基于强化学习的物联网大数据峰值聚类模型访问控制体系结构

Qi Xiong
{"title":"基于强化学习的物联网大数据峰值聚类模型访问控制体系结构","authors":"Qi Xiong","doi":"10.1117/12.2655168","DOIUrl":null,"url":null,"abstract":"In order to improve the accuracy of Internet of Things access control and the clustering of data transmission, a big data peak clustering method based on reinforcement learning is proposed. A big database management model of Internet of Things access control architecture is established by adopting global data pattern. Based on heterogeneous parameters among big data sources of Internet of Things access control architecture, combined with structural feature analysis of data sources, a big data interference filtering model of Internet of Things access control architecture is established by adopting the feature analysis method of blockchain fusion control and association rule mining, and feature extraction of big data peaks of Internet of Things access control architecture is carried out through reinforcement learning algorithm. According to the change of Internet of Things access mode, cluster analysis and pattern recognition of Internet of Things access control architecture big data peak are realized. By constructing the spatial-temporal distribution model of Internet of Things access control architecture big data and Internet of Things transmission channel, the spectral density cluster analysis method is adopted, according to the quantitative parameter analysis of real-time Internet of Things access control architecture data stream, the quantitative recursive analysis method is adopted, and the online Internet of Things access control architecture big data cleaning is used to realize the identification and cluster analysis of Internet of Things access control architecture big data peak features, so as to improve the Internet of Things access control ability. The simulation results show that this method is highly reliable for peak clustering of big data in the access control architecture of the Internet of Things, and has strong dynamic analysis and recognition ability for Internet of Things access and data scheduling, good convergence of data clustering, and low error rate.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"491 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reinforcement learning based access control architecture of Internet of Things big data peak clustering model\",\"authors\":\"Qi Xiong\",\"doi\":\"10.1117/12.2655168\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to improve the accuracy of Internet of Things access control and the clustering of data transmission, a big data peak clustering method based on reinforcement learning is proposed. A big database management model of Internet of Things access control architecture is established by adopting global data pattern. Based on heterogeneous parameters among big data sources of Internet of Things access control architecture, combined with structural feature analysis of data sources, a big data interference filtering model of Internet of Things access control architecture is established by adopting the feature analysis method of blockchain fusion control and association rule mining, and feature extraction of big data peaks of Internet of Things access control architecture is carried out through reinforcement learning algorithm. According to the change of Internet of Things access mode, cluster analysis and pattern recognition of Internet of Things access control architecture big data peak are realized. By constructing the spatial-temporal distribution model of Internet of Things access control architecture big data and Internet of Things transmission channel, the spectral density cluster analysis method is adopted, according to the quantitative parameter analysis of real-time Internet of Things access control architecture data stream, the quantitative recursive analysis method is adopted, and the online Internet of Things access control architecture big data cleaning is used to realize the identification and cluster analysis of Internet of Things access control architecture big data peak features, so as to improve the Internet of Things access control ability. The simulation results show that this method is highly reliable for peak clustering of big data in the access control architecture of the Internet of Things, and has strong dynamic analysis and recognition ability for Internet of Things access and data scheduling, good convergence of data clustering, and low error rate.\",\"PeriodicalId\":105577,\"journal\":{\"name\":\"International Conference on Signal Processing and Communication Security\",\"volume\":\"491 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Signal Processing and Communication Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2655168\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Signal Processing and Communication Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2655168","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

为了提高物联网访问控制的准确性和数据传输的聚类,提出了一种基于强化学习的大数据峰值聚类方法。采用全局数据模式,建立了物联网访问控制体系结构的大数据库管理模型。基于物联网门禁体系结构大数据源间的异构参数,结合数据源的结构特征分析,采用区块链融合控制特征分析方法和关联规则挖掘方法,建立物联网门禁体系结构大数据干扰过滤模型;通过强化学习算法对物联网访问控制架构的大数据峰值进行特征提取。根据物联网接入方式的变化,实现了物联网接入控制架构大数据峰的聚类分析和模式识别。通过构建物联网门禁体系结构大数据与物联网传输通道的时空分布模型,采用谱密度聚类分析方法,根据物联网门禁体系结构实时数据流的定量参数分析,采用定量递归分析方法;采用在线物联网门禁架构大数据清洗,实现物联网门禁架构大数据峰值特征的识别和聚类分析,从而提高物联网门禁能力。仿真结果表明,该方法对物联网访问控制体系结构中的大数据峰值聚类具有较高的可靠性,对物联网访问和数据调度具有较强的动态分析和识别能力,数据聚类收敛性好,错误率低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Reinforcement learning based access control architecture of Internet of Things big data peak clustering model
In order to improve the accuracy of Internet of Things access control and the clustering of data transmission, a big data peak clustering method based on reinforcement learning is proposed. A big database management model of Internet of Things access control architecture is established by adopting global data pattern. Based on heterogeneous parameters among big data sources of Internet of Things access control architecture, combined with structural feature analysis of data sources, a big data interference filtering model of Internet of Things access control architecture is established by adopting the feature analysis method of blockchain fusion control and association rule mining, and feature extraction of big data peaks of Internet of Things access control architecture is carried out through reinforcement learning algorithm. According to the change of Internet of Things access mode, cluster analysis and pattern recognition of Internet of Things access control architecture big data peak are realized. By constructing the spatial-temporal distribution model of Internet of Things access control architecture big data and Internet of Things transmission channel, the spectral density cluster analysis method is adopted, according to the quantitative parameter analysis of real-time Internet of Things access control architecture data stream, the quantitative recursive analysis method is adopted, and the online Internet of Things access control architecture big data cleaning is used to realize the identification and cluster analysis of Internet of Things access control architecture big data peak features, so as to improve the Internet of Things access control ability. The simulation results show that this method is highly reliable for peak clustering of big data in the access control architecture of the Internet of Things, and has strong dynamic analysis and recognition ability for Internet of Things access and data scheduling, good convergence of data clustering, and low error rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信