system resource
Recently Published Documents


TOTAL DOCUMENTS

195
(FIVE YEARS 59)

H-INDEX

13
(FIVE YEARS 3)

2022 ◽  
Vol 2 (14) ◽  
pp. 45-54
Author(s):  
Nguyen Huy Trung ◽  
Le Hai Viet ◽  
Tran Duc Thang

Abstract—Nowadays, there have been many signature-based intrusion detection systems deployed and widely used. These systems are capable of detecting known attacks with low false alarm rates, fast detection times, and little system resource requirements. However, these systems are less effective against new attacks that are not included in the ruleset. In addition, recent studies provide a new approach to the problem of detecting unknown types of network attacks based on machine learning and deep learning. However, this new approach requires a lot of resources, processing time and has a high false alarm rate. Therefore, it is necessary to find a solution that combines the advantages of the two approaches above in the problem of detecting network attacks. In this paper, the authors present a method to automatically generate network attack detection rules for the IDS system based on the results of training machine learning models. Through testing, the author proves that the system that automatically generates network attack detection rules for IDS based on machine learning meets the requirements of increasing the ability to detect new types of attacks, ensuring automatic effective updates of new signs of network attacks. Tóm tắt—Ngày nay, đã có nhiều hệ thống phát hiện xâm nhập dựa trên chữ ký được triển khai và sử dụng rộng rãi. Các hệ thống này có khả năng phát hiện các cuộc tấn công đã biết với tỷ lệ báo động giả thấp, thời gian phát hiện nhanh và yêu cầu ít tài nguyên hệ thống. Tuy nhiên, các hệ thống này kém hiệu quả khi chống lại các cuộc tấn công mới không có trong tập luật. Các nghiên cứu gần đây cung cấp một cách tiếp cận mới cho vấn đề phát hiện các kiểu tấn công mạng mới dựa trên học máy và học sâu. Tuy nhiên, cách tiếp cận này đòi hỏi nhiều tài nguyên, thời gian xử lý. Vì vậy, cần tìm ra giải pháp kết hợp ưu điểm của hai cách tiếp cận trên trong bài toán phát hiện tấn công mạng. Trong bài báo này, nhóm tác giả trình bày phương pháp tự động sinh luật phát hiện tấn công mạng cho hệ thống phát hiện xâm nhập dựa trên kết quả huấn luyện mô hình học máy. Qua thử nghiệm, tác giả chứng minh rằng phương pháp này đáp ứng yêu cầu tăng khả năng phát hiện chính xác các kiểu tấn công mới, đảm bảo tự động cập nhật hiệu quả các dấu hiệu tấn công mạng mới vào tập luật.


2021 ◽  
Vol 2136 (1) ◽  
pp. 012035
Author(s):  
Min Huang

Abstract In order to achieve high spectral efficiency in OFDM transmission system, it is necessary to put forward the corresponding efficient subcarrier and power allocation algorithm. Therefore, on the basis of understanding the basic principle and system structure of OFDM, this paper analyzes the corresponding allocation algorithm according to the multi-user water injection theory, and studies the final results, so as to provide an effective scientific basis for future channel statistics research.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sungwook Kim

The Internet of Medical Things (IoMT) is an amalgamation of smart devices to operate the wireless body area network (WBAN) by using networking technologies. To reduce the burden on WBANs, they link to the mobile edge computing (MEC), on which captured medical data can be stored and analyzed. In this paper, we design a new control scheme to effectively share the limited computation and communication resources in the MEC-assisted WBAN (M-W) platform. Based on the bargaining game theory, our proposed scheme explores the mutual benefits of intra- and inter-WBAN interactions. To dynamically adapt the current system conditions, we shape each WBAN’s aspirations to reach a reciprocal consensus for different application services. Utilizing two control factors, we provide a unifying framework for the study of intra- and inter-WBAN bargaining problems to share the limited system resource. Based on the feasibility and real-time effectiveness, the main novelty of the proposed scheme is the ability to achieve a relevant tradeoff between efficiency and fairness through the interactive bargaining process. At last, the experimental results show that the proposed scheme achieves substantial performance improvements to the comparison schemes.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7917
Author(s):  
Zheng Zuo ◽  
Shichun Yang ◽  
Bin Ma ◽  
Bosong Zou ◽  
Yaoguang Cao ◽  
...  

In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.


2021 ◽  
Vol 24 (6) ◽  
pp. 62-80
Author(s):  
Natalia Trusova ◽  
Nataliia Polishchuk ◽  
Alina Sakun ◽  
Oleksandr Prystеmskyi ◽  
Roman Morozov

The article considers the anti-crisis stability of the potential of break-even development and its resource support in agribusiness. The necessity of a synergetic approach to estimating the dynamic flow of resources capable of generating own sources of financing to activate the target parameters of crisis stability of break-even development potential and the development of an alternative scenario of self-financing of the production and financial cycle to stimulate economic growth of agribusiness is proved. The reproductive process of resource support of anti-crisis stability of the potential for safe development of agribusiness enterprises is substantiated. The model of estimation of target parameters of anti-crisis stability of potential of unprofitable development of agrarian business and a matrix of its point estimation at a choice of the alternative scenario of self-financing is presented. Scenarios of the flow of resource support of anti-crisis stability of the potential of unprofitable development of the agribusiness enterprise are developed. An indicator of the level of anti-crisis stability of the break-even development potential according to the determined target parameters of self-financing is offered. The dynamics of anti-crisis factor load on the stability of the potential of break-even development of agribusiness enterprises on average in one region of the Steppe zone of Ukraine by its territorial location is analyzed. Cluster analysis was used to assess the elements of the qualitative system-resource component of anti-crisis stability of the potential of break-even development with the separation of types of agribusiness enterprises in the regions of the Steppe zone of Ukraine with different structure of current assets. The forecast level of resource support according to the quantitative component of anti-crisis stability of the potential of break-even development on average in the regions of the Steppe zone of Ukraine and per one agribusiness enterprise of the region is determined. The forecast range of limits of target parameters of self-financing and their influence on the level of anti-crisis stability of potential of unprofitable development of agribusiness enterprises on the average on one region of the Steppe zone is presented


2021 ◽  
Author(s):  
Gord Stephen ◽  
Simon H. Tindemans ◽  
John Fazio ◽  
Chris Dent ◽  
Armando Figueroa Acevedo ◽  
...  

The loss-of-load expectation (LOLE) risk metric has been used in probabilistic power system resource adequacy assessment for over 70 years, and today is one of the most recognizable and widely-used measures of system shortfall risk. However, this wide adoption has been accompanied by ambiguities and inconsistencies in its definition and application. This paper provides a unifying reference for defining the metric as it relates to modern analyses, while clarifying a number of common points of confusion in its application. In particular, the paper clarifies that LOLE is not a measure of expected total shortfall duration, a 2.4 hours per year LOLE target implies a less reliable system than a 1 day in 10 years (0.1 days per year) LOLE target, and exact conversions between hourly and daily LOLE targets are not generally possible. Illustrative examples are provided to help explain each of these points.


2021 ◽  
Author(s):  
Gord Stephen ◽  
Simon H. Tindemans ◽  
John Fazio ◽  
Chris Dent ◽  
Armando Figueroa Acevedo ◽  
...  

The loss-of-load expectation (LOLE) risk metric has been used in probabilistic power system resource adequacy assessment for over 70 years, and today is one of the most recognizable and widely-used measures of system shortfall risk. However, this wide adoption has been accompanied by ambiguities and inconsistencies in its definition and application. This paper provides a unifying reference for defining the metric as it relates to modern analyses, while clarifying a number of common points of confusion in its application. In particular, the paper clarifies that LOLE is not a measure of expected total shortfall duration, a 2.4 hours per year LOLE target implies a less reliable system than a 1 day in 10 years (0.1 days per year) LOLE target, and exact conversions between hourly and daily LOLE targets are not generally possible. Illustrative examples are provided to help explain each of these points.


2021 ◽  
Vol 39 (9) ◽  
Author(s):  
Galyna Kucheruk ◽  
Olha Vovk ◽  
Nataliia Kovalenko ◽  
Valentina Romakh ◽  
Valentina Shevchenko

The article constructs the economic system modernization process, which reflects the qualitative influence of the intellectual capital features on the sequence of modernization transformation of the economic system: "resource supply" - "intellectualization" - "capitalization" - "modernization potential" - "modernization"; the system of infrastructure sphere modernization efficiency dynamic indicators at the enterprises is constructed and the analysis of its coherence is carried out; the modernization activity integrated indicators and intellectualization of the transport enterprises modernization process in the infrastructure sphere are substantiated and the assessment with their application is carried out.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Prafullata Kiran Auradkar ◽  
Atharva Raykar ◽  
Ishitha Agarwal ◽  
Dinkar Sitaram ◽  
Manavalan R.

Purpose The purpose of this paper is to convert real-world raster data into vector format and evaluate loss of accuracy in the conversion process. Open-source Geographic Information System (GIS) is used in this process and system resource utilizations were measured for conversion and accuracy analysis methods. Shape complexity attributes were analyzed in co-relation to the observed conversion errors. Design/methodology/approach The paper empirically evaluated the challenges and overheads involved in the format conversion algorithms available in open-source GIS with real-world land use and land cover (LULC) map data of India. Across the different LULC categories, geometric errors of varying density were observed in Quantum GIS (QGIS) algorithm. Area extents of original raster data were compared to the vector forms and the shape attributes such as average number of vertices and shape irregularity were evaluated to explore the possible correlation. Findings The results indicate that Geographic Resources Analysis Support System provides near error-free conversion algorithm. At the same time, the overall time taken for the conversion and the system resource utilizations were optimum as compared to the QGIS algorithm. Higher vector file sizes were generalized and accuracy loss was tested. Research limitations/implications Complete shape complexity analysis could not be achieved, as the weight factor for the irregularity of the shapes is to be varied based on the demography as well as on the LULC category. Practical implications Because of the higher system resource requirements of topological checker tool, positional accuracy checks for the converted objects could not be completed. Originality/value This paper addresses the need of accuracy analysis of real-world spatial data conversions from raster to vector format along with experimental setups challenges and impact of shape complexity.


Sign in / Sign up

Export Citation Format

Share Document