首页 > 最新文献

International Journal of Circuits, Systems and Signal Processing最新文献

英文 中文
A Lightweight Hardware Secure and Reliable Framework using Secure and Provable PUF for IoT Devices against the Machine Learning Attack 一个轻量级硬件安全可靠的框架,使用安全且可证明的PUF,用于物联网设备对抗机器学习攻击
Q4 Engineering Pub Date : 2022-01-17 DOI: 10.46300/9106.2022.16.86
K. Y. Annapurna, Deepali Koppad
IoT (Internet of Things) has been expanding into various business activities and people’s lives; however, IoT devices face security challenges. Further, the establishment of reliable security for IoT constrained devices is considered to be ongoing research due to several factors such as device cost, implementation area, power consumption, and so on. In addition to these factors, hardware security also poses major challenges like above mentioned; further Physical Unclonable Functions (PUFs) offer a promising solution for the authentication of IoT devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs are vulnerable to modelling attacks; in this research work, a lightweight hardware security framework is designed that provides the security for light edge devices. The proposed hardware security framework introduces the three-step optimized approach to offer a secure and reliable solution for IoT device authentication. The first step deals with the designing of SP-PUF, the second step deals with introducing obfuscation technique into the same, and the third step deals with introducing the authentication mechanism. A machine learning attack is designed to evaluate the model and the proposed model is evaluated considering the different stages. This research work is evaluated in two parts; the first part of the evaluation is carried out for the security mechanism through machine learning algorithm attack i.e., logistic regression, Neural Network, and SVM; further evaluation is carried out considering the PUF evaluation parameter as uniqueness and reliability. At last, comparative analysis suggest that proposed hardware security framework is safe against the machine learning attacks and achieves high reliability and optimal uniqueness.
IoT (Internet of Things,物联网)已经扩展到各种商业活动和人们的生活中;然而,物联网设备面临着安全挑战。此外,由于设备成本、实施面积、功耗等因素,为物联网受限设备建立可靠的安全性被认为是正在进行的研究。除了这些因素,硬件安全也带来了如上所述的主要挑战;进一步的物理不可克隆功能(puf)为物联网设备的身份验证提供了一个很有前途的解决方案,因为它们通过其挑战-响应对为底层设备提供了唯一的指纹。然而,puf很容易受到建模攻击;本研究设计了一个轻量级的硬件安全框架,为轻边缘设备提供安全保障。提出的硬件安全框架引入了三步优化方法,为物联网设备认证提供安全可靠的解决方案。第一步是SP-PUF的设计,第二步是引入混淆技术,第三步是引入认证机制。设计了一种机器学习攻击来评估模型,并考虑不同的阶段对所提出的模型进行评估。本研究工作分为两部分进行评价;第一部分通过机器学习算法攻击,即逻辑回归、神经网络和支持向量机,对安全机制进行评估;考虑PUF评价参数的唯一性和可靠性进行进一步评价。最后,对比分析表明,所提出的硬件安全框架能够抵御机器学习攻击,具有较高的可靠性和最优唯一性。
{"title":"A Lightweight Hardware Secure and Reliable Framework using Secure and Provable PUF for IoT Devices against the Machine Learning Attack","authors":"K. Y. Annapurna, Deepali Koppad","doi":"10.46300/9106.2022.16.86","DOIUrl":"https://doi.org/10.46300/9106.2022.16.86","url":null,"abstract":"IoT (Internet of Things) has been expanding into various business activities and people’s lives; however, IoT devices face security challenges. Further, the establishment of reliable security for IoT constrained devices is considered to be ongoing research due to several factors such as device cost, implementation area, power consumption, and so on. In addition to these factors, hardware security also poses major challenges like above mentioned; further Physical Unclonable Functions (PUFs) offer a promising solution for the authentication of IoT devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs are vulnerable to modelling attacks; in this research work, a lightweight hardware security framework is designed that provides the security for light edge devices. The proposed hardware security framework introduces the three-step optimized approach to offer a secure and reliable solution for IoT device authentication. The first step deals with the designing of SP-PUF, the second step deals with introducing obfuscation technique into the same, and the third step deals with introducing the authentication mechanism. A machine learning attack is designed to evaluate the model and the proposed model is evaluated considering the different stages. This research work is evaluated in two parts; the first part of the evaluation is carried out for the security mechanism through machine learning algorithm attack i.e., logistic regression, Neural Network, and SVM; further evaluation is carried out considering the PUF evaluation parameter as uniqueness and reliability. At last, comparative analysis suggest that proposed hardware security framework is safe against the machine learning attacks and achieves high reliability and optimal uniqueness.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90178272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation Analysis of Effect of Vacancies on Ferroic Domain Growth of BaTiO^3 空位对BaTiO^3铁畴生长影响的模拟分析
Q4 Engineering Pub Date : 2022-01-14 DOI: 10.46300/9106.2021.15.197
T. Tsuzuki, S. Ogata, R. Kobayashi, Masayuki Uranagase, Seiya Shimoi, Saki Tsujimoto
BaTiO3 is one of the well-known ferroelectric and piezoelectric materials, which has been widely used in various devices. However, the microscopic mechanism of the ferroelectric domain growth is not understood well. We investigated the effects of point defects, mono- and di-vacancies of Ba, Ti, and O, on the domain growth of BaTiO3 using molecular dynamics simulation with the core-shell inter-atomic potential. We found the following: s(1) One kind of monovacancy, VO1, located on the TiO plane perpendicular to the applied electric field direction, acts to hinder the polarization inversion induced by the applied electric field. The monopole electric field produced by VO1 either hinders or assists the local polarization inversion in accordance with the local intensity of the total electric field. (2) The 1st-neighbor divacancies VBa-VO and VTi-VO as compared to the 2nd-neighbor divacancies asymmetrically affect the domain growth with respect to the applied electric field, making the hysteresis behavior of applied electric field vs. polarization relation. The domain grows even at a small electric field when the directions of the applied electric field and the divacancy dipole are mutually the same. (3) The domain growth speed towards the applied electric field direction is about 2 orders of magnitude higher than that towards the perpendicular direction.
BaTiO3是一种众所周知的铁电和压电材料,广泛应用于各种器件中。然而,铁电畴生长的微观机制尚不清楚。利用核壳原子间势的分子动力学模拟研究了Ba、Ti和O的点缺陷、单空位和双空位对BaTiO3结构域生长的影响。结果表明:(1)垂直于外加电场方向的TiO平面上存在一种单空位VO1,对外加电场引起的极化反转起抑制作用。根据总电场的局域强度,VO1产生的单极电场或阻碍或促进局域极化反转。(2)与第二邻差相比,第一邻差VBa-VO和VTi-VO对外加电场的畴生长有不对称的影响,使得外加电场的迟滞行为与极化关系。当外加电场的方向与距离偶极子的方向相同时,即使在很小的电场下,畴也会生长。(3)向外加电场方向的畴生长速度比向垂直方向的畴生长速度高2个数量级。
{"title":"Simulation Analysis of Effect of Vacancies on Ferroic Domain Growth of BaTiO^3","authors":"T. Tsuzuki, S. Ogata, R. Kobayashi, Masayuki Uranagase, Seiya Shimoi, Saki Tsujimoto","doi":"10.46300/9106.2021.15.197","DOIUrl":"https://doi.org/10.46300/9106.2021.15.197","url":null,"abstract":"BaTiO3 is one of the well-known ferroelectric and piezoelectric materials, which has been widely used in various devices. However, the microscopic mechanism of the ferroelectric domain growth is not understood well. We investigated the effects of point defects, mono- and di-vacancies of Ba, Ti, and O, on the domain growth of BaTiO3 using molecular dynamics simulation with the core-shell inter-atomic potential. We found the following: s(1) One kind of monovacancy, VO1, located on the TiO plane perpendicular to the applied electric field direction, acts to hinder the polarization inversion induced by the applied electric field. The monopole electric field produced by VO1 either hinders or assists the local polarization inversion in accordance with the local intensity of the total electric field. (2) The 1st-neighbor divacancies VBa-VO and VTi-VO as compared to the 2nd-neighbor divacancies asymmetrically affect the domain growth with respect to the applied electric field, making the hysteresis behavior of applied electric field vs. polarization relation. The domain grows even at a small electric field when the directions of the applied electric field and the divacancy dipole are mutually the same. (3) The domain growth speed towards the applied electric field direction is about 2 orders of magnitude higher than that towards the perpendicular direction.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79124113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analytical Model for Separated Frequency Signature of Outer Race Bearing Fault From Static Eccentricity 外滚道轴承静态偏心故障分离频率特征分析模型
Q4 Engineering Pub Date : 2022-01-11 DOI: 10.46300/9106.2021.15.196
Touil Abderrahim, Babaa Fatima, Bennis Ouafae, Kratz Frédéric
The present paper addresses a precise and an accurate mathematical model for three-phase squirrel cage induction motors, based on winding function theory. Through an analytical development, a comparative way is presented to separate the signature between the existence of the outer race bearing fault and the static eccentricity concerning the asymmetry of the air gap between the stator and the rotor. This analytical model proposes an effective signature of outer race defect separately from other signatures of static eccentricity. Simulation and experimental results are presented to validate the proposed analytical model.
本文以绕组函数理论为基础,建立了三相鼠笼式异步电动机的精确数学模型。通过分析发展,提出了一种区分外滚道轴承故障存在与静偏心在定子与转子间气隙不对称上的特征的比较方法。该分析模型提出了一种有效的外圈缺陷信号,与其他静态偏心信号分离。仿真和实验结果验证了所提出的分析模型。
{"title":"Analytical Model for Separated Frequency Signature of Outer Race Bearing Fault From Static Eccentricity","authors":"Touil Abderrahim, Babaa Fatima, Bennis Ouafae, Kratz Frédéric","doi":"10.46300/9106.2021.15.196","DOIUrl":"https://doi.org/10.46300/9106.2021.15.196","url":null,"abstract":"The present paper addresses a precise and an accurate mathematical model for three-phase squirrel cage induction motors, based on winding function theory. Through an analytical development, a comparative way is presented to separate the signature between the existence of the outer race bearing fault and the static eccentricity concerning the asymmetry of the air gap between the stator and the rotor. This analytical model proposes an effective signature of outer race defect separately from other signatures of static eccentricity. Simulation and experimental results are presented to validate the proposed analytical model.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83107113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Intrusion Weed Optimization Algorithm for Node Location in Wireless Sensor Networks 一种改进的无线传感器网络节点定位入侵杂草优化算法
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.65
Shihui Li
The distribution optimization of WSN nodes is one of the key issues in WSN research, and also is a research hotspot in the field of communication. Aiming at the distribution optimization of WSN nodes, the distribution optimization scheme of nodes based on improved invasive weed optimization algorithm(IIWO) is proposed. IIWO improves the update strategy of the initial position of weeds by using cubic mapping chaotic operator, and uses the Gauss mutation operator to increase the diversity of the population. The simulation results show that the algorithm proposed in this paper has a higher solution quality and faster convergence speed than IWO and CPSO. In distribution optimization example of WSN nodes, the optimal network coverage rate obtained by IIWO is respectively improved by 1.82% and 0.93% than the IWO and CPSO. Under the condition of obtaining the same network coverage rate, the number of nodes required by IIWO is fewer.
无线传感器网络节点的分布优化是无线传感器网络研究的关键问题之一,也是通信领域的一个研究热点。针对WSN节点分布优化问题,提出了一种基于改进入侵杂草优化算法(IIWO)的节点分布优化方案。IIWO利用三次映射混沌算子改进了杂草初始位置的更新策略,并利用高斯变异算子增加种群的多样性。仿真结果表明,本文提出的算法比IWO和CPSO具有更高的解质量和更快的收敛速度。在WSN节点分布优化示例中,IIWO算法获得的最优网络覆盖率比IWO算法和CPSO算法分别提高了1.82%和0.93%。在获得相同网络覆盖率的情况下,IIWO所需的节点数更少。
{"title":"An Improved Intrusion Weed Optimization Algorithm for Node Location in Wireless Sensor Networks","authors":"Shihui Li","doi":"10.46300/9106.2022.16.65","DOIUrl":"https://doi.org/10.46300/9106.2022.16.65","url":null,"abstract":"The distribution optimization of WSN nodes is one of the key issues in WSN research, and also is a research hotspot in the field of communication. Aiming at the distribution optimization of WSN nodes, the distribution optimization scheme of nodes based on improved invasive weed optimization algorithm(IIWO) is proposed. IIWO improves the update strategy of the initial position of weeds by using cubic mapping chaotic operator, and uses the Gauss mutation operator to increase the diversity of the population. The simulation results show that the algorithm proposed in this paper has a higher solution quality and faster convergence speed than IWO and CPSO. In distribution optimization example of WSN nodes, the optimal network coverage rate obtained by IIWO is respectively improved by 1.82% and 0.93% than the IWO and CPSO. Under the condition of obtaining the same network coverage rate, the number of nodes required by IIWO is fewer.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73888201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Periodic Steady State Kalman Filter 分布式周期稳态卡尔曼滤波
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.83
N. Assimakis, M. Adam, Christos Massouros
In this paper a distributed implementation for the periodic steady state Kalman filter is proposed. The distributed algorithm has parallel structure and can be implemented using processors in parallel without idle time. The number of processors is equal to the model period. The resulting speedup is also derived. The Finite Impulse Response (FIR) form of the periodic steady state Kalman filter is derived.
本文提出了一种周期稳态卡尔曼滤波器的分布式实现方法。分布式算法具有并行结构,可以在多个处理器之间并行实现,没有空闲时间。处理器的数量等于模型周期。由此产生的加速也得到了推导。导出了周期稳态卡尔曼滤波器的有限脉冲响应(FIR)形式。
{"title":"Distributed Periodic Steady State Kalman Filter","authors":"N. Assimakis, M. Adam, Christos Massouros","doi":"10.46300/9106.2022.16.83","DOIUrl":"https://doi.org/10.46300/9106.2022.16.83","url":null,"abstract":"In this paper a distributed implementation for the periodic steady state Kalman filter is proposed. The distributed algorithm has parallel structure and can be implemented using processors in parallel without idle time. The number of processors is equal to the model period. The resulting speedup is also derived. The Finite Impulse Response (FIR) form of the periodic steady state Kalman filter is derived.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85442128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical Analysis of Coupled Modified Hindmarsh-rose Model Under Transcranial Magnetic-acoustic Electrical Stimulation 经颅磁声电刺激下修正Hindmarsh-rose耦合模型的理论分析
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.76
Liang Guo, Shuai Zhang, Jian-kang Wu, Xinyu Gao, Mingkang Zhao, Guizhi Xu
Transcranial magnetic-acoustic electrical stimulation (TMAES) is a new technology with ultrasonic waves and a static magnetic field to generate an electric current in nerve tissues to modulate neuronal firing activities. The existing neuron models only simulate a single neuron, and there are few studies on coupled neurons models about TMAES. Most of the neurons in the cerebral cortex are not isolated but are coupled to each other. It is necessary to study the information transmission of coupled neurons. The types of neuron coupled synapses include electrical synapse and chemical synapse. A neuron model without considering chemical synapses is not comprehensive. Here, we modified the Hindmarsh-Rose (HR) model to simulate the smallest nervous system—two neurons coupled electrical synapses and chemical synapses under TMAES. And the environmental variables describing the synaptic coupling between two neurons and the nonlinearity of the nervous system are also taken into account. The firing behavior of the nervous system can be modulated by changing the intensity or the modulation frequency. The results show that within a certain range of parameters, the discharge frequency of coupled neurons could be increased by altering the modulation frequency, and intensity of stimulation, modulating the excitability of neurons, reducing the response time of chemical postsynaptic neurons, and accelerating the information transferring. Moreover, the discharge frequency of neurons was selective to stimulus parameters. These results demonstrate the possible theoretical regulatory mechanism of the neurons' firing frequency characteristics by TMAES. The study establishes the foundation for large-scale neural network modeling and can be taken as the theoretical basis for TMAES experimental and clinical application.
经颅磁声电刺激(TMAES)是一种利用超声波和静态磁场在神经组织内产生电流来调节神经元放电活动的新技术。现有的神经元模型只能模拟单个神经元,对TMAES的耦合神经元模型研究较少。大脑皮层中的大多数神经元不是孤立的,而是相互连接的。研究耦合神经元的信息传递是十分必要的。神经元耦合突触的类型包括电突触和化学突触。不考虑化学突触的神经元模型是不全面的。在这里,我们修改了Hindmarsh-Rose (HR)模型来模拟TMAES下最小的神经系统-两个神经元耦合的电突触和化学突触。描述两个神经元之间突触耦合的环境变量和神经系统的非线性也被考虑在内。神经系统的放电行为可以通过改变强度或调制频率来调节。结果表明,在一定的参数范围内,通过改变刺激的调制频率和强度,调节神经元的兴奋性,缩短化学突触后神经元的反应时间,加速信息传递,可以增加耦合神经元的放电频率。此外,神经元放电频率对刺激参数具有选择性。这些结果证明了TMAES对神经元放电频率特性的可能的理论调控机制。本研究为大规模神经网络建模奠定了基础,可作为TMAES实验和临床应用的理论依据。
{"title":"Theoretical Analysis of Coupled Modified Hindmarsh-rose Model Under Transcranial Magnetic-acoustic Electrical Stimulation","authors":"Liang Guo, Shuai Zhang, Jian-kang Wu, Xinyu Gao, Mingkang Zhao, Guizhi Xu","doi":"10.46300/9106.2022.16.76","DOIUrl":"https://doi.org/10.46300/9106.2022.16.76","url":null,"abstract":"Transcranial magnetic-acoustic electrical stimulation (TMAES) is a new technology with ultrasonic waves and a static magnetic field to generate an electric current in nerve tissues to modulate neuronal firing activities. The existing neuron models only simulate a single neuron, and there are few studies on coupled neurons models about TMAES. Most of the neurons in the cerebral cortex are not isolated but are coupled to each other. It is necessary to study the information transmission of coupled neurons. The types of neuron coupled synapses include electrical synapse and chemical synapse. A neuron model without considering chemical synapses is not comprehensive. Here, we modified the Hindmarsh-Rose (HR) model to simulate the smallest nervous system—two neurons coupled electrical synapses and chemical synapses under TMAES. And the environmental variables describing the synaptic coupling between two neurons and the nonlinearity of the nervous system are also taken into account. The firing behavior of the nervous system can be modulated by changing the intensity or the modulation frequency. The results show that within a certain range of parameters, the discharge frequency of coupled neurons could be increased by altering the modulation frequency, and intensity of stimulation, modulating the excitability of neurons, reducing the response time of chemical postsynaptic neurons, and accelerating the information transferring. Moreover, the discharge frequency of neurons was selective to stimulus parameters. These results demonstrate the possible theoretical regulatory mechanism of the neurons' firing frequency characteristics by TMAES. The study establishes the foundation for large-scale neural network modeling and can be taken as the theoretical basis for TMAES experimental and clinical application.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73705087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Optimization Analysis of Phishing Email Filtering in Network Fraud based on Improved Bayesian Algorithm 基于改进贝叶斯算法的网络诈骗网络钓鱼邮件过滤优化分析
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.62
Yahao Zhang, Jin Pang, H. Yin
Mail transmission was not only the main function of information system, but also the main way of network virus and Trojan horse transmission, which has a key impact on the running state of information. In order to deal with the threats of network viruses and Trojans and improve the level of e-mail management, this paper studies the filtering of information system, and proposes a phishing e-mail filtering method based on Improved Bayesian model. MATLAB simulation results show that the consistency p between the amount of data sent by e-mail and the amount received is good, the consistency rate reached 92.3%. the data security level is 95%, encryption proportion / data proportion ratio under Bayesian optimization are higher than those of unfiltered method,which up to 97.2%. Therefore, the Bayesian optimization model constructed in this paper can meet the needs of phishing email filtering in information communication at this stage.
邮件传输是信息系统的主要功能,也是网络病毒和木马传播的主要途径,对信息的运行状态有着关键的影响。为了应对网络病毒和木马的威胁,提高电子邮件的管理水平,本文对信息系统的过滤进行了研究,提出了一种基于改进贝叶斯模型的网络钓鱼电子邮件过滤方法。MATLAB仿真结果表明,电子邮件发送的数据量与接收的数据量之间的一致性p较好,一致性率达到92.3%。数据安全等级为95%,贝叶斯优化下的加密比例/数据比例比高于未过滤方法,达到97.2%。因此,本文构建的贝叶斯优化模型可以满足现阶段信息通信中网络钓鱼邮件过滤的需求。
{"title":"The Optimization Analysis of Phishing Email Filtering in Network Fraud based on Improved Bayesian Algorithm","authors":"Yahao Zhang, Jin Pang, H. Yin","doi":"10.46300/9106.2022.16.62","DOIUrl":"https://doi.org/10.46300/9106.2022.16.62","url":null,"abstract":"Mail transmission was not only the main function of information system, but also the main way of network virus and Trojan horse transmission, which has a key impact on the running state of information. In order to deal with the threats of network viruses and Trojans and improve the level of e-mail management, this paper studies the filtering of information system, and proposes a phishing e-mail filtering method based on Improved Bayesian model. MATLAB simulation results show that the consistency p between the amount of data sent by e-mail and the amount received is good, the consistency rate reached 92.3%. the data security level is 95%, encryption proportion / data proportion ratio under Bayesian optimization are higher than those of unfiltered method,which up to 97.2%. Therefore, the Bayesian optimization model constructed in this paper can meet the needs of phishing email filtering in information communication at this stage.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82922566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Riemann Zeta Based Surge Modelling of Continuous Real Functions in Electrical Circuits 基于Riemann Zeta的电路连续实函数浪涌建模
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.82
Binesh Thankappan
Riemann zeta is defined as a function of a complex variable that analytically continues the sum of the Dirichlet series, when the real part is greater than unity. In this paper, the Riemann zeta associated with the finite energy possessed by a 2mm radius, free falling water droplet, crashing into a plane is considered. A modified zeta function is proposed which is incorporated to the spherical coordinates and real analysis has been performed. Through real analytic continuation, the single point of contact of the drop at the instant of touching the plane is analyzed. The zeta function is extracted at the point of destruction of the drop, where it defines a unique real function. A special property is assumed for some continuous functions, where the function’s first derivative and first integral combine together to a nullity at all points. Approximate reverse synthesis of such a function resulted in a special waveform named the dying-surge. Extending the proposed concept to general continuous real functions resulted in the synthesis of the corresponding function’s Dying-surge model. The Riemann zeta function associated with the water droplet can also be modeled as a dying–surge. The Dying- surge model corresponds to an electrical squeezing or compression of a waveform, which was originally defined over infinite arguments, squeezed to a finite number of values for arguments placed very close together with defined final and penultimate values. Synthesized results using simulation software are also presented, along with the analysis. The presence of surges in electrical circuits will correspond to electrical compression of some unknown continuous, real current or voltage function and the method can be used to estimate the original unknown function.
黎曼ζ被定义为一个复变量的函数,当实部大于1时,它解析地延续了狄利克雷级数的和。本文考虑了半径为2mm的自由落体水滴撞击平面时所具有的有限能量的黎曼ζ。提出了一种改进的zeta函数,并将其与球坐标相结合,进行了实际分析。通过实解析延拓,分析了液滴与平面接触瞬间的单点接触。zeta函数在drop的销毁点被提取,在那里它定义了一个唯一的实函数。对于某些连续函数,假设一个特殊的性质,其中函数的一阶导数和一阶积分在所有点上组合在一起为零。这种函数的近似反向合成产生了一种特殊的波形,称为死亡浪涌。将所提出的概念推广到一般连续实函数,得到了相应函数的死亡-浪涌模型的综合。与水滴相关的黎曼ζ函数也可以被建模为一个死亡浪涌。濒死电涌模型对应于波形的电挤压或压缩,它最初是在无限参数上定义的,被压缩到与定义的最终值和倒数值非常接近的参数的有限数量的值。最后给出了仿真软件的综合结果,并进行了分析。电路中浪涌的存在将对应于一些未知的连续的、真实的电流或电压函数的电压缩,该方法可以用来估计原始的未知函数。
{"title":"Riemann Zeta Based Surge Modelling of Continuous Real Functions in Electrical Circuits","authors":"Binesh Thankappan","doi":"10.46300/9106.2022.16.82","DOIUrl":"https://doi.org/10.46300/9106.2022.16.82","url":null,"abstract":"Riemann zeta is defined as a function of a complex variable that analytically continues the sum of the Dirichlet series, when the real part is greater than unity. In this paper, the Riemann zeta associated with the finite energy possessed by a 2mm radius, free falling water droplet, crashing into a plane is considered. A modified zeta function is proposed which is incorporated to the spherical coordinates and real analysis has been performed. Through real analytic continuation, the single point of contact of the drop at the instant of touching the plane is analyzed. The zeta function is extracted at the point of destruction of the drop, where it defines a unique real function. A special property is assumed for some continuous functions, where the function’s first derivative and first integral combine together to a nullity at all points. Approximate reverse synthesis of such a function resulted in a special waveform named the dying-surge. Extending the proposed concept to general continuous real functions resulted in the synthesis of the corresponding function’s Dying-surge model. The Riemann zeta function associated with the water droplet can also be modeled as a dying–surge. The Dying- surge model corresponds to an electrical squeezing or compression of a waveform, which was originally defined over infinite arguments, squeezed to a finite number of values for arguments placed very close together with defined final and penultimate values. Synthesized results using simulation software are also presented, along with the analysis. The presence of surges in electrical circuits will correspond to electrical compression of some unknown continuous, real current or voltage function and the method can be used to estimate the original unknown function.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83899482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple IoT based Network Attacks Discrimination by Multilayer Feedforward Neural Networks 基于多层前馈神经网络的多种物联网网络攻击判别
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.84
Vanya Ivanova
In this paper a new neural model for detection of multiple network IoT-based attacks, such as DDoS TCP, UDP, and HHTP flood, is presented. It consists of feedforward multilayer network with back propagation. A general algorithm for its optimization during training is proposed, leading to proper number of neurons in the hidden layers. The Scaled Gradient Descent algorithm and the Adam optimization are studied with better classification results, obtained by the developed classifiers, using the latter. Tangent hyperbolic function appears to be proper selection for the hidden neurons. Two sets of features, gathered from aggregated records of the network traffic, are tested, containing 8 and 10 components. While more accurate results are obtained for the 10-feature set, the 8-feature set offers twice lower training time and seems applicable for real-world applications. The detection rate for 7 of 10 different network attacks, primarily various types of floods, is higher than 90% and for 3 of them – mainly reconnaissance and keylogging activities with low intensity of the generated traffic, deviates between 57% and 68%. The classifier is considered applicable for industrial implementation.
本文提出了一种新的神经网络模型,用于检测多种基于网络物联网的攻击,如DDoS、TCP、UDP和HHTP flood。它由反向传播的前馈多层网络组成。提出了一种在训练过程中对其进行优化的通用算法,使隐藏层的神经元数量达到合适的数量。研究了缩放梯度下降算法和亚当优化算法,使用后者开发的分类器获得了更好的分类效果。切线双曲函数似乎是隐藏神经元的合适选择。测试了从网络流量的聚合记录中收集的两组特性,分别包含8个和10个组件。虽然10个特征集获得了更准确的结果,但8个特征集的训练时间缩短了两倍,似乎适用于现实世界的应用。10种网络攻击中有7种(主要是各种类型的洪水攻击)的检测率高于90%,其中3种(主要是产生流量强度较低的侦察和键盘记录活动)的检测率在57%至68%之间。该分类器被认为适用于工业实施。
{"title":"Multiple IoT based Network Attacks Discrimination by Multilayer Feedforward Neural Networks","authors":"Vanya Ivanova","doi":"10.46300/9106.2022.16.84","DOIUrl":"https://doi.org/10.46300/9106.2022.16.84","url":null,"abstract":"In this paper a new neural model for detection of multiple network IoT-based attacks, such as DDoS TCP, UDP, and HHTP flood, is presented. It consists of feedforward multilayer network with back propagation. A general algorithm for its optimization during training is proposed, leading to proper number of neurons in the hidden layers. The Scaled Gradient Descent algorithm and the Adam optimization are studied with better classification results, obtained by the developed classifiers, using the latter. Tangent hyperbolic function appears to be proper selection for the hidden neurons. Two sets of features, gathered from aggregated records of the network traffic, are tested, containing 8 and 10 components. While more accurate results are obtained for the 10-feature set, the 8-feature set offers twice lower training time and seems applicable for real-world applications. The detection rate for 7 of 10 different network attacks, primarily various types of floods, is higher than 90% and for 3 of them – mainly reconnaissance and keylogging activities with low intensity of the generated traffic, deviates between 57% and 68%. The classifier is considered applicable for industrial implementation.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91191643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Cluster Analysis and Prediction of Psychiatric Health Data Based on BPNN 基于BPNN的精神健康数据模糊聚类分析与预测
Q4 Engineering Pub Date : 2022-01-10 DOI: 10.46300/9106.2022.16.61
H. Xiang, Anrong Wang, Guoqun Fu, Xue Luo, Xudong Pan
PMH (psychiatry/mental health) is affected by many factors, among which there are numerous connections, so the prediction of PMH is a nonlinear problem. In this paper, BPNN (Back Propagation Neural Network) is applied to fuzzy clustering analysis and prediction of PMH data, and the rules and characteristics of PMH and behavioral characteristics of people with mental disorders are analyzed, and various internal relations among psychological test data are mined, thus providing scientific basis for establishing and perfecting early prevention and intervention of mental disorders in colleges and universities. Artificial neural network is a mathematical model of information processing, which is composed of synapses similar to the structure of brain neurons. The fuzzy clustering analysis and data prediction ability of optimized PMH data are obviously improved. Applying BPNN to the fuzzy clustering analysis and prediction of PMH data, analyzing the rules and characteristics of PMH and the behavioral characteristics of patients with mental disorders, can explore various internal relations among psychological test data, and provide scientific basis for establishing early prevention and intervention of mental disorders.
PMH(精神病学/心理健康)受许多因素的影响,这些因素之间有许多联系,因此PMH的预测是一个非线性问题。本文将BPNN (Back Propagation Neural Network,反向传播神经网络)应用于PMH数据的模糊聚类分析和预测,分析PMH的规律和特征与精神障碍患者的行为特征,挖掘心理测试数据之间的各种内在联系,为建立和完善高校精神障碍早期预防和干预提供科学依据。人工神经网络是一种信息处理的数学模型,它由类似于大脑神经元结构的突触组成。优化后的PMH数据的模糊聚类分析和数据预测能力明显提高。将BPNN应用于PMH数据的模糊聚类分析和预测,分析PMH的规律和特征与精神障碍患者的行为特征,可以探索心理测试数据之间的各种内在联系,为建立精神障碍的早期预防和干预提供科学依据。
{"title":"Fuzzy Cluster Analysis and Prediction of Psychiatric Health Data Based on BPNN","authors":"H. Xiang, Anrong Wang, Guoqun Fu, Xue Luo, Xudong Pan","doi":"10.46300/9106.2022.16.61","DOIUrl":"https://doi.org/10.46300/9106.2022.16.61","url":null,"abstract":"PMH (psychiatry/mental health) is affected by many factors, among which there are numerous connections, so the prediction of PMH is a nonlinear problem. In this paper, BPNN (Back Propagation Neural Network) is applied to fuzzy clustering analysis and prediction of PMH data, and the rules and characteristics of PMH and behavioral characteristics of people with mental disorders are analyzed, and various internal relations among psychological test data are mined, thus providing scientific basis for establishing and perfecting early prevention and intervention of mental disorders in colleges and universities. Artificial neural network is a mathematical model of information processing, which is composed of synapses similar to the structure of brain neurons. The fuzzy clustering analysis and data prediction ability of optimized PMH data are obviously improved. Applying BPNN to the fuzzy clustering analysis and prediction of PMH data, analyzing the rules and characteristics of PMH and the behavioral characteristics of patients with mental disorders, can explore various internal relations among psychological test data, and provide scientific basis for establishing early prevention and intervention of mental disorders.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90585026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Circuits, Systems and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1