Current Issue : January-March Volume : 2022 Issue Number : 1 Articles : 5 Articles
Due to the common progress and interdependence of wireless sensor networks and language, Chinese semantic analysis under wireless sensor networks has become more and more important. Although there are many research results on wireless networks and Chinese semantics, there are few researches on the influence and relationship between them. Wireless sensor networks have strong application relevance, and the key technologies that need to be solved are also different for different application backgrounds. In order to reveal the basic laws and development trends of online Chinese semantic behavior expression in the context of wireless sensor networks, this paper adopts big data analysis methods and semantic model analysis methods and constructs semantic analysis models through PLSA method calculations, so that the λ construction process conforms to this research topic. Research the accuracy and applicability of the semantic analysis model. Through word extraction of 1.05 million word data of 1,103 documents on Baidu Tieba, HowNet, and citeulike websites, the data set was integrated into a data set, and the PLSA model was verified with this data set. In addition, through the construction of the wireless sensor network, the semantic analysis results in the expression of Chinese behavior are obtained. The results show that the accuracy of the data set extracted from 1103 documents increases with the increase of the number of documents. Second, after using the PLSA model to perform semantic analysis on the data set, the accuracy of the data set is improved. Compared with traditional semantic analysis, the model and the big data analysis framework have obvious advantages. With the continuous development of Internet big data, the big data methods used to count Chinese semantics are also constantly updated, and their efficiency is constantly improving. These updated semantic analysis models and statistical methods are constantly eliminating the uncertainty of modern online Chinese. The basic laws and development trends of statistical Chinese semantics also provide new application scenarios for online Chinese behavior. It also laid a ladder for subsequent scholars....
This paper proposes a decentralized control approach using a co-simulation platform to monitor protective elements and provide complete protection scheme for distribution systems. Real time measurements are obtained by interfacing the system model in RSCAD/RTDS with SEL 421 protective relays and publish/subscribe the voltage and current signals of the buses and transmission lines based on IEC 61850 communication protocol to isolate the fault correctly. The proposed technique helps to identify the location of the fault and introduces primary and buck protection for the system. The communication networks assists in facing cyber and physical threats and finding a new path for healthy relays to remove faults from the system. This technique is investigated on an IEEE 14 bus system for all possible fault locations. The proposed scheme can clear the fault by isolating the minimum part of the system and improving the endurance of the power in it. The system shows the smooth information flow between the cyber and physical parts to isolate faults in it in different cases....
Determining the appropriate approaches and procedures to gain sufficient results is a vital issue that is faced by the majority of researchers. Each type of research can have several methodologies that can be applied. Yet, one approach might lead to concluding more effective outcomes. 'us, designing the research and applying appropriate methods and techniques are the key aim of this experiment. Combining the research onion framework with an advanced Internet of 'ings- (IoT-) enabled mobile app solution within the real world is the foundation of this research. 'e framework has six main layers, starting with philosophy and ending with techniques and procedures. 'is research begins by providing a brief introduction in regard to the selected framework. 'en, it provides a comprehensive explanation regarding each of the framework layers and justifying the chosen element within each layer combining with the advanced IoT-enabled mobile app for this research study. Later, it highlights the challenges that can be faced while using such a framework....
With the development of intelligent and connected vehicles, onboard Ethernet will play an important role in the next generation of vehicle network architectures. It is well established that accurate timing and guaranteed data delivery are critical in the automotive environment. -e time-sensitive network (TSN) protocol can precisely guarantee the time certainty of the key signals of automotive Ethernet. With the time-sensitive network based on automotive Ethernet being standardized by the TSN working group, the TSN has already entered the vision of the automotive network. However, the security mechanism of the TSN protocol is rarely discussed. First, the security of the TSN automotive Ethernet as a backbone E/E (electrical/electronic) architecture is analyzed in this paper through the Microsoft STRIDE threat model, and possible countermeasures for the security of automotive TSNs are listed, including the security protocol defined in the TSN, so that the TSN security protocol and the traditional protection technology can form a complete automotive Ethernet protection system. -en, the security mechanism per-stream filtering and policing (PSFP) defined in IEEE 802.1Qci is analyzed in detail, and an anomaly detection system based on PSFP is proposed in this paper. Finally, OMNeT++ is used to simulate a real TSN topology to evaluate the performance of the proposed anomaly detection system (ADS). As a result, the protection strategy based on 802.1Qci not only ensures the real-time performance of the TSN but can also isolate individuals with abnormal behavior and block DoS (denial of service) attacks, thus attaining the security protection of the TSN vehicle-based network....
A transient delay-coupled network was proposed by modifying the standard delay-coupled network with a transient coupling technique to enlarge the synchronization domain of the network, where the synchronization domain is the interval of the coupling strength for which the network gets synchronized. The coupling of the transient delay-coupled network is activated when the systems are in a particular region (coupling region) of the phase space and inactivated otherwise, which is different from the standard coupling. The specific synchronization performance of the transient delay-coupled network was investigated through case studies. The relationships between the synchronization domain and the coupling region were obtained by gauging the synchronization index. It is understood that the synchronization domain changes in a non-smooth manner with the variation of the coupling region. In particular, the synchronization domain of a transient delay-coupled network is much larger than that of the standard delay-coupled network when the coupling region is appropriately determined....
Loading....