首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
This editorial summarizes and analyzes 17 articles selected for a special issue on machine learning advances for Industry 4.0 applications. The diverse articles cover fault detection, deep learning optimisation, IoT networking, vehicle control, recommendation systems and domain knowledge integration. Key methods represented include neural networks, deep learning, reinforcement learning and explainable AI. Real-world industrial case studies showcase machine learning's versatility in enabling intelligent automation, control, and decision-making across manufacturing, healthcare, transportation and other sectors. While highlighting theoretical innovations, the contributions also demonstrate machine learning's transformative potential for intelligent, connected, self-optimising next generation production systems. This editorial concisely overviews the latest trends represented in this special issue.  相似文献   

2.
    
The growing reliance of industry 4.0/5.0 on emergent technologies has dramatically increased the scope of cyber threats and data privacy issues. Recently, federated learning (FL) based intrusion detection systems (IDS) promote the detection of large-scale cyber-attacks in resource-constrained and heterogeneous industrial systems without exposing data to privacy issues. However, the inherent characteristics of the latter have led to problems such as a trusted validation and consensus of the federation, unreliability, and privacy protection of model upload. To address these challenges, this paper proposes a novel privacy-preserving secure framework, named PPSS, based on the use of blockchain-enabled FL with improved privacy, verifiability, and transparency. The PPSS framework adopts the permissioned-blockchain system to secure multi-party computation as well as to incentivize cross-silo FL based on a lightweight and energy-efficient consensus protocol named Proof-of-Federated Deep-Learning (PoFDL). Specifically, we design two federated stages for global model aggregation. The first stage uses differentially private training of Stochastic Gradient Descent (DP-SGD) to enforce privacy protection of client updates, while the second stage uses PoFDL protocol to prove and add new model-containing blocks to the blockchain. We study the performance of the proposed PPSS framework using a new cyber security dataset (Edge-IIoT dataset) in terms of detection rate, precision, accuracy, computation, and energy cost. The results demonstrate that the PPSS framework system can detect industrial IIoT attacks with high classification performance under two distribution modes, namely, non-independent and identically distributed (Non-IID) and independent and identically distributed (IID).  相似文献   

3.
    
In the Internet of Things (IoT) based system, the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems (UCS). The UCS necessitates heterogeneity, management level, and data transmission for distributed users. Simultaneously, security remains a major issue in the IoT-driven UCS. Besides, energy-limited IoT devices need an effective clustering strategy for optimal energy utilization. The recent developments of explainable artificial intelligence (XAI) concepts can be employed to effectively design intrusion detection systems (IDS) for accomplishing security in UCS. In this view, this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System (BXAI-IDCUCS) model. The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment. The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization (EADSO) algorithm to accomplish this. Besides, deep neural network (DNN) is employed for detecting and classifying intrusions in the IoT network. Lastly, blockchain technology is exploited for secure inter-cluster data transmission processes. To ensure the productive performance of the BXAI-IDCUCS model, a comprehensive experimentation study is applied, and the outcomes are assessed under different aspects. The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%, a packet loss rate of 0.71%, a throughput of 92.95 Mbps, energy consumption of 0.0891 mJ, a lifetime of 3529 rounds, and accuracy of 99.38%.  相似文献   

4.

深度学习和物联网的融合发展有力地促进了AIoT生态的繁荣. 一方面AIoT设备为深度学习提供了海量数据资源,另一方面深度学习使得AIoT设备更加智能化. 为保护用户数据隐私和克服单个AIoT设备的资源瓶颈,联邦学习和协同推理成为了深度学习在AIoT应用场景中广泛应用的重要支撑. 联邦学习能在保护隐私的前提下有效利用用户的数据资源来训练深度学习模型,协同推理能借助多个设备的计算资源来提升推理的性能. 引入了面向AIoT的协同智能的基本概念,围绕实现高效、安全的知识传递与算力供给,总结了近十年来联邦学习和协同推理算法以及架构和隐私安全3个方面的相关技术进展,介绍了联邦学习和协同推理在AIoT应用场景中的内在联系. 从设备共用、模型共用、隐私安全机制协同和激励机制协同等方面展望了面向AIoT的协同智能的未来发展.

  相似文献   

5.
协调机器学习的稳定性研究   总被引:5,自引:0,他引:5  
传统的机器学习方法 ,学习过程不影响被学习系统 ,并且被学习系统通常不是可变的 ,本文提出的协调机器学习系统 ,把学习与被学习作为一个整体来研究 ,进一步丰富和发展了机器学习的基本内容  相似文献   

6.
    
Examining the particular value of each platform for big data would be difficult because of the variety of social media forms and sizes. Using social media to objectively and subjectively analyze large groups of individuals makes it the most effective tool for this task. There are numerous sources of big data within the organization. Social media can be identified by the interaction and communication it facilitates. Utilizing social media has become a daily occurrence in modern society. In addition, this frequent use generates data demonstrating the importance of researching the relationship between big data and social media. It is because so many internet users are also active on social media. We conducted a systematic literature review (SLR) to identify 42 articles published between 2018 and 2022 that examined the significance of big data in social media and upcoming issues in this field. We also discuss the potential benefits of utilizing big data in social media. Our analysis discovered open problems and future challenges, such as high-quality data, information accessibility, speed, natural language processing (NLP), and enhancing prediction approaches. As proven by our investigations of evaluation metrics for big data in social media, the distribution reveals that 24% is related to data-trace, 12% is related to execution time, 21% to accuracy, 6% to cost, 10% to recall, 11% to precision, 11% to F1-score, and 5% run time complexity.  相似文献   

7.
近年来,恶意软件给信息技术的发展带来了很多负面的影响.为了解决这一问题,如何有效检测恶意软件则一直备受关注.随着人工智能的迅速发展,机器学习与深度学习技术逐渐被引入到恶意软件的检测中,这类技术称之为恶意软件智能检测技术.相比于传统的检测方法,由于人工智能技术的应用,智能检测技术不需要人工制定检测规则.此外,具有更强的泛化能力,能够更好地检测先前未见过的恶意软件.恶意软件智能检测已经成为当前检测领域的研究热点.主要介绍了当前的恶意软件智能检测相关工作,包含了智能检测所需的主要环节.从智能检测中常用的特征、如何进行特征处理、智能检测中常用的分类器、当前恶意软件智能检测所面临的主要问题4个方面对智能检测相关工作进行了系统地阐述与分类.最后,总结了先前智能检测相关工作,阐明了未来潜在的研究方向,旨在能够助力恶意软件智能检测的发展.  相似文献   

8.
异构网络具有结构复杂、多重覆盖面积大等特征,使得网络入侵检测较为隐蔽,威胁网络运行的安全性;为此,对基于Agent人工智能的异构网络多重覆盖节点入侵检测系统进行了研究;通过检测Agent和通信Agent装设主机Agent,以Cisco Stealthwatch流量传感器作为异构网络传感器检测攻击行为,采用STM32L151RDT6 64位微控制器传输批量数据,由MAX3232芯片实现系统电平转化,实现硬件系统设计;软件部分设计入侵检测标准,采用传感器设备捕获网络实时数据,通过Agent技术解析异构网络协议并提取数据运行特征,综合考虑协议解析结果及与检测标准匹配度,实现异构网络多重覆盖节点入侵检测;经实验测试表明,基于Agent人工智能的异构网络多重覆盖节点入侵检测系统入侵行为的漏检率和入侵类型误检率的平均值仅为6%和5%,能够有效提高检测精度,减小检测误差.  相似文献   

9.
基于专家控制器技术的抽油机系统   总被引:2,自引:0,他引:2  
介绍了一种基于专家控制器设计思想的抽油控制系统,重点讨论了专家控制器系统的工作原理以及软件系统设计和实现中的几个其它技术问题。  相似文献   

10.
    
The Internet of Things (IoT) is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare, in health service to energy, and in developed to transport. Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved. The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence (AI) and Machine Learning (ML) devices are crucial fact to realize security in IoT platform. It can be required for minimizing the issues of security based on IoT devices efficiently. Thus, this research proposal establishes novel mayfly optimized with Regularized Extreme Learning Machine technique called as MFO-RELM model for Cybersecurity Threat classification and detection from the cloud and IoT environments. The proposed MFO-RELM model provides the effective detection of cybersecurity threat which occur in the cloud and IoT platforms. To accomplish this, the MFO-RELM technique pre-processed the actual cloud and IoT data as to meaningful format. Besides, the proposed models will receive the pre-processing data and carry out the classifier method. For boosting the efficiency of the proposed models, the MFO technique was utilized to it. The experiential outcome of the proposed technique was tested utilizing the standard CICIDS 2017 dataset, and the outcomes are examined under distinct aspects.  相似文献   

11.
    
The Internet of Health Things (IoHT) has grown in importance for developing medical applications with the support of wireless communication systems. IoHT is integrated with many sensors to capture the patients' records and transmits them to hospital centres for analysis and reporting. Controlling and managing health records has been addressed in several ways, however, it is noted that two key research problems for vital communication systems are reliability and reducing data loss. To enhance the sustainability of health applications and effectively use the network infrastructure when transferring sensitive data, this research provides a machine learning approach. Moreover, data collected from the IoHTs are protected and can be securely received for physical process in hospitals using authentication trees. Firstly, the undirected graphs are explored based on the multi-parametric machine learning approach to minimize the computation overheads and traffic congestion. Secondly, it evaluates the nodes' level behaviour over the heterogeneous traffic load with efficient identification of redundant links. Finally, in-depth analysis and simulation results have shown that the proposed protocol is more effective than existing approaches for data accuracy and security analysis.  相似文献   

12.
    
Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved. The development of automated tools for cyber threat detection and classification using machine learning (ML) and artificial intelligence (AI) tools become essential to accomplish security in the IoT environment. It is needed to minimize security issues related to IoT gadgets effectively. Therefore, this article introduces a new Mayfly optimization (MFO) with regularized extreme learning machine (RELM) model, named MFO-RELM for Cybersecurity Threat Detection and classification in IoT environment. The presented MFO-RELM technique accomplishes the effectual identification of cybersecurity threats that exist in the IoT environment. For accomplishing this, the MFO-RELM model pre-processes the actual IoT data into a meaningful format. In addition, the RELM model receives the pre-processed data and carries out the classification process. In order to boost the performance of the RELM model, the MFO algorithm has been employed to it. The performance validation of the MFO-RELM model is tested using standard datasets and the results highlighted the better outcomes of the MFO-RELM model under distinct aspects.  相似文献   

13.
    
The rapid growth of the Internet of Things (IoT) in the industrialsector has given rise to a new term: the Industrial Internet of Things (IIoT).The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems.Although the IIoT has been implemented and incorporated into a wide rangeof industrial control systems, maintaining its security and privacy remainsa significant concern. In the IIoT contexts, an intrusion detection system(IDS) can be an effective security solution for ensuring data confidentiality,integrity, and availability. In this paper, we propose an intelligent intrusiondetection technique that uses principal components analysis (PCA) as afeature engineering method to choose the most significant features, minimizedata dimensionality, and enhance detection performance. In the classificationphase, we use clustering algorithms such as K-medoids and K-means todetermine whether a given flow of IIoT traffic is normal or attack for binaryclassification and identify the group of cyberattacks according to its specifictype for multi-class classification. To validate the effectiveness and robustnessof our proposed model, we validate the detection method on a new drivenIIoT dataset called X-IIoTID. The performance results showed our proposeddetection model obtained a higher accuracy rate of 99.79% and reduced errorrate of 0.21% when compared to existing techniques.  相似文献   

14.
对网络综合防御系统的理念进行了介绍,并给出网络综合防御系统的整体设计.根据课题组开发的Immuno系统模型和防火墙联动模块二级结构的总体规划,详细阐述了系统中防火墙联动模块的设计及核心子模块的实现.该模块能让多种防御系统进行联动,同时检测到网络攻击后,可通过向防火墙中动态添加规则阻断攻击.  相似文献   

15.
本文以什么是机器学习、机器学习的发展历史和机器学习的主要策略这一线索,对机器学习进行系统性的描述。接着,着重介绍了流形学习、李群机器学习和核机器学习三种新型的机器学习方法,为更好的研究机器学习提供了新的思路。  相似文献   

16.
基于TSVM的网络入侵检测研究   总被引:1,自引:0,他引:1  
直推式支持向量机(TSVM) 是一种直接从已知样本出发对特定的未知样本进行识别和分类的技术。该文提出了基于TSVM的网络入侵检测系统模型,并用实验给出了它在网络入侵检测中的性能表现,分析了它与基于传统归纳式支持向量机(ISVM)的入侵检测系统的性能对比。实验结果表明,将TSVM应用到入侵检测是切实可行的。  相似文献   

17.
    
The increasing importance of automation and smart capabilities for factories and other industrial systems has led to the concept of Industry 4.0 (I4.0). This concept aims at creating systems that improve the vertical and horizontal integration of production through (i) comprehensive and intelligent automation of industrial processes, (ii) informed and decentralized real-time decision making, and (iii) stringent quality requirements that can be monitored at any time. The I4.0 infrastructure, supported in many cases by robots, sensors, and algorithms, demands highly skilled workers able to continuously monitor the quality of both the items to be produced and the underlying production processes.While the first attempts to develop smart factories and enhance the digital transformation of companies are under way, we need adequate methods to support the identification and specification of quality attributes that are relevant to I4.0 systems. Our main contribution is to provide a refined version of the ISO 25010 quality model specifically tailored to those qualities demanded by I4.0 needs. This model aims to provide actionable support for I4.0 software engineers that are concerned with quality issues. We developed our model based on an exhaustive analysis of similar proposals using the design science method as well as expertise from seasoned engineers in the domain. We further evaluate our model by applying it to two important I4.0 reference architectures further clarifying its application.  相似文献   

18.
崔建伟  赵哲  杜小勇 《软件学报》2021,32(3):604-621
应用驱动创新,数据库技术就是在支持主流应用的提质降本增效中发展起来的.从OLTP、OLAP到今天的在线机器学习建模无不如此.机器学习是当前人工智能技术落地的主要途径,通过对数据进行建模而提取知识、实现预测分析.从数据管理的视角对机器学习训练过程进行解构和建模,从数据选择、数据存储、数据存取、自动优化和系统实现等方面,综...  相似文献   

19.
    
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage in many applications. The application's ledgers implemented through Blockchain, ensures tamper-proof transactions, and in turn the applications became robust enough against cyber-attack But still adversaries put forward their efforts in detecting the vulnerabilities in the infrastructure to execute their ill intent. In the literature, many counter measures techniques are presented to address the security breaches on the Blockchain. Detecting as well mitigating from the possible anomalies against on blockchain infrastructure through AI techniques is the greatest attempt of this article, and which is much needed now. Hence, this review article enlightens the readers with the essence of cyber security, the security aspects of Blockchain, its infrastructure vulnerabilities, various Blockchain-enabled use cases along with the their challenges. Primarily, anomaly detection on Blockchain infrastructure through Artificial Intelligence Techniques is focused. A detailed analysis of Artificial Intelligence Techniques in detecting the anomalies with the help of Blockchain and also how these two technologies complement each other was demonstrated with the help of suitable use cases. The merits, challenges along with the possible future directions, while integrating Blockchain with Artificial Intelligence Techniques are presented for the benefit of research community.  相似文献   

20.
    
Electronic devices require the printed circuit board(PCB)to support the whole structure,but the assembly of PCBs suffers from welding problem of the electronic components such as surface mounted devices(SMDs)resistors.The automated optical inspection(AOI)machine,widely used in industrial production,can take the image of PCBs and examine the welding issue.However,the AOI machine could commit false negative errors and dedicated technicians have to be employed to pick out those misjudged PCBs.This paper proposes a machine learning based method to improve the accuracy of AOI.In particular,we propose an adjacent pixel RGB value based method to pre-process the image from the AOI machine and build a customized deep learning model to classify the image.We present a practical scheme including two machine learning procedures to mitigate AOI errors.We conduct experiments with the real dataset from a production line for three months,the experimental results show that our method can reduce the rate of misjudgment from 0.3%–0.5%to 0.02%–0.03%,which is meaningful for thousands of PCBs each containing thousands of electronic components in practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号