proposed. Using the PC-list, the proposed top-k outlier detection algorithm needs to consider only a fraction of dataset objects and hence quickly identifies candidate objects for top-k outliers. Two approximate top-k outlier detection algorithms are presented to further increase the efficiency of the top-k outlier detection algorithm.An extensive empirical study on synthetic and real datasets is also presented to prove the accuracy, efficiency and scalability of the proposed algorithms.展开更多
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux...Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.展开更多
A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE...A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance.展开更多
Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics ...Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics of air pollutants(CO,HC,NO_(X),PM_(2.5))on the intercity road network of Guangdong Province by vehicle categories and road links were revealed based on vehicle identity detection data in real-life traffic for each hour in July 2018.The results showed that the spatial diversity of emissions caused by the unbalanced economywas obvious.The vehicle emissions in the Pearl River Delta region(PRD)with a higher economic level were approximately 1–2 times those in the non-Pearl RiverDelta region(non-PRD).Provincial roads with high loads became potential sources of high emissions.Therefore,emission control policies must emphasize the PRD and key roads by travel guidance to achieve greater reduction.Gasoline passenger cars with a large proportion of traffic dominated morning and evening peaks in the 24-hour period and were the dominant contributors to CO and HC emissions,contributing more than 50%in the daytime(7:00–23:00)and higher than 26%at night(0:00–6:00).Diesel trucks made up 10%of traffic,but were the dominant player at night,contributed 50%–90%to NO_(X) and PM_(2.5) emissions,with amarked 24-hour change rule of more than 80%at night(23:00–5:00)and less than 60%during daytime.Therefore,targeted control measures by time-section should be set up on collaborative control.These findings provide time-varying decision support for variable vehicle emission control on a large scale.展开更多
This Paper presents a data fusion method with distributed sequence detection for on hypothasis testingtheory including the data fusion algorithm of sequence detection based on least error probability rule, the decisio...This Paper presents a data fusion method with distributed sequence detection for on hypothasis testingtheory including the data fusion algorithm of sequence detection based on least error probability rule, the decision ruleand the calcation formula of the detction times and the simulation result of system performance as well.展开更多
Aiming at the shortcomings in intrusion detection systems (IDSs) used incommercial and research fields, we propose the MA-IDS system, a distributed intrusion detectionsystem based on data mining. In this model, misuse...Aiming at the shortcomings in intrusion detection systems (IDSs) used incommercial and research fields, we propose the MA-IDS system, a distributed intrusion detectionsystem based on data mining. In this model, misuse intrusion detection system CM1DS) and anomalyintrusion de-lection system (AIDS) are combined. Data mining is applied to raise detectionperformance, and distributed mechanism is employed to increase the scalability and efficiency. Host-and network-based mining algorithms employ an improved. Bayes-ian decision theorem that suits forreal security environment to minimize the risks incurred by false decisions. We describe the overallarchitecture of the MA-IDS system, and discuss specific design and implementation issue.展开更多
基金supported by the National Key Laboratory of Wireless Communications Foundation,China (IFN20230204)。
文摘This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.
文摘With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve sufficient extraction of data features,which seriously affects the accuracy and performance of anomaly detection.Therefore,this paper proposes a deep learning-based anomaly detection model for power data,which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction.Aiming at the distribution variability of power data,this paper developed a sliding window-based data adjustment method for this model,which solves the problem of high-dimensional feature noise and low-dimensional missing data.To address the problem of insufficient feature fusion,an adaptive feature fusion method based on feature dimension reduction and dictionary learning is proposed to improve the anomaly data detection accuracy of the model.In order to verify the effectiveness of the proposed method,we conducted effectiveness comparisons through elimination experiments.The experimental results show that compared with the traditional anomaly detection methods,the method proposed in this paper not only has an advantage in model accuracy,but also reduces the amount of parameter calculation of the model in the process of feature matching and improves the detection speed.
文摘Gravitational wave detection is one of the most cutting-edge research areas in modern physics, with its success relying on advanced data analysis and signal processing techniques. This study provides a comprehensive review of data analysis methods and signal processing techniques in gravitational wave detection. The research begins by introducing the characteristics of gravitational wave signals and the challenges faced in their detection, such as extremely low signal-to-noise ratios and complex noise backgrounds. It then systematically analyzes the application of time-frequency analysis methods in extracting transient gravitational wave signals, including wavelet transforms and Hilbert-Huang transforms. The study focuses on discussing the crucial role of matched filtering techniques in improving signal detection sensitivity and explores strategies for template bank optimization. Additionally, the research evaluates the potential of machine learning algorithms, especially deep learning networks, in rapidly identifying and classifying gravitational wave events. The study also analyzes the application of Bayesian inference methods in parameter estimation and model selection, as well as their advantages in handling uncertainties. However, the research also points out the challenges faced by current technologies, such as dealing with non-Gaussian noise and improving computational efficiency. To address these issues, the study proposes a hybrid analysis framework combining physical models and data-driven methods. Finally, the research looks ahead to the potential applications of quantum computing in future gravitational wave data analysis. This study provides a comprehensive theoretical foundation for the optimization and innovation of gravitational wave data analysis methods, contributing to the advancement of gravitational wave astronomy.
基金supported by Gansu Provincial Higher Education Teachers’Innovation Fund under Grant 2025A-124Key Research Project of Gansu University of Political Science and Law under Grant No.GZF2022XZD08Soft Science Special Project of Gansu Basic Research Plan under Grant No.22JR11RA106.
文摘In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value.
文摘As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies.
基金supported by the National Key R&D Program of China(No.2018AAA0100804)the Talent Project of Revitalization Liaoning(No.XLYC1907022)+5 种基金the Key R&D Projects of Liaoning Province(No.2020JH2/10100045)the Capacity Building of Civil Aviation Safety(No.TMSA1614)the Natural Science Foundation of Liaoning Province(No.2019-MS-251)the Scientific Research Project of Liaoning Provincial Department of Education(Nos.L201705,L201716)the High-Level Innovation Talent Project of Shenyang(No.RC190030)the Second Young and Middle-Aged Talents Support Program of Shenyang Aerospace University.
文摘Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for positioning of general aviation aircraft.Aim to acquire the accurate position information of aircraft and detect anomaly data,the ADS-B anomaly data detection model based on deep learning and difference of Gaussian(DoG)approach is proposed.First,according to the characteristic of ADS-B data,the ADS-B position data are transformed into the coordinate system.And the origin of the coordinate system is set up as the take-off point.Then,based on the kinematic principle,the ADS-B anomaly data can be removed.Moreover,the details of the ADS-B position data can be got by the DoG approach.Finally,the long short-term memory(LSTM)neural network is used to optimize the recurrent neural network(RNN)with severe gradient reduction for processing ADS-B data.The position data of ADS-B are reconstructed by the sequence to sequence(seq2seq)model which is composed of LSTM neural network,and the reconstruction error is used to detect the anomalous data.Based on the real flight data of general aviation aircraft,the simulation results show that the anomaly data can be detected effectively by the proposed method of reconstructing ADS-B data with the seq2seq model,and its running time is reduced.Compared with the RNN,the accuracy of anomaly detection is increased by 2.7%.The performance of the proposed model is better than that of the traditional anomaly detection models.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51208096)Major Scientific and Technological Special Project of Jiangsu Provincial Communications Department(Grant No.2014Y02)the Project of Jiangsu Provincial Communications Department(Grant No.2012Y25)
文摘In order to improve the accuracy and consistency of data in health monitoring system,an anomaly detection algorithm for stay cables based on data fusion is proposed.The monitoring data of Nanjing No.3 Yangtze River Bridge is used as the basis of study.Firstly,an adaptive processing framework with feedback control is established based on the concept of data fusion.The data processing contains four steps:data specification,data cleaning,data conversion and data fusion.Data processing information offers feedback to the original data system,which further gives guidance for the sensor maintenance or replacement.Subsequently,the algorithm steps based on the continuous data distortion is investigated,which integrates the inspection data and the distribution test method.Finally,a group of cable force data is utilized as an example to verify the established framework and algorithm.Experimental results show that the proposed algorithm can achieve high detection accuracy,providing a valuable reference for other monitoring data processing.
基金Supported by State Key Program of National Natural Science Foundation of China (60934009) National Natural Science Foundations of China (60801048 60974062)
文摘This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Frequency Division Multiplexing(OFDM)receivers used for high speed and high spectral efficient wireless communication systems.The MAP cost function for joint estimation and detection is derived and optimized further with the proposed cyclic gradient descent optimization algorithm.The proposed joint estimation and detection algorithm relaxes the restriction of small PHN assumptions and utilizes the prior statistical knowledge of PHN spectral components to produce a statistically optimal solution.The frequency-domain estimation of Channel Transfer Function(CTF)in frequency selective fading makes the method simpler,compared with the estimation of Channel Impulse Response(CIR)in the time domain.Two different time-varying PHN models,produced by Free Running Oscillator(FRO)and Phase-Locked Loop(PLL)oscillator,are presented and compared for performance difference with proposed OFDM receiver.Simulation results for joint MAP channel estimation are compared with Cramer-Rao Lower Bound(CRLB),and the simulation results for joint MAP data detection are compared with“NO PHN"performance to demonstrate that the proposed joint MAP estimation and detection algorithm achieve near-optimum performance even under multipath channel fading.
基金supported by Fundamental Research Funds for the Central Universities (No. 2018XD004)
文摘The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining.
基金supported by National Natural Science Foundation of China(Grant No. 41606209)supported by National Key Research and Development Program of China (Grant No. 2016YFB0501501)+3 种基金supported by Fujian Provincial Key Laboratory of Photonics Technology, Key Laboratory of Optoelectronic Science and Technology for Medicine of Ministry of Education, Fujian Normal University, China(Grant No. JYG1707)supported by Polar Science Strategic Research Foundation of China (Grant No. 20150312)supported by the Fundamental Research Funds for the Henan Provincial Colleges and Universities (Grant No. 2015QNJH16)supported by Science and technology project of Zhengzhou Science and Technology Bureau(Grant No. 20150251)
文摘Microwave radiometer SSM/I data and scatterometer QuikSCAT data have been widely used for the icesheet near-surface snowmelt detection based on their sensitivity to liquid water present in snow. In order to improve the Antarctic ice-sheet near-surface snowmelt detection accuracy, a new Antarctic icesheet near-surface snowmelt synergistic detection method was proposed based on the principle of complementary advantages of SSM/I data(high reliability) and QuikSCAT data(high sensitivity) by the use of edge detection model to automatically extract the edge information to get the distribution of Antarctic snowmelt onset date, snowmelt duration and snowmelt end date. The verification result shows that the proposed snowmelt synergistic detection method improves the detection accuracy from about 75% to 86% based on AWS(Automatic Weather Stations) Butler Island and Larsen Ice Shelf. The algorithm can also be applied to other regions, which provides methodological support and supplement for the global snowmelt detection.
基金the supports of the National Natural Science Foundation of China (60403027) the projects of science and research plan of Hubei provincial department of education (2003A011)the Natural Science Foundation Of Hubei Province of China (2005ABA243).
文摘With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks.
基金supported by the Natural Science Foundation of Jiangsu Province (BK2006202)
文摘Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,the state observers of the system are designed to detect faults when they occur in the system.When the system is normal,the observers system is modeled as an uncertain switched system.Based on the model,stability condition of the whole system is given.When conditions are satisfied,the system is asymptotically stable.When a fault occurs,the observers residual can change rapidly to detect the fault.A numerical example shows the effectiveness of the proposed method.
基金supported by Grant-in-Aid for Scientific Research(A)(#24240015A)
文摘Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclusion of noise, inconsistent supply voltage and delay or loss of data in transfer. In order to manage, query or mine such data, data uncertainty needs to be considered. Hence,this paper studies the problem of top-k distance-based outlier detection from uncertain data objects. In this work, an uncertain object is modelled by a probability density function of a Gaussian distribution. The naive approach of distance-based outlier detection makes use of nested loop. This approach is very costly due to the expensive distance function between two uncertain objects. Therefore,a populated-cells list(PC-list) approach of outlier detection is proposed. Using the PC-list, the proposed top-k outlier detection algorithm needs to consider only a fraction of dataset objects and hence quickly identifies candidate objects for top-k outliers. Two approximate top-k outlier detection algorithms are presented to further increase the efficiency of the top-k outlier detection algorithm.An extensive empirical study on synthetic and real datasets is also presented to prove the accuracy, efficiency and scalability of the proposed algorithms.
基金supported by the National Grand Fundamental Research "973" Program of China (2004CB318109)the National High-Technology Research and Development Plan of China (2006AA01Z452)the National Information Security "242"Program of China (2005C39).
文摘Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.
基金Supported by the National Natural Science Foundation of China (No. 61001105), the National Science and Technology Major Projects (No. 2011ZX03001- 007- 03) and Beijing Natural Science Foundation (No. 4102043).
文摘A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance.
基金supported by the Natural Science Foundation of China(No.U1811463,41975165)the National Key Research Program of China(No.2018YFB1601100)+1 种基金the Science Foundation Project of Guangdong(No.2019A1515010812)the Natural Science Research Start-up Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications(No.NY221125).
文摘Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics of air pollutants(CO,HC,NO_(X),PM_(2.5))on the intercity road network of Guangdong Province by vehicle categories and road links were revealed based on vehicle identity detection data in real-life traffic for each hour in July 2018.The results showed that the spatial diversity of emissions caused by the unbalanced economywas obvious.The vehicle emissions in the Pearl River Delta region(PRD)with a higher economic level were approximately 1–2 times those in the non-Pearl RiverDelta region(non-PRD).Provincial roads with high loads became potential sources of high emissions.Therefore,emission control policies must emphasize the PRD and key roads by travel guidance to achieve greater reduction.Gasoline passenger cars with a large proportion of traffic dominated morning and evening peaks in the 24-hour period and were the dominant contributors to CO and HC emissions,contributing more than 50%in the daytime(7:00–23:00)and higher than 26%at night(0:00–6:00).Diesel trucks made up 10%of traffic,but were the dominant player at night,contributed 50%–90%to NO_(X) and PM_(2.5) emissions,with amarked 24-hour change rule of more than 80%at night(23:00–5:00)and less than 60%during daytime.Therefore,targeted control measures by time-section should be set up on collaborative control.These findings provide time-varying decision support for variable vehicle emission control on a large scale.
文摘This Paper presents a data fusion method with distributed sequence detection for on hypothasis testingtheory including the data fusion algorithm of sequence detection based on least error probability rule, the decision ruleand the calcation formula of the detction times and the simulation result of system performance as well.
文摘Aiming at the shortcomings in intrusion detection systems (IDSs) used incommercial and research fields, we propose the MA-IDS system, a distributed intrusion detectionsystem based on data mining. In this model, misuse intrusion detection system CM1DS) and anomalyintrusion de-lection system (AIDS) are combined. Data mining is applied to raise detectionperformance, and distributed mechanism is employed to increase the scalability and efficiency. Host-and network-based mining algorithms employ an improved. Bayes-ian decision theorem that suits forreal security environment to minimize the risks incurred by false decisions. We describe the overallarchitecture of the MA-IDS system, and discuss specific design and implementation issue.