The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks....The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.展开更多
An audio and video network monitoring system for weather modification operation transmitting information by 3G, ADSL and Internet has been developed and applied in weather modification operation of Tai'an City. The a...An audio and video network monitoring system for weather modification operation transmitting information by 3G, ADSL and Internet has been developed and applied in weather modification operation of Tai'an City. The all-in-one machine of 3G audio and video network highly integrates all front-end devices used for audio and video collection, communication, power supply and information storage, and has advantages of wireless video transmission, clear two-way voice intercom with the command center, waterproof and dustproof function, simple operation, good portability, and long working hours. Compression code of the system is transmitted by dynamic bandwidth, and compression rate varies from 32 kbps to 4 Mbps under different network conditions. This system has forwarding mode, that is, monitoring information from each front-end monitoring point is trans- mitted to the server of the command center by 3G/ADSL, and the server codes'and decodes again, then beck-end users call images from the serv- er, which can address 3G network stoppage caused by many users calling front-end video at the same time. In addition, the system has been ap- plied in surface weather modification operation of Tai'an City, and has made a great contribution to transmitting operation orders in real time, monitoring, standardizing and recording operating process, and improving operating safety.展开更多
In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network moni...In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.展开更多
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio...This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.展开更多
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje...We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.展开更多
Based on the nonlinear error equation of deformation network monitoring, the mathematical model of nonlinear dynamic optimal design of class two was put forward for the deformation network monitoring, in which the tar...Based on the nonlinear error equation of deformation network monitoring, the mathematical model of nonlinear dynamic optimal design of class two was put forward for the deformation network monitoring, in which the target function is the accuracy criterion and the constraint conditions are the network’s sensitivity, reliability and observing cost. Meanwhile a new non derivative solution to the nonlinear dynamic optimal design of class two was also put forward. The solving model uses the difference to stand for the first derivative of functions and solves the revised feasible direction to get the optimal solution to unknown parameters. It can not only make the solution to converge on the minimum point of the constraint problem, but decrease the calculating load.展开更多
The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also e...The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also expands the attack surface,introducing critical security vulnerabilities.To address these challenges,this article proposes a hybrid intrusion detection scheme for securing ICPSs that combines system state anomaly and network traffic anomaly detection.Specifically,an improved variation-Bayesian-based noise covariance-adaptive nonlinear Kalman filtering(IVB-NCA-NLKF)method is developed to model nonlinear system dynamics,enabling optimal state estimation in multi-sensor ICPS environments.Intrusions within the physical sensing system are identified by analyzing residual discrepancies between predicted and observed system states.Simultaneously,an adaptive network traffic anomaly detection mechanism is introduced,leveraging learned traffic patterns to detect node-and network-level anomalies through pattern matching.Extensive experiments on a simulated network control system demonstrate that the proposed framework achieves higher detection accuracy(92.14%)with a reduced false alarm rate(0.81%).Moreover,it not only detects known attacks and vulnerabilities but also uncovers stealthy attacks that induce system state deviations,providing a robust and comprehensive security solution for the safety protection of ICPS.展开更多
Purpose The BEPCII(Upgrade project of Beijing Electron Positron Collider)is a high-performance accelerator,composed of a vast array of front-end devices.When the accelerator is operational,high-speed,real-time data co...Purpose The BEPCII(Upgrade project of Beijing Electron Positron Collider)is a high-performance accelerator,composed of a vast array of front-end devices.When the accelerator is operational,high-speed,real-time data communication,and information exchange are necessary among its various subsystems.The network system of BEPCII is a critical infrastructure that ensures the normal operation and data transmission of the accelerator.Switches,as the core devices for constructing the accelerator’s control network and realizing data transmission and communication,play a vital role in the reliability and stability of the accelerator’s functioning.This study aims to design an accelerator network monitoring system based on a microservice architecture to monitor the data information of network devices such as switches.Methods and Results Remote management of switch configurations and monitoring of switch port statuses are implemented via the simple network management protocol.The working status data of the switches obtained are saved to a MySQL database to facilitate statistical queries and data analysis when called upon.Utilizing the Nameko microservice framework,different services such as storage,querying,and analysis are managed and invoked separately to prevent process waiting due to excessive data volumes or too many services being called simultaneously.Additionally,a variety of functional web front-end interfaces has been designed based on the Flask framework to improve human–machine interaction.By testing two switches,the system achieved monitoring of the switches’CPU usage,temperature,port status,and port traffic.Storage and querying of historical data were also enabled through the database,making data analysis more accessible.This study has fulfilled the monitoring and management requirements for the control network’s switch information through testing.The system will subsequently be deployed in the control network system of BEPCII.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Network monitoring is receiving more attention than ever with the need for a self-driving network to tackle increasingly severe network management challenges. Advanced management applications rely on traffic data anal...Network monitoring is receiving more attention than ever with the need for a self-driving network to tackle increasingly severe network management challenges. Advanced management applications rely on traffic data analyses, which require network monitoring to flexibly provide comprehensive traffic characteristics. Moreover, in virtualized environments, software network monitoring is constrained by available resources and requirements of cloud operators. In this paper, Trident, a policy-based network monitoring system at the host, is proposed. Trident is a novel monitoring approach, off-path configurable streaming, which offers remote analyzers a fine-grained holistic view of the network traffic. A novel fast path packet classification algorithm and a corresponding cached flow form are also proposed to improve monitoring efficiency. Evaluated in a practical deployment, Trident demonstrates negligible interference with forwarding and requires no additional software dependencies. Trident has been deployed in production networks of several Tier-IV datacenters.展开更多
Marine data buoy can provide a long-term, continuous, real-time, reliable data of ocean observation in a variety of complex marine environment. It is one of the most reliable, most effective and important means of oce...Marine data buoy can provide a long-term, continuous, real-time, reliable data of ocean observation in a variety of complex marine environment. It is one of the most reliable, most effective and important means of ocean monitoring technology. In this paper, the classification, main theory and technology system of marine data buoy are summarized. The typical technological breakthrough of the development of marine data buoy in recent years is summarized. The composition and application of marine monitoring network in China was introduced, and the gap between the technology of China's marine data buoy and the international advanced countries is compared.Combined on the situation and demand of China's current situation and needs, the development trend of marine data buoy and buoy monitoring network are expected.展开更多
Monitoring of regional groundwater levels provides important information for quantifying groundwater depletion and assessing impacts on the environment. Historically, groundwater level monitoring wells in Beijing Plai...Monitoring of regional groundwater levels provides important information for quantifying groundwater depletion and assessing impacts on the environment. Historically, groundwater level monitoring wells in Beijing Plain, China, were installed for assessing groundwater resources and for monitoring the cone of depression. Monitoring wells are clustered around well fields and urban areas. There is urgent need to upgrade the existing monitoring wells to a regional groundwater level monitoring network to acquire information for integrated water resources management. A new method was proposed for designing a regional groundwater level monitoring network. The method is based on groundwater regime zone mapping. Groundwater regime zone map delineates distinct areas of possible different groundwater level variations and is useful for locating groundwater monitoring wells. This method was applied to Beijing Plain to upgrade a regional groundwater level monitoring network.展开更多
The aircraft condition monitoring network is responsible for collecting the status of each component in aircraft. The reliability of this network has a significant effect on safety of the aircraft. The aircraft condit...The aircraft condition monitoring network is responsible for collecting the status of each component in aircraft. The reliability of this network has a significant effect on safety of the aircraft. The aircraft condition monitoring network works in a real-time manner that all the data should be transmitted within the deadline to ensure that the control center makes proper decision in time. Only the connectedness between the source node and destination cannot guarantee the data to be transmitted in time. In this paper, we take the time deadline into account and build the task-based reliability model. The binary decision diagram (BDD), which has the merit of efficiency in computing and storage space, is introduced when calculating the reliability of the network and addressing the essential variable. A case is analyzed using the algorithm proposed in this paper. The experimental results show that our method is efficient and proper for the reliability analysis of the real-time network.展开更多
In abandoned mine sites, i.e., mine sites where mining operations have ended, wide spread contaminations are often evident, but the potential sources and pathways of contamination especially through the subsurface, ar...In abandoned mine sites, i.e., mine sites where mining operations have ended, wide spread contaminations are often evident, but the potential sources and pathways of contamination especially through the subsurface, are difficult to identify due to inadequate and sparse geochemical measurements available. Therefore, it is essential to design and implement a planned monitoring net-work to obtain essential information required for establishing the potential contamination source locations, i.e., waste dumps, tailing dams, pits and possible pathways through the subsurface, and to design a remediation strategy for rehabilitation. This study presents an illustrative application of modeling the flow and transport processes and monitoring network design in a study area hydrogeologically resembling an abandoned mine site in Queensland, Australia. In this preliminary study, the contaminant transport process modeled does not incorporate the reactive geochemistry of the contaminants. The transport process is modeled considering a generic conservative contaminant for the illustrative purpose of showing the potential application of an optimal monitoring design methodology. This study aims to design optimal monitoring network to: 1) minimize the contaminant solute mass estimation error;2) locate the plume boundary;3) select the monitoring locations with (potentially) high concentrations. A linked simulation optimization based methodology is utilized for optimal monitoring network design. The methodology is applied utilizing a recently developed software package CARE-GWMND, developed at James Cook University for optimal monitoring network design. Given the complexity of the groundwater systems and the sparsity of pollutant concentration observation data from the field, this software is capable of simulating the groundwater flow and solute transport with spatial interpolation of data from a sparse set of available data, and it utilizes the optimization algorithm to determine optimum locations for implementing monitoring wells.展开更多
The used water for human consumption must be free of microorganisms and chemicals that cause risk in the human health. In this study, water quality of 18 rural area of Abarkouh was determined and compared the conventi...The used water for human consumption must be free of microorganisms and chemicals that cause risk in the human health. In this study, water quality of 18 rural area of Abarkouh was determined and compared the conventional monitoring method (According to ISIR (Institute of Standards and Industrial Research of Iran), 1053 and 4208) and use of electronic system method (Patent in industrial property general office of Iran, 77815). Free chlorine monitoring and pH test done by health workers in the conventional method and the results will be sent to the Health Network monthly. Sampling for microbiological testing is done monthly based on population (According to ISIR, 4208). On the electronic system, the procedure is also done by health workers, but the result will be sent to the receiver device by using a cell phone. According to the chlorine test results if the free chlorine residual reported zero, microbiological sampling was done by a health expert. Finally, the number of chlorine test and microbiological sampling and the results of these experiments collected in the both methods and recorded in SPSS 22 then were analyzed by using chi-square test and Fisher exact test. The result of microbiological experiments shows that the sampling rate decreased 29% in using of electronic system method in comparison to the conventional monitoring method while the number of microbial defect detection increased 19% in drinking water networks monitoring by electronic system. Using of electronic system monitoring can reduce the rate and cost of microbiological sampling and its experiments and increase accuracy of these tests, in this way it will increase the quality and safety of drinking water in distribution network in small and dispersed rural communities.展开更多
This paper proposes a simple method of optimizing Air Quality Monitoring Network (AQMN) using Geographical Information System (GIS), interpolation techniques and historical data. Existing air quality stations are syst...This paper proposes a simple method of optimizing Air Quality Monitoring Network (AQMN) using Geographical Information System (GIS), interpolation techniques and historical data. Existing air quality stations are systematically eliminated and the missing data are filled in using the most appropriate interpolation technique. The interpolated data are then compared with the observed data. Pre-defined performance measures root mean square error (RMSE), mean absolute percentage error (MAPE) and correlation coefficient (r) were used to check the accuracy of the interpolated data. An algorithm was developed in GIS environment and the process was simulated for several sets of measurements conducted in different locations in Riyadh, Saudi Arabia. This methodology proves to be useful to the decision makers to find optimal numbers of stations that are needed without compromising the coverage of the concentrations across the study area.展开更多
This work aims to provide a methodology framework which allows to improve the performance and efficiency of an air quality monitoring network(AQMN).It requires to be constituted by a minimum and reliable number of mea...This work aims to provide a methodology framework which allows to improve the performance and efficiency of an air quality monitoring network(AQMN).It requires to be constituted by a minimum and reliable number of measurement sites.Nevertheless,the AQMN efficiency should be assessed over time,as a consequence of the possible emergence of new emission sources of air pollutants,which could lead to variations on their spatial distribution within the target area.PM_(10)particles data monitored by the Community of Madrid's(Spain)AQMN between 2008 and 2017 were used to develop a methodology to optimize the AQMN performance.The annual spatial distribution of average PM_(10)levels over the studied period monitored by all current stations vs those more representative was provided by a geographic information system(GIS),and the percentage of similarity between both postulates was quantified using simple linear regression(>95%).As one innovative tool of this study,the practical application of the proposed methodology was validated using PM_(10)particles data measured by AQMN during 2007 and 2018,reaching a similitude degree higher than 95%.The influence of temporal variation on the proposed methodological framework was around 20%.The proposed methodology sets criteria for identifying non-redundant stations within AQMN,it is also able to appropriately assess the representativeness of fixed monitoring sites within an AQMN and it complements the guidelines set by European legislation on air pollutants monitoring at fixed stations,which could help to tackle efforts to improve the air quality management.展开更多
The WSN used in power line monitoring is long chain structure, and the bottleneck near the Sink node is more obvious. In view of this, A Sink nodes’ cooperation mechanism is presented. The Sink nodes from different W...The WSN used in power line monitoring is long chain structure, and the bottleneck near the Sink node is more obvious. In view of this, A Sink nodes’ cooperation mechanism is presented. The Sink nodes from different WSNs are adjacently deployed. Adopting multimode and spatial multiplexing network technology, the network is constructed into multi-mode-level to achieve different levels of data streaming. The network loads are shunted and the network resources are rationally utilized. Through the multi-sink nodes cooperation, the bottlenecks at the Sink node and its near several jump nodes are solved and process the competition of communication between nodes by channel adjustment. Finally, the paper analyzed the method and provided simulation experiment results. Simulation results show that the method can solve the funnel effect of the sink node, and get a good QoS.展开更多
Wireless Sensor Network provides a potential technique for monitoring the indoor environment. This paper presents a Building Monitoring system based on Wireless Sensor Networks. A clustering-based network specified fo...Wireless Sensor Network provides a potential technique for monitoring the indoor environment. This paper presents a Building Monitoring system based on Wireless Sensor Networks. A clustering-based network specified for building monitoring is proposed, which is inspired by LEACH (Low Energy Adaptive Cluster Hierarchy) method. Further, two key ideas are used to implement the clustering-based network. First, the configuration module of building management software is used to conduct all nodes in a room forming a local cluster. This cluster formation method does not consume node energy. Second, because cluster-heads cannot directly transmit packets to the sink node due to limited wireless communication range, the cluster-head communications are represented by a multi-hop tree rooted at the sink node. The experiment has been made to demonstrate the feasibility of the proposed results.展开更多
An entropy-based approach is applied to identify redundant wells in thenetwork. In the process of this research, groundwater-monitoring network is considered as acommunication system with a capability to transfer info...An entropy-based approach is applied to identify redundant wells in thenetwork. In the process of this research, groundwater-monitoring network is considered as acommunication system with a capability to transfer information, and monitoring wells are taken asinformation receivers. The concepts of entropy and mutual information are then applied to measurethe information content of individual monitoring well and information relationship betweenmonitoring well pairs. The efficiency of information transfer among monitoring wells is the basis tojudge the redundancy in the network. And the capacity of the monitoring wells to provideinformation on groundwater is the point of evaluation to identify redundant monitoring wells. Thisapproach is demonstrated using the data from a regional-scale ground-water network in Hebei plain,China The result shows that the entropy-based method is recommendable in optimizing groundwaternetworks, especially for those within media of higher heterogeneities and ani-sotropies.展开更多
基金funded by the Enterprise Ireland Innovation Partnership Programme with Ericsson under grant agreement IP/2011/0135[6]supported by the National Natural Science Foundation of China(No.61373131,61303039,61232016,61501247)+1 种基金the PAPDCICAEET funds
文摘The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.
基金Supported by the Integration and Application Project of Meteorological Key Technology of China Meteorological Administration(CMAGJ2012M30) Technology Development Projects of Tai'an Science and Technology Bureau in 2010 (201002045) and 2011
文摘An audio and video network monitoring system for weather modification operation transmitting information by 3G, ADSL and Internet has been developed and applied in weather modification operation of Tai'an City. The all-in-one machine of 3G audio and video network highly integrates all front-end devices used for audio and video collection, communication, power supply and information storage, and has advantages of wireless video transmission, clear two-way voice intercom with the command center, waterproof and dustproof function, simple operation, good portability, and long working hours. Compression code of the system is transmitted by dynamic bandwidth, and compression rate varies from 32 kbps to 4 Mbps under different network conditions. This system has forwarding mode, that is, monitoring information from each front-end monitoring point is trans- mitted to the server of the command center by 3G/ADSL, and the server codes'and decodes again, then beck-end users call images from the serv- er, which can address 3G network stoppage caused by many users calling front-end video at the same time. In addition, the system has been ap- plied in surface weather modification operation of Tai'an City, and has made a great contribution to transmitting operation orders in real time, monitoring, standardizing and recording operating process, and improving operating safety.
基金supported by the Natural Science Foundation of Guangxi Province(No.60961002)
文摘In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.
文摘This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.
文摘We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.
文摘Based on the nonlinear error equation of deformation network monitoring, the mathematical model of nonlinear dynamic optimal design of class two was put forward for the deformation network monitoring, in which the target function is the accuracy criterion and the constraint conditions are the network’s sensitivity, reliability and observing cost. Meanwhile a new non derivative solution to the nonlinear dynamic optimal design of class two was also put forward. The solving model uses the difference to stand for the first derivative of functions and solves the revised feasible direction to get the optimal solution to unknown parameters. It can not only make the solution to converge on the minimum point of the constraint problem, but decrease the calculating load.
基金supported by the National Natural Science Foundation of China(NSFC)under grant No.62371187the Hunan Provincial Natural Science Foundation of China under Grant Nos.2024JJ8309 and 2023JJ50495.
文摘The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also expands the attack surface,introducing critical security vulnerabilities.To address these challenges,this article proposes a hybrid intrusion detection scheme for securing ICPSs that combines system state anomaly and network traffic anomaly detection.Specifically,an improved variation-Bayesian-based noise covariance-adaptive nonlinear Kalman filtering(IVB-NCA-NLKF)method is developed to model nonlinear system dynamics,enabling optimal state estimation in multi-sensor ICPS environments.Intrusions within the physical sensing system are identified by analyzing residual discrepancies between predicted and observed system states.Simultaneously,an adaptive network traffic anomaly detection mechanism is introduced,leveraging learned traffic patterns to detect node-and network-level anomalies through pattern matching.Extensive experiments on a simulated network control system demonstrate that the proposed framework achieves higher detection accuracy(92.14%)with a reduced false alarm rate(0.81%).Moreover,it not only detects known attacks and vulnerabilities but also uncovers stealthy attacks that induce system state deviations,providing a robust and comprehensive security solution for the safety protection of ICPS.
基金Supported by the Strategic Priority Research Program of the Chinese Academy of Sciences,Grant No.XDB0530000.
文摘Purpose The BEPCII(Upgrade project of Beijing Electron Positron Collider)is a high-performance accelerator,composed of a vast array of front-end devices.When the accelerator is operational,high-speed,real-time data communication,and information exchange are necessary among its various subsystems.The network system of BEPCII is a critical infrastructure that ensures the normal operation and data transmission of the accelerator.Switches,as the core devices for constructing the accelerator’s control network and realizing data transmission and communication,play a vital role in the reliability and stability of the accelerator’s functioning.This study aims to design an accelerator network monitoring system based on a microservice architecture to monitor the data information of network devices such as switches.Methods and Results Remote management of switch configurations and monitoring of switch port statuses are implemented via the simple network management protocol.The working status data of the switches obtained are saved to a MySQL database to facilitate statistical queries and data analysis when called upon.Utilizing the Nameko microservice framework,different services such as storage,querying,and analysis are managed and invoked separately to prevent process waiting due to excessive data volumes or too many services being called simultaneously.Additionally,a variety of functional web front-end interfaces has been designed based on the Flask framework to improve human–machine interaction.By testing two switches,the system achieved monitoring of the switches’CPU usage,temperature,port status,and port traffic.Storage and querying of historical data were also enabled through the database,making data analysis more accessible.This study has fulfilled the monitoring and management requirements for the control network’s switch information through testing.The system will subsequently be deployed in the control network system of BEPCII.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金supported by the National Natural Science Foundation of China (No. 61872212)。
文摘Network monitoring is receiving more attention than ever with the need for a self-driving network to tackle increasingly severe network management challenges. Advanced management applications rely on traffic data analyses, which require network monitoring to flexibly provide comprehensive traffic characteristics. Moreover, in virtualized environments, software network monitoring is constrained by available resources and requirements of cloud operators. In this paper, Trident, a policy-based network monitoring system at the host, is proposed. Trident is a novel monitoring approach, off-path configurable streaming, which offers remote analyzers a fine-grained holistic view of the network traffic. A novel fast path packet classification algorithm and a corresponding cached flow form are also proposed to improve monitoring efficiency. Evaluated in a practical deployment, Trident demonstrates negligible interference with forwarding and requires no additional software dependencies. Trident has been deployed in production networks of several Tier-IV datacenters.
基金Taishan Scholars Construction Project Special Funds of Shandong Province
文摘Marine data buoy can provide a long-term, continuous, real-time, reliable data of ocean observation in a variety of complex marine environment. It is one of the most reliable, most effective and important means of ocean monitoring technology. In this paper, the classification, main theory and technology system of marine data buoy are summarized. The typical technological breakthrough of the development of marine data buoy in recent years is summarized. The composition and application of marine monitoring network in China was introduced, and the gap between the technology of China's marine data buoy and the international advanced countries is compared.Combined on the situation and demand of China's current situation and needs, the development trend of marine data buoy and buoy monitoring network are expected.
文摘Monitoring of regional groundwater levels provides important information for quantifying groundwater depletion and assessing impacts on the environment. Historically, groundwater level monitoring wells in Beijing Plain, China, were installed for assessing groundwater resources and for monitoring the cone of depression. Monitoring wells are clustered around well fields and urban areas. There is urgent need to upgrade the existing monitoring wells to a regional groundwater level monitoring network to acquire information for integrated water resources management. A new method was proposed for designing a regional groundwater level monitoring network. The method is based on groundwater regime zone mapping. Groundwater regime zone map delineates distinct areas of possible different groundwater level variations and is useful for locating groundwater monitoring wells. This method was applied to Beijing Plain to upgrade a regional groundwater level monitoring network.
基金National Natural Science Foundation of China (60879024)
文摘The aircraft condition monitoring network is responsible for collecting the status of each component in aircraft. The reliability of this network has a significant effect on safety of the aircraft. The aircraft condition monitoring network works in a real-time manner that all the data should be transmitted within the deadline to ensure that the control center makes proper decision in time. Only the connectedness between the source node and destination cannot guarantee the data to be transmitted in time. In this paper, we take the time deadline into account and build the task-based reliability model. The binary decision diagram (BDD), which has the merit of efficiency in computing and storage space, is introduced when calculating the reliability of the network and addressing the essential variable. A case is analyzed using the algorithm proposed in this paper. The experimental results show that our method is efficient and proper for the reliability analysis of the real-time network.
文摘In abandoned mine sites, i.e., mine sites where mining operations have ended, wide spread contaminations are often evident, but the potential sources and pathways of contamination especially through the subsurface, are difficult to identify due to inadequate and sparse geochemical measurements available. Therefore, it is essential to design and implement a planned monitoring net-work to obtain essential information required for establishing the potential contamination source locations, i.e., waste dumps, tailing dams, pits and possible pathways through the subsurface, and to design a remediation strategy for rehabilitation. This study presents an illustrative application of modeling the flow and transport processes and monitoring network design in a study area hydrogeologically resembling an abandoned mine site in Queensland, Australia. In this preliminary study, the contaminant transport process modeled does not incorporate the reactive geochemistry of the contaminants. The transport process is modeled considering a generic conservative contaminant for the illustrative purpose of showing the potential application of an optimal monitoring design methodology. This study aims to design optimal monitoring network to: 1) minimize the contaminant solute mass estimation error;2) locate the plume boundary;3) select the monitoring locations with (potentially) high concentrations. A linked simulation optimization based methodology is utilized for optimal monitoring network design. The methodology is applied utilizing a recently developed software package CARE-GWMND, developed at James Cook University for optimal monitoring network design. Given the complexity of the groundwater systems and the sparsity of pollutant concentration observation data from the field, this software is capable of simulating the groundwater flow and solute transport with spatial interpolation of data from a sparse set of available data, and it utilizes the optimization algorithm to determine optimum locations for implementing monitoring wells.
文摘The used water for human consumption must be free of microorganisms and chemicals that cause risk in the human health. In this study, water quality of 18 rural area of Abarkouh was determined and compared the conventional monitoring method (According to ISIR (Institute of Standards and Industrial Research of Iran), 1053 and 4208) and use of electronic system method (Patent in industrial property general office of Iran, 77815). Free chlorine monitoring and pH test done by health workers in the conventional method and the results will be sent to the Health Network monthly. Sampling for microbiological testing is done monthly based on population (According to ISIR, 4208). On the electronic system, the procedure is also done by health workers, but the result will be sent to the receiver device by using a cell phone. According to the chlorine test results if the free chlorine residual reported zero, microbiological sampling was done by a health expert. Finally, the number of chlorine test and microbiological sampling and the results of these experiments collected in the both methods and recorded in SPSS 22 then were analyzed by using chi-square test and Fisher exact test. The result of microbiological experiments shows that the sampling rate decreased 29% in using of electronic system method in comparison to the conventional monitoring method while the number of microbial defect detection increased 19% in drinking water networks monitoring by electronic system. Using of electronic system monitoring can reduce the rate and cost of microbiological sampling and its experiments and increase accuracy of these tests, in this way it will increase the quality and safety of drinking water in distribution network in small and dispersed rural communities.
文摘This paper proposes a simple method of optimizing Air Quality Monitoring Network (AQMN) using Geographical Information System (GIS), interpolation techniques and historical data. Existing air quality stations are systematically eliminated and the missing data are filled in using the most appropriate interpolation technique. The interpolated data are then compared with the observed data. Pre-defined performance measures root mean square error (RMSE), mean absolute percentage error (MAPE) and correlation coefficient (r) were used to check the accuracy of the interpolated data. An algorithm was developed in GIS environment and the process was simulated for several sets of measurements conducted in different locations in Riyadh, Saudi Arabia. This methodology proves to be useful to the decision makers to find optimal numbers of stations that are needed without compromising the coverage of the concentrations across the study area.
文摘This work aims to provide a methodology framework which allows to improve the performance and efficiency of an air quality monitoring network(AQMN).It requires to be constituted by a minimum and reliable number of measurement sites.Nevertheless,the AQMN efficiency should be assessed over time,as a consequence of the possible emergence of new emission sources of air pollutants,which could lead to variations on their spatial distribution within the target area.PM_(10)particles data monitored by the Community of Madrid's(Spain)AQMN between 2008 and 2017 were used to develop a methodology to optimize the AQMN performance.The annual spatial distribution of average PM_(10)levels over the studied period monitored by all current stations vs those more representative was provided by a geographic information system(GIS),and the percentage of similarity between both postulates was quantified using simple linear regression(>95%).As one innovative tool of this study,the practical application of the proposed methodology was validated using PM_(10)particles data measured by AQMN during 2007 and 2018,reaching a similitude degree higher than 95%.The influence of temporal variation on the proposed methodological framework was around 20%.The proposed methodology sets criteria for identifying non-redundant stations within AQMN,it is also able to appropriately assess the representativeness of fixed monitoring sites within an AQMN and it complements the guidelines set by European legislation on air pollutants monitoring at fixed stations,which could help to tackle efforts to improve the air quality management.
文摘The WSN used in power line monitoring is long chain structure, and the bottleneck near the Sink node is more obvious. In view of this, A Sink nodes’ cooperation mechanism is presented. The Sink nodes from different WSNs are adjacently deployed. Adopting multimode and spatial multiplexing network technology, the network is constructed into multi-mode-level to achieve different levels of data streaming. The network loads are shunted and the network resources are rationally utilized. Through the multi-sink nodes cooperation, the bottlenecks at the Sink node and its near several jump nodes are solved and process the competition of communication between nodes by channel adjustment. Finally, the paper analyzed the method and provided simulation experiment results. Simulation results show that the method can solve the funnel effect of the sink node, and get a good QoS.
文摘Wireless Sensor Network provides a potential technique for monitoring the indoor environment. This paper presents a Building Monitoring system based on Wireless Sensor Networks. A clustering-based network specified for building monitoring is proposed, which is inspired by LEACH (Low Energy Adaptive Cluster Hierarchy) method. Further, two key ideas are used to implement the clustering-based network. First, the configuration module of building management software is used to conduct all nodes in a room forming a local cluster. This cluster formation method does not consume node energy. Second, because cluster-heads cannot directly transmit packets to the sink node due to limited wireless communication range, the cluster-head communications are represented by a multi-hop tree rooted at the sink node. The experiment has been made to demonstrate the feasibility of the proposed results.
文摘An entropy-based approach is applied to identify redundant wells in thenetwork. In the process of this research, groundwater-monitoring network is considered as acommunication system with a capability to transfer information, and monitoring wells are taken asinformation receivers. The concepts of entropy and mutual information are then applied to measurethe information content of individual monitoring well and information relationship betweenmonitoring well pairs. The efficiency of information transfer among monitoring wells is the basis tojudge the redundancy in the network. And the capacity of the monitoring wells to provideinformation on groundwater is the point of evaluation to identify redundant monitoring wells. Thisapproach is demonstrated using the data from a regional-scale ground-water network in Hebei plain,China The result shows that the entropy-based method is recommendable in optimizing groundwaternetworks, especially for those within media of higher heterogeneities and ani-sotropies.