Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2023, 6(7); doi: 10.25236/AJCIS.2023.060722.

Intelligent Campus Security Warning and Decision Making Based on Feature-Aware Recognition Technology

Author(s)

Nan Xu

Corresponding Author:
Nan Xu
Affiliation(s)

Xidian University, Xi’an, China

Abstract

By proposing a feature-Aware recognition method based on CBRW algorithm and IOT wireless sensing technology,this paper designs a kind of Wireless sensing recognition principle and campus intelligent security system architecture and applicate it in the campus video surveillance system, electronic fence system,traffic management system and information visualization system,which in turn provides intelligent assistance for rapid and accurate decision-making.

Keywords

feature-aware recognition; Internet of Things; intelligent security; early warning; decision making

Cite This Paper

Nan Xu. Intelligent Campus Security Warning and Decision Making Based on Feature-Aware Recognition Technology. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 7: 168-176. https://doi.org/10.25236/AJCIS.2023.060722.

References

[1] Milliner, M., Ma, M., Couperin, M., & Godless, P. (2016). Scheduling impact on the performance of relay-enhanced ATE-A networks. IEEE Transactions on Vehicular Technology, 65(4),pp. 2496–2508.

[2] Parsons, J. D. (1992). The Mobile Radio Propagation Channel. Bookend: Wiley.

[3] Dinlin,Liu.(2008). Analysis of the causes of barriers to information resource sharing based on information asymmetry Modern Intelligence,21(2):pp.36-39

[4] T. Pevný(2016). Loda: lightweight on-line detector of anomalies. Machine Learning, 102(2):pp.275-304.

[5] Lee, Ho sub. (2019). Modeling and Prediction of Privacy Decision-Making in IOT, University of California.

[6] N. Pianissimo, A. Cohen, R. Moskovitch, A. Shabbily, M. Edry, O. Bar-Ad, and Y. Elovici(2014). ALPD: active learning framework for enhancing the detection of malicious. pdf fifes. In JISIC,pp.91–98.

[7] K. Hoffman, S(2013). Whiteson, and M. d. Rijke. Balancing exploration and exploitation in listwise and pairwise online learning to rank for information retrieval. Inf. Retr., 16(1):pp.63-90.

[8] Chi, H., Prada, R. V., Kronur, E., & Steersmen, I. G. M. M. (2014). Fairness in wireless networks: Issues, measures and challenges. IEEE Communications Surveys Tutorials, 16(1), pp.5-24.

[9] A. Lazarevic and V. Kumar(2005). Feature bagging for outlier detection. In KDD, pp. 157–166.

[10] JAKHALE A R(2017).Design of anomaly packet detection framework by data mining algorithm for network flow[C]//International Conference on Computational Intelligence in Data Science, Chennai, pp.1-6

[11] WILLIAMS R,MCMAHON E,SAMTANI S,ET AL(2017).Identifying vulnerabilities of consumer Internet of things(IOT)devices: a scalable approach[C]//2017 IEEE International Conference on Intelligence and Security Informatics,pp.179-181.