Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
{"title":"基于并行和分布式架构的以数据为中心的网络性能评估","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.1142/s0129626423400066","DOIUrl":null,"url":null,"abstract":"Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies’ safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile’s AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research\",\"authors\":\"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li\",\"doi\":\"10.1142/s0129626423400066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies’ safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile’s AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.\",\"PeriodicalId\":44742,\"journal\":{\"name\":\"Parallel Processing Letters\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-03-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Parallel Processing Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/s0129626423400066\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Parallel Processing Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/s0129626423400066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research
Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies’ safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile’s AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.
期刊介绍:
Parallel Processing Letters (PPL) aims to rapidly disseminate results on a worldwide basis in the field of parallel processing in the form of short papers. It fills the need for an information vehicle which can convey recent achievements and further the exchange of scientific information in the field. This journal has a wide scope and topics covered included: - design and analysis of parallel and distributed algorithms - theory of parallel computation - parallel programming languages - parallel programming environments - parallel architectures and VLSI circuits