Academic Journal of Computing & Information Science, 2023, 6(7); doi: 10.25236/AJCIS.2023.060722.
Nan Xu
Xidian University, Xi’an, China
By proposing a feature-Aware recognition method based on CBRW algorithm and IOT wireless sensing technology,this paper designs a kind of Wireless sensing recognition principle and campus intelligent security system architecture and applicate it in the campus video surveillance system, electronic fence system,traffic management system and information visualization system,which in turn provides intelligent assistance for rapid and accurate decision-making.
feature-aware recognition; Internet of Things; intelligent security; early warning; decision making
Nan Xu. Intelligent Campus Security Warning and Decision Making Based on Feature-Aware Recognition Technology. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 7: 168-176. https://doi.org/10.25236/AJCIS.2023.060722.
[1] Milliner, M., Ma, M., Couperin, M., & Godless, P. (2016). Scheduling impact on the performance of relay-enhanced ATE-A networks. IEEE Transactions on Vehicular Technology, 65(4),pp. 2496–2508.
[2] Parsons, J. D. (1992). The Mobile Radio Propagation Channel. Bookend: Wiley.
[3] Dinlin,Liu.(2008). Analysis of the causes of barriers to information resource sharing based on information asymmetry Modern Intelligence,21(2):pp.36-39
[4] T. Pevný(2016). Loda: lightweight on-line detector of anomalies. Machine Learning, 102(2):pp.275-304.
[5] Lee, Ho sub. (2019). Modeling and Prediction of Privacy Decision-Making in IOT, University of California.
[6] N. Pianissimo, A. Cohen, R. Moskovitch, A. Shabbily, M. Edry, O. Bar-Ad, and Y. Elovici(2014). ALPD: active learning framework for enhancing the detection of malicious. pdf fifes. In JISIC,pp.91–98.
[7] K. Hoffman, S(2013). Whiteson, and M. d. Rijke. Balancing exploration and exploitation in listwise and pairwise online learning to rank for information retrieval. Inf. Retr., 16(1):pp.63-90.
[8] Chi, H., Prada, R. V., Kronur, E., & Steersmen, I. G. M. M. (2014). Fairness in wireless networks: Issues, measures and challenges. IEEE Communications Surveys Tutorials, 16(1), pp.5-24.
[9] A. Lazarevic and V. Kumar(2005). Feature bagging for outlier detection. In KDD, pp. 157–166.
[10] JAKHALE A R(2017).Design of anomaly packet detection framework by data mining algorithm for network flow[C]//International Conference on Computational Intelligence in Data Science, Chennai, pp.1-6
[11] WILLIAMS R,MCMAHON E,SAMTANI S,ET AL(2017).Identifying vulnerabilities of consumer Internet of things(IOT)devices: a scalable approach[C]//2017 IEEE International Conference on Intelligence and Security Informatics,pp.179-181.