基于智能物联网的5G无线通信安全混沌研究

Jan Yonan
{"title":"基于智能物联网的5G无线通信安全混沌研究","authors":"Jan Yonan","doi":"10.31763/ijrcs.v2i4.769","DOIUrl":null,"url":null,"abstract":"The implementation of an intelligent system for network control and monitoring that is built on an Internet of Things (IoT) is a focus of this line of research, with the end objective of improving the level of precision inside the network and its applications. You did indeed read it correctly; the system that is being referred to here is a deep neural network. The manner that it is constructed makes it possible for the layer that cannot be seen to contain more data. The application of element-modified deep learning and network buffer capacity control helps to improve the overall service quality that is provided by each sensor node. One method that can be applied to the process of instructing a machine to pay more attention includes deep learning in its various incarnations. The team was able to do calculations with a precision of 96.68 percent and the quickest execution time, thanks to the usage of wireless sensors. Using a sensor-based technique that has a brief implementation period, this piece has a degree of accuracy of 97.69 % when it comes to detecting and classifying proxies, and it does so using a method that is very efficient. On the other hand, our research represents a significant leap forward in comparison to earlier studies due to the fact that we were able to accurately identify and categorize a wide variety of invasions and real-time proxies.","PeriodicalId":409364,"journal":{"name":"International Journal of Robotics and Control Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Examination of the Secure Chaos of 5G Wireless Communication Based on the Intelligent Internet of Things\",\"authors\":\"Jan Yonan\",\"doi\":\"10.31763/ijrcs.v2i4.769\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The implementation of an intelligent system for network control and monitoring that is built on an Internet of Things (IoT) is a focus of this line of research, with the end objective of improving the level of precision inside the network and its applications. You did indeed read it correctly; the system that is being referred to here is a deep neural network. The manner that it is constructed makes it possible for the layer that cannot be seen to contain more data. The application of element-modified deep learning and network buffer capacity control helps to improve the overall service quality that is provided by each sensor node. One method that can be applied to the process of instructing a machine to pay more attention includes deep learning in its various incarnations. The team was able to do calculations with a precision of 96.68 percent and the quickest execution time, thanks to the usage of wireless sensors. Using a sensor-based technique that has a brief implementation period, this piece has a degree of accuracy of 97.69 % when it comes to detecting and classifying proxies, and it does so using a method that is very efficient. On the other hand, our research represents a significant leap forward in comparison to earlier studies due to the fact that we were able to accurately identify and categorize a wide variety of invasions and real-time proxies.\",\"PeriodicalId\":409364,\"journal\":{\"name\":\"International Journal of Robotics and Control Systems\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Robotics and Control Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31763/ijrcs.v2i4.769\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Robotics and Control Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31763/ijrcs.v2i4.769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

建立在物联网(IoT)上的智能网络控制和监控系统的实现是这一研究方向的重点,其最终目标是提高网络及其应用内部的精度水平。你确实读对了;这里所说的系统是一个深度神经网络。它的构造方式使得无法看到的层包含更多数据成为可能。元素修正深度学习和网络缓冲容量控制的应用有助于提高各个传感器节点提供的整体服务质量。一种可以应用于指导机器集中更多注意力的方法包括各种形式的深度学习。由于使用了无线传感器,该团队能够以96.68%的精度和最快的执行时间进行计算。使用一种基于传感器的技术,实现周期很短,在检测和分类代理时,这篇文章的准确率达到了97.69%,并且使用了一种非常有效的方法。另一方面,与早期的研究相比,我们的研究是一个重大的飞跃,因为我们能够准确地识别和分类各种各样的入侵和实时代理。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Examination of the Secure Chaos of 5G Wireless Communication Based on the Intelligent Internet of Things
The implementation of an intelligent system for network control and monitoring that is built on an Internet of Things (IoT) is a focus of this line of research, with the end objective of improving the level of precision inside the network and its applications. You did indeed read it correctly; the system that is being referred to here is a deep neural network. The manner that it is constructed makes it possible for the layer that cannot be seen to contain more data. The application of element-modified deep learning and network buffer capacity control helps to improve the overall service quality that is provided by each sensor node. One method that can be applied to the process of instructing a machine to pay more attention includes deep learning in its various incarnations. The team was able to do calculations with a precision of 96.68 percent and the quickest execution time, thanks to the usage of wireless sensors. Using a sensor-based technique that has a brief implementation period, this piece has a degree of accuracy of 97.69 % when it comes to detecting and classifying proxies, and it does so using a method that is very efficient. On the other hand, our research represents a significant leap forward in comparison to earlier studies due to the fact that we were able to accurately identify and categorize a wide variety of invasions and real-time proxies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信