To see the other types of publications on this topic, follow the link: KNX protocol.

Journal articles on the topic 'KNX protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'KNX protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Omar, Chamorro-Atalaya, Quesquen-Porras Angel, and Arce-Santillan Dora. "Lighting control network based on KNX protocol, for the reduction of energy consumption." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 3 (2020): 1186–93. https://doi.org/10.11591/ijeecs.v19.i3.pp1186-1193.

Full text
Abstract:
This article presents the development of a lighting control network to reduce the energy consumption of a commercial building, using the KNX protocol; because of the high rates of electricity consumption, the same that are reflected in the payment of the electricity supply. For this, the design of the network architecture is carried out, the tree type quality and it has KNX, DALI components and LED luminaires, which are interconnected by means of an Ethernet type BUS; The KNX protocol configuration is then performed using the ETS version 5 software; carries out the implementation of KNX techno
APA, Harvard, Vancouver, ISO, and other styles
2

Kartuzov, Aleksandr, Tatyana Kartuzova, and Lyudmila Seliverstova. "Laboratory stand for designing industrial KNX networks on Siemens logo! Communication modules." E3S Web of Conferences 140 (2019): 04008. http://dx.doi.org/10.1051/e3sconf/201914004008.

Full text
Abstract:
Industrial automation networks based on the EIB / KNX protocol are very popular among European companies in the construction of intelligent buildings, but they are of little interest in high school education and currently professional specialists are not trained to use them. Developing the KNX‐based automation system simulator for the training of engineering students is required. We have designed and installed a KNX simulator for engineering students training on smart systems. The presented stand was developed on Siemens LOGO! Basic with CM KNX communication modules. The modules of simulator a
APA, Harvard, Vancouver, ISO, and other styles
3

Chamorro Atalaya, Omar, Angel Quesquen-Porras, and Dora Arce Santillan. "Lighting control network based on KNX protocol, for the reduction of energy consumption." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1186. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1186-1193.

Full text
Abstract:
<span>This article presents the development of a lighting control network to reduce the energy consumption of a commercial building, using the KNX protocol; because of the high rates of electricity consumption, the same that are reflected in the payment of the electricity supply. For this, the design of the network architecture is carried out, the tree type quality and it has KNX, DALI components and LED luminaires, which are interconnected by means of an Ethernet type BUS; The KNX protocol configuration is then performed using the ETS version 5 software; carries out the implementation o
APA, Harvard, Vancouver, ISO, and other styles
4

Pang, Dang Feng, Sheng Li Lu, Feng Xin Zhang, and Guang Zhao. "Design of Intelligent LED Lighting System Based on KNX Bus for Building." Applied Mechanics and Materials 734 (February 2015): 960–64. http://dx.doi.org/10.4028/www.scientific.net/amm.734.960.

Full text
Abstract:
Technology of KNX bus is an open standard protocol which is used in residential areas and building control worldwide.A kind of intelligent LED lighting system based on KNX bus is designed which realized intelligent controlling for LED lighting systems in office region,energy efficient management and utilization, improvement on scalability and stability.
APA, Harvard, Vancouver, ISO, and other styles
5

Feng, Tao, and Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB." Information 14, no. 12 (2023): 653. http://dx.doi.org/10.3390/info14120653.

Full text
Abstract:
The European Installation Bus(EIB) protocol, also known as KNX/EIB, is widely used in building and home automation. An extension of the KNX/EIB protocol, EIBsec, is primarily designed to meet the requirements for data transmission security in distributed building automation systems. However, this protocol has some security issues in the request, key distribution, and identity authentication processes. This paper employs a formal analysis method that combines Colored Petri Net (CPN) theory with the Dolev-Yao attack model to evaluate and enhance the EIBsec protocol. It utilizes the CPN Tools to
APA, Harvard, Vancouver, ISO, and other styles
6

ZHANG, Guo-dong, and Xi-huang ZHANG. "Real-time analysis and improvement of KNX/EIB communication protocol." Journal of Computer Applications 32, no. 2 (2013): 370–73. http://dx.doi.org/10.3724/sp.j.1087.2012.00370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Solmaz Akar, Handan, Erdem Akboy, and Yilmaz Eyidogan. "Design and Implementation of a Power Supply for KNX Protocol." Turkish Journal of Electrical Power and Energy Systems 3, no. 2 (2023): 90–96. http://dx.doi.org/10.5152/tepes.2023.23010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vanus, Jan, Ojan M. Gorjani, and Petr Bilik. "Novel Proposal for Prediction of CO2 Course and Occupancy Recognition in Intelligent Buildings within IoT." Energies 12, no. 23 (2019): 4541. http://dx.doi.org/10.3390/en12234541.

Full text
Abstract:
Many direct and indirect methods, processes, and sensors available on the market today are used to monitor the occupancy of selected Intelligent Building (IB) premises and the living activities of IB residents. By recognizing the occupancy of individual spaces in IB, IB can be optimally automated in conjunction with energy savings. This article proposes a novel method of indirect occupancy monitoring using CO2, temperature, and relative humidity measured by means of standard operating measurements using the KNX (Konnex (standard EN 50090, ISO/IEC 14543)) technology to monitor laboratory room o
APA, Harvard, Vancouver, ISO, and other styles
9

Cariello, Simona, Dario Sanalitro, Alessandro Micali, Arturo Buscarino, and Maide Bucolo. "Brain–Computer-Interface-Based Smart-Home Interface by Leveraging Motor Imagery Signals." Inventions 8, no. 4 (2023): 91. http://dx.doi.org/10.3390/inventions8040091.

Full text
Abstract:
In this work, we propose a brain–computer-interface (BCI)-based smart-home interface which leverages motor imagery (MI) signals to operate home devices in real-time. The idea behind MI-BCI is that different types of MI activities will activate various brain regions. Therefore, after recording the user’s electroencephalogram (EEG) data, two approaches, i.e., Regularized Common Spatial Pattern (RCSP) and Linear Discriminant Analysis (LDA), analyze these data to classify users’ imagined tasks. In such a way, the user can perform the intended action. In the proposed framework, EEG signals were rec
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Jin, and Anseop Choi. "Reduction of lighting power consumption through lighting control using the KNX/digital addressable lighting interface protocol in liquefied natural gas carrier accommodation mock-up." Renewable and Sustainable Energy Reviews 182 (August 2023): 113374. http://dx.doi.org/10.1016/j.rser.2023.113374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

M., Parhamfar, Shojaeian S., and Bandegani Z. "Feasibility Study and Design of Smart Low-Energy Building Electrical ‎Installations (Case Study: Isfahan University, Virtual Faculty Building)." Energy Systems Research 6, no. 3(23) (2023): 57–74. http://dx.doi.org/10.25729/esr.2023.03.0006.

Full text
Abstract:
Buildings, particularly office buildings, are major energy consumers and sources of CO2 ‎emissions, contributing to around one-third of global energy consumption. As a result, energy ‎consumption optimization regulations and the deployment of renewable energy technology in the ‎construction sector has the potential to significantly reduce energy consumption and carbon ‎emissions. This paper describes a comprehensive study on the technical feasibility and design of ‎the electrical equipment of the Isfahan University virtual faculty building project in accordance ‎with Iran's standards and guide
APA, Harvard, Vancouver, ISO, and other styles
12

Lima, Luiz André da Silva Lima André da Silva, Thaís Telles Queiroz Lira, Tatiane Luciano Balliano, and Silvia Beatriz Beger Uchôa. "Prospecção de Tecnologias Educacionais em KNX." Cadernos de Prospecção 11, no. 5 (2018): 1546. http://dx.doi.org/10.9771/cp.v11i5.27209.

Full text
Abstract:
Este trabalho apresenta uma prospecção tecnológica sobre as tecnologias educacionais que utilizam o protocolo KNX em seus sistemas. Tal protocolo consiste em um padrão de comunicação aberta para controlar sistemas de automação predial e residencial. Ao prospectar as tecnologias disponíveis no mercado, pretende-se desenvolver um produto para educação utilizando componentes do sistema KNX voltado para o processo de ensino e aprendizagem no âmbito dos cursos de Automação de Edifícios e Casas. Para tanto, foi realizado o levantamento em bases de dados acadêmica e de patentes, nacionais e internaci
APA, Harvard, Vancouver, ISO, and other styles
13

LIMA, Luiz André da Silva Lima André da Silva, Thaís Telles Queiroz Lira, Tatiane Luciano Balliano, and Silvia Beatriz Beger Uchôa. "PROSPECÇÃO DE TECNOLOGIAS EDUCACIONAIS EM KNX." Cadernos de Prospecção 11, no. 5 (2018): 1546. http://dx.doi.org/10.9771/cp.v12i5.27209.

Full text
Abstract:
<p><span style="font-size: medium;"><span style="font-family: Times New Roman;"><span>Este trabalho apresenta uma prospecção tecnológica sobre as tecnologias educacionais que utilizam o protocolo KNX em seus sistemas. Tal protocolo consiste em um <span>padrão de comunicação aberta para controlar sistemas de automação predial e residencial.</span> Ao prospectar as tecnologias disponíveis no mercado, pretende-se </span><span>desenvolver um produto para educação utilizando componentes do sistema KNX voltado para o processo de ensino e aprendizagem n
APA, Harvard, Vancouver, ISO, and other styles
14

Budati, Anil Kumar, Shayla Islam, Mohammad Kamrul Hasan, Nurhizam Safie, Nurhidayah Bahar, and Taher M. Ghazal. "Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices." Sensors 23, no. 11 (2023): 5072. http://dx.doi.org/10.3390/s23115072.

Full text
Abstract:
The global expansion of the Visual Internet of Things (VIoT)’s deployment with multiple devices and sensor interconnections has been widespread. Frame collusion and buffering delays are the primary artifacts in the broad area of VIoT networking applications due to significant packet loss and network congestion. Numerous studies have been carried out on the impact of packet loss on Quality of Experience (QoE) for a wide range of applications. In this paper, a lossy video transmission framework for the VIoT considering the KNN classifier merged with the H.265 protocols. The performance of the pr
APA, Harvard, Vancouver, ISO, and other styles
15

Purba, Ridhoi, Meutia Nauly, and Zaid. "Outdoor School Modeling at LPK Kaizen Nirel Center During the Covid-19 Pandemic Disaster." ABDIMAS TALENTA: Jurnal Pengabdian Kepada Masyarakat 7, no. 2 (2022): 619–24. http://dx.doi.org/10.32734/abdimastalenta.v7i2.7698.

Full text
Abstract:
The Covid-19 disaster has impacted the learning process, not only for normal children but also for children with special needs. They have the same right to get a quality education. This community service is addressed as an outdoor learning model and applies health protocol at LPK Kaizen Wireless Center (KNC). KNC is an institution that provides education and training services to children with special needs. The method used is consultation, and support for learning facilities following health protocols. This service is located at the location of KNC. The results of the service made KNC as an ou
APA, Harvard, Vancouver, ISO, and other styles
16

Juwaied, Abdulla, Lidia Jackowska-Strumillo, and Artur Sierszeń. "Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm." Sensors 25, no. 4 (2025): 1029. https://doi.org/10.3390/s25041029.

Full text
Abstract:
Wireless Sensor Networks are formed by tiny, self-contained, battery-powered computers with radio links that can sense their surroundings for events of interest and store and process the sensed data. Sensor nodes wirelessly communicate with each other to relay information to a central base station. Energy consumption is the most critical parameter in Wireless Sensor Networks (WSNs). Network lifespan is directly influenced by the energy consumption of the sensor nodes. All sensors in the network send and receive data from the base station (BS) using different routing protocols and algorithms. T
APA, Harvard, Vancouver, ISO, and other styles
17

Sameera, N. "Protocol-Specific Intrusion Detection System using KNN Classifier." International Journal for Research in Applied Science and Engineering Technology 6, no. 5 (2018): 292–99. http://dx.doi.org/10.22214/ijraset.2018.5049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Samara, Ghassan, and Mohammad Aljaidi. "Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 1 (2019): 496–504. https://doi.org/10.11591/ijece.v9i1.pp496-504.

Full text
Abstract:
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficie
APA, Harvard, Vancouver, ISO, and other styles
19

Alzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (2022): 3837. http://dx.doi.org/10.3390/electronics11223837.

Full text
Abstract:
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial component of industrial, residential, and telecommunication applications, among others. This innovative idea promotes communication between physical components, such as sensors and actuators, to improve process flexibility and efficiency. Smart gadgets in IoT contexts interact using various message protocols. Message queuing telemetry transfer (MQTT) is a protocol that is used extensively in the IoT context to deliver sensor or event data. The aim of the proposed system is to create an intrusion detection syste
APA, Harvard, Vancouver, ISO, and other styles
20

Asha, Durafe, Jagtap Rahul, Kanojia Sunny, Kumath Arpan, and Mishra Sunny. "Chamber Gas Monitoring System using KNN Algorithm and Wireless Protocol." Journal of Advancement in Communication System 4, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4744418.

Full text
Abstract:
<em>It is known from history of explosions there were many occurrences of loss of life and property due to hazardous gas leakage and sudden outbreak of poisonous chemical gases. The damage was tremendous and huge destruction of life occurred. Thus, there is a need of an efficient and smart system that can predict, process and can do the data acquisition in a quick lap. The system should relay all the parameters to a computational sub-system through which processing should take place. We have designed an electronic microcontroller system that is capable of transmitting data at a faster rate and
APA, Harvard, Vancouver, ISO, and other styles
21

Juwaied, Abdulla, and Lidia Jackowska-Strumillo. "Applying Machine Learning to DEEC Protocol: Improved Cluster Formation in Wireless Sensor Networks." Network 5, no. 3 (2025): 26. https://doi.org/10.3390/network5030026.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are specialised ad hoc networks composed of small, low-power, and often battery-operated sensor nodes with various sensors and wireless communication capabilities. These nodes collaborate to monitor and collect data from the physical environment, transmitting it to a central location or sink node for further processing and analysis. This study proposes two machine learning-based enhancements to the DEEC protocol for Wireless Sensor Networks (WSNs) by integrating the K-Nearest Neighbours (K-NN) and K-Means (K-M) machine learning (ML) algorithms. The Distributed E
APA, Harvard, Vancouver, ISO, and other styles
22

Vinaybhushan, P., and T. Hirwarkar. "PRIVACY-PERSERVING KNN CLASSIFICATION PROTOCOL OVER ENCRPTED RELATIONAL DATA IN THE CLOUD." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 4589–96. http://dx.doi.org/10.37418/amsj.9.7.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Chuan-Ming, and Shu-Yu Fu. "Effective protocols for kNN search on broadcast multi-dimensional index trees." Information Systems 33, no. 1 (2008): 18–35. http://dx.doi.org/10.1016/j.is.2007.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Khan, Muhammad Almas, Muazzam A. Khan, Sana Ullah Jan, et al. "A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT." Sensors 21, no. 21 (2021): 7016. http://dx.doi.org/10.3390/s21217016.

Full text
Abstract:
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or event data. The publish–subscribe strategy makes it more attractive for intruders and thus increases the number of possible attacks over MQTT. In this paper, we proposed a Deep Neural Network (DNN) for intrusion detection in the MQTT-based protocol and also compared its performance with other traditional machine learning (ML) algorithms, such as a Na
APA, Harvard, Vancouver, ISO, and other styles
25

Cheng, Kefei, Yujie Deng, Liang Zhang, Xiaotong Cui, Jinghao Chen, and Wei Luo. "Research on ZigBee Device Recognition Based on Software Defined Radio." Journal of Physics: Conference Series 2290, no. 1 (2022): 012040. http://dx.doi.org/10.1088/1742-6596/2290/1/012040.

Full text
Abstract:
Abstract In order to solve the problem that ZigBee protocol sniffer analysis is based on proprietary chip platform and cannot obtain radio signal characteristics. A ZigBee protocol packet sniffing recognition method based on software defined radio is proposed. This paper proposes a ZigBee recognition method based on software radio, and analyzes the characteristics of ZigBee protocol messages. The software radio receiving flow diagram is designed to extract the captured message features, and the experimental results of neural network, KNN, decision tree and random forest algorithm are compared.
APA, Harvard, Vancouver, ISO, and other styles
26

Surya Prasetyo, Dimas, Karina Auliasari, and Muhammad Ridho Putra Syalabi. "Klasifikasi Serangan Jaringan Menggunakan Metode K-Nearest Neighbour pada Data Riwayat Jaringan." Prosiding SENIATI 7, no. 1 (2023): 63–71. http://dx.doi.org/10.36040/seniati.v7i1.7874.

Full text
Abstract:
Metode deteksi serangan yang lebih pintar dan fleksibel diperlukan karena serangan jaringan modern semakin kompleks. Pola lalu lintas, frekuensi koneksi, dan protokol yang digunakan digunakan dalam metode K-Nearest Neighbour (KNN) dalam klasifikasi serangan jaringan berdasarkan data riwayat jaringan. Pola serangan dapat diidentifikasi dengan model KNN yang efisien, yang membedakannya dari lalu lintas jaringan biasa. Pada penelitian ini dilakukan prapemrosesan data untuk penelitian ini, yang mencakup normalisasi data, ekstraksi atribut yang relevan, korelasi antar atribut hingga menerapkan algo
APA, Harvard, Vancouver, ISO, and other styles
27

Okola, Vitalis, J. Guyo, L. Okutoyi, A. Osoti, and M. Ogeng'o. "Effectiveness of a group B streptococcus protocol on screening and intrapartum antibiotic prophylaxis at Kenyatta National Hospital." Journal of Obstetrics and Gynaecology of Eastern and Central Africa 29, no. 1 (2017): 3–6. http://dx.doi.org/10.59692/jogeca.v29i1.345.

Full text
Abstract:
Background: Intrapartum Antibiotic Prophylaxis (IAP) is highly effective in preventing early-onset Group B Streptococcus (GBS) disease among infants born to colonized women. The burden of GBS at Kenyatta National Hospital (KNH) is comparable to the global prevalence yet standardized IAP guidelines have neither been developed nor implemented. This is important in averting GBS associated mortality and morbidity. Objective: To determine if introduction of a GBS screening and IAP protocol is associated with changes in proportion of women receiving appropriate GBS screening and IAP at KNH. Material
APA, Harvard, Vancouver, ISO, and other styles
28

Kaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.

Full text
Abstract:
&lt;p&gt;This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimistic responses. In this study, the author proposes a novel security solution, the K-AOMDV (KNN- Ad Hoc On-Demand Multi-Path Routing protocol) that uses K-means clustering to prevent routing misbehaviour. The efficiency of the proposed K-AOMDV ro
APA, Harvard, Vancouver, ISO, and other styles
29

Firman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack detection by using epsilon g
APA, Harvard, Vancouver, ISO, and other styles
30

Abdan, Masoud, and Seyed Amin Hosseini Seno. "Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)." Wireless Communications and Mobile Computing 2022 (January 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/2375702.

Full text
Abstract:
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The classification is performed with several methods of machine learning consisting of K -nearest neighbor (KNN), support vector machine (SVM), decision tree (DT), linear discrimination analysis (LDA), naive Bayes (NB), and convolutional neural network (CNN). Moreover, we used nodes’ properties for feature extraction, especially nodes’ speed, in the MANET. We have collected 3997 distinct (normal 3781 and malicious 216) samples that comprise normal and malicious nodes. The classification results show tha
APA, Harvard, Vancouver, ISO, and other styles
31

Kim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.

Full text
Abstract:
AbstractSince studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, a couple of privacy-preserving kNN query processing algorithms have been proposed over the encrypted database. However, the existing algorithms are either insecure or inefficient. Therefore, in this paper we propose a privacy-preserving kNN query processing algorithm via secure two-party computation on the encrypted database. Our algorithm preserves both data privacy and query privacy while hiding data acces
APA, Harvard, Vancouver, ISO, and other styles
32

Karrar, Falih Hassan, and Ebady Manaa Mehdi. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604~1613. https://doi.org/10.11591/eei.v11i3.3643.

Full text
Abstract:
The introduction of a new technology has aided the exponential growth of the internet of things (IoT), allowing for the connecting of more devices in the IoT network to be made possible by the availability of quicker connections and reduced latency. As IoT networks have become more prevalent and widely used, security has become one of the fundamental requirements, and a distributed denial of service (DDoS) attack poses a significant security threat due to the limited resources (CPU, memory, open source, persistent connection) that can be used to either intentionally or unintentionally increase
APA, Harvard, Vancouver, ISO, and other styles
33

Daru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
&lt;span lang="EN-US"&gt;Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack det
APA, Harvard, Vancouver, ISO, and other styles
34

Komatsuda, T., I. Nakamura, F. Takaiwa, and S. Oka. "Development of STS markers closely linked to the vrs1 locus in barley, Hordeum vulgare." Genome 41, no. 5 (1998): 680–85. http://dx.doi.org/10.1139/g98-069.

Full text
Abstract:
Three random amplified polymorphic DNAs (RAPDs) closely linked to the vrs1 (formerly v) locus were sequenced and converted to sequence-tagged sites (STSs). Of the three STSs, two retained the RAPD polymorphism as dominant-recessive markers between 'Kanto Nakate Gold' (KNG; a two-rowed barley) and 'Azumamugi' (AZ; a six-rowed barley), while the other was co-dominant after digestion with restriction enzymes. Six restriction fragment length polymorphisms (RFLPs) linked to vrs1 were converted to six STSs. All six STSs were co-dominant between the two cultivars after digestion with restriction enzy
APA, Harvard, Vancouver, ISO, and other styles
35

Alotaibi, Nouf Saeed, Hassan I. Sayed Ahmed, Samah Osama M. Kamel, and Ghada Farouk ElKabbany. "Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework." Sensors 24, no. 5 (2024): 1638. http://dx.doi.org/10.3390/s24051638.

Full text
Abstract:
The Message Queuing Telemetry Transport (MQTT) protocol stands out as one of the foremost and widely recognized messaging protocols in the field. It is often used to transfer and manage data between devices and is extensively employed for applications ranging from smart homes and industrial automation to healthcare and transportation systems. However, it lacks built-in security features, thereby making it vulnerable to many types of attacks such as man-in-the-middle (MitM), buffer overflow, pre-shared key, brute force authentication, malformed data, distributed denial-of-service (DDoS) attacks
APA, Harvard, Vancouver, ISO, and other styles
36

Amrullah, Muhammad, Awang Wardana, and Agus Arif. "Multi-oscillations Detection for Process Variables Based on K-Nearest Neighbor." ELKHA 15, no. 2 (2023): 120. http://dx.doi.org/10.26418/elkha.v15i2.68293.

Full text
Abstract:
In the process industry, a control system is important to ensure the process runs smoothly and keeps the product under predetermined specifications. Oscillations in process variables can affect the decreasing profitability of the plant. It is important to detect the oscillation before it becomes a problem for profitability. Various methods have been developed; however, the methods still need to improve when implemented online for multi-oscillation. Therefore, this research uses a machine learning-based method with the K-Nearest Neighbour (KNN) algorithm to detect multi-oscillation in the contr
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Yong-Ki, Hyeong-Jin Kim, Hyunjo Lee, and Jae-Woo Chang. "Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing." PLOS ONE 17, no. 5 (2022): e0267908. http://dx.doi.org/10.1371/journal.pone.0267908.

Full text
Abstract:
With the development of cloud computing, interest in database outsourcing has recently increased. In cloud computing, it is necessary to protect the sensitive information of data owners and authorized users. For this, data mining techniques over encrypted data have been studied to protect the original database, user queries and data access patterns. The typical data mining technique is kNN classification which is widely used for data analysis and artificial intelligence. However, existing works do not provide a sufficient level of efficiency for a large amount of encrypted data. To solve this
APA, Harvard, Vancouver, ISO, and other styles
38

Agghey, Abel Z., Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, and Jema D. Ndibwile. "Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach." Symmetry 13, no. 11 (2021): 2192. http://dx.doi.org/10.3390/sym13112192.

Full text
Abstract:
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Brute-force attack is among the most prominent and commonly used attacks, achieved out using password-attack tools, a wordlist dictionary, and a usernames list—obtained through a so-called an enumeration attack. In this paper, we investigate username enumeration attack detection on SSH protocol by usi
APA, Harvard, Vancouver, ISO, and other styles
39

Vahabzadeh-Hagh, Andrew M., Paul A. Muller, Alvaro Pascual-Leone, Frances E. Jensen, and Alexander Rotenberg. "Measures of Cortical Inhibition by Paired-Pulse Transcranial Magnetic Stimulation in Anesthetized Rats." Journal of Neurophysiology 105, no. 2 (2011): 615–24. http://dx.doi.org/10.1152/jn.00660.2010.

Full text
Abstract:
Paired-pulse transcranial magnetic stimulation (ppTMS) is a noninvasive method to measure cortical inhibition in vivo. Long interpulse interval (50–500 ms) ppTMS (LI-ppTMS) provokes intracortical inhibitory circuits and can reveal pathologically impaired cortical inhibition in disorders such as epilepsy. Adaptation of ppTMS protocols to rodent disease models is highly desirable to facilitate basic and translational research. We previously adapted single-pulse TMS (spTMS) methods to rats, but ppTMS has yet to be applied. Specifically, whether ppTMS elicits an inhibitory response in rodents is u
APA, Harvard, Vancouver, ISO, and other styles
40

K Singla, Rajeev, Varadaraj Bhat G, and TNV Ganesh Kumar. "3D-Quantitative Structure Activity Relationship: A Strategic Approach for In Silico Prediction of Anti-Candididal Action of 1,2,4- Triazole Derivatives." Indo Global Journal of Pharmaceutical Sciences 03, no. 01 (2013): 52–57. http://dx.doi.org/10.35652/igjps.2013.07.

Full text
Abstract:
The three dimensional quantitative structure activity relationships(3D-QSAR) of a series of previously synthesized 1-(1H-1,2,4-triazole-1-yl)-2-(2,4-difluorophenyl)-3-substituted-2-propanol analogs(TDFPP) as antifungal against candida albicans, were studied using kNN(K nearest neighbour) protocol. This was in order to explore the selectivity requirements for fungicidal activity against C. albicans among these congeners. Theoretical active conformers for these TDFPP were generated. The best kNN model(N=44, q2= 0.8650, r2= 0.86504) showed contribution of the steric and electrostatic fields. The
APA, Harvard, Vancouver, ISO, and other styles
41

Sung, Guo-Ming, Sachin D. Kohale, Te-Hui Chiang, and Yu-Jie Chong. "An Artificial Intelligence Home Monitoring System That Uses CNN and LSTM and is Based on the Android Studio Development Platform." Applied Sciences 15, no. 3 (2025): 1207. https://doi.org/10.3390/app15031207.

Full text
Abstract:
This paper developed an artificial intelligence home environment monitoring system by using the Android Studio development platform. A database was constructed within a server to store sensor data. The proposed system comprises multiple sensors, a message queueing telemetry transport (MQTT) communication protocol, cloud data storage and computation, and end device control. A mobile application was developed using MongoDB software, which is a file-oriented NoSQL database management system developed using C++. This system represents a new database for processing big sensor data. The k-nearest ne
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.

Full text
Abstract:
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of wireless sensor networks, seriously restricting the application of wireless sensor network. Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. In this paper, we proposed a new intrusion detection system based
APA, Harvard, Vancouver, ISO, and other styles
43

Hassan, Karrar Falih, and Mehdi Ebady Manaa. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604–13. http://dx.doi.org/10.11591/eei.v11i3.3643.

Full text
Abstract:
The introduction of a new technology has aided the exponential growth of the internet of things (IoT), allowing for the connecting of more devices in the IoT network to be made possible by the availability of quicker connections and reduced latency. As IoT networks have become more prevalent and widely used, security has become one of the fundamental requirements, and a distributed denial of service (DDoS) attack poses a significant security threat due to the limited resources (CPU, memory, open source, persistent connection) that can be used to either intentionally or unintentionally increase
APA, Harvard, Vancouver, ISO, and other styles
44

Tonkal, Özgür, Hüseyin Polat, Erdal Başaran, Zafer Cömert, and Ramazan Kocaoğlu. "Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking." Electronics 10, no. 11 (2021): 1227. http://dx.doi.org/10.3390/electronics10111227.

Full text
Abstract:
The Software-Defined Network (SDN) is a new network paradigm that promises more dynamic and efficiently manageable network architecture for new-generation networks. With its programmable central controller approach, network operators can easily manage and control the whole network. However, at the same time, due to its centralized structure, it is the target of many attack vectors. Distributed Denial of Service (DDoS) attacks are the most effective attack vector to the SDN. The purpose of this study is to classify the SDN traffic as normal or attack traffic using machine learning algorithms eq
APA, Harvard, Vancouver, ISO, and other styles
45

Naufal, Mohammad Farid, Selvia Ferdiana Kusuma, Zefanya Ardya Prayuska, et al. "Comparative Analysis of Image Classification Algorithms for Face Mask Detection." Journal of Information Systems Engineering and Business Intelligence 7, no. 1 (2021): 56. http://dx.doi.org/10.20473/jisebi.7.1.56-66.

Full text
Abstract:
Background: The COVID-19 pandemic remains a problem in 2021. Health protocols are needed to prevent the spread, including wearing a face mask. Enforcing people to wear face masks is tiring. AI can be used to classify images for face mask detection. There are a lot of image classification algorithm for face mask detection, but there are still no studies that compare their performance.Objective: This study aims to compare the classification algorithms of classical machine learning. They are k-nearest neighbors (KNN), support vector machine (SVM), and a widely used deep learning algorithm for ima
APA, Harvard, Vancouver, ISO, and other styles
46

Aljojo, Nahla. "Network Transmission Flags Data Affinity-based Classification by K-Nearest Neighbor." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 10, no. 1 (2022): 35–43. http://dx.doi.org/10.14500/aro.10880.

Full text
Abstract:
Abstract—This research is concerned with the data generated during a network transmission session to understand how to extract value from the data generated and be able to conduct tasks. Instead of comparing all of the transmission flags for a transmission session at the same time to conduct any analysis, this paper conceptualized the influence of each transmission flag on network-aware applications by comparing the flags one by one on their impact to the application during the transmission session, rather than comparing all of the transmission flags at the same time. The K-nearest neighbor (K
APA, Harvard, Vancouver, ISO, and other styles
47

Nurjanah, Uli, P. Maria Hendrati, Anton Budi Dharmawan, and Nur Signa A. Gumilas. "Deteksi Gen Laten Membrane Protein-1 Epstein-Barr Virus Pada Karsinoma Nasofaring." Biosfera 33, no. 2 (2017): 76. http://dx.doi.org/10.20884/1.mib.2016.33.2.466.

Full text
Abstract:
Penelitian ini bertujuan untuk mengidentifikasi gen LMP-1 EBV sebagai biomarka diagnosis KNF. Desain penelitian ini adalah studi cross-sectional dengan teknik consecutive sampling. Sampel adalah darah total pasien KNF WHO-3 yang dikumpulkan dari pasien yang belum menjalani terapi dari tahun 2014 pada Departemen Telinga Hidung Tenggorok - Kepala Leher, Rumah Sakit Prof. dr. Margono Soekarjo, Purwokerto. Total subyek penelitian adalah 22 orang untuk NPC WHO-3 pasien dengan informed consent. Sampel diisolasi dengan protokol kit Purelink® DNA / RNA (Invitrogen) untuk mendapatkan larutan DNA 100μL
APA, Harvard, Vancouver, ISO, and other styles
48

Khan, Rabia, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Saira Shafi, and Aftab Ali. "FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning." Sensors 24, no. 17 (2024): 5834. http://dx.doi.org/10.3390/s24175834.

Full text
Abstract:
The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. The development of the IoT has led to the emergence of several solutions in various sectors. However, rapid popularization also has its challenges, and one of the most serious challenges is the security of the IoT. Security is a major concern, particularly routing attacks in the core network, which may cause severe damage due to information loss. Routing Protocol for Low-Power and Lossy Networks (RPL), a routing protocol used for IoT devices, is faced with selectiv
APA, Harvard, Vancouver, ISO, and other styles
49

A., Sabitha Banu, and Dr G. Padmavathi. "Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography." EAI Endorsed Transactions on Pervasive Health and Technology 8, no. 4 (2022): e3. http://dx.doi.org/10.4108/eetpht.v8i4.3081.

Full text
Abstract:
A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS is a database used by millions ofcomputers to determine which address best answers a user’s query. DNS is an unencrypted protocol that may be exploited in numerous ways. The mostpopular DNS MITM attack uses DNS poisoning to intercept communications and fake them. DNS servers do not verify the IP addresses they forwardtraffic to. In DNS attacks, the attacker either targets the domain name servers or attempts to exploit system weaknesses. The Proposed FFOBLA-ECC model detects the DNS Spoo
APA, Harvard, Vancouver, ISO, and other styles
50

Dhiya Eddine, Abid, and Ghazli Abdelkader. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. http://dx.doi.org/10.11591/csit.v5i3.p227-234.

Full text
Abstract:
DNS over HTTPS (DoH) is a developing protocol that uses encryption to secure domain name system (DNS) queries within hypertext transfer protocol secure (HTTPS) connections, thereby improving privacy and security while browsing the web. This study involved the development of a live tool that captures and analyzes DoH traffic in order to classify it as either benign or malicious. We employed machine learning (ML) algorithms such as K-Nearest Neighbors (K-NN), random forest (RF), decision tree (DT), deep neural network (DNN), and support vector machine (SVM) to categorize the data. All of the alg
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!