Synchronous capture method of multi-channel weak signal in long-distance communication network

被引:1
作者
Wang, Yuanyuan [1 ]
机构
[1] Huaibei Vocat & Tech Coll, Comp Dept, Huaibei 235000, Anhui, Peoples R China
关键词
Long distance communication network; multi channel weak signal; synchronous capture; parametric model; short time window function in time domain; INTRUSION DETECTION;
D O I
10.3233/JCM-226397
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In order to improve the accuracy, efficiency and network throughput of multi-channel weak signal synchronous acquisition in the network, a multi-channel weak signal synchronous acquisition method in remote communication network is designed. Firstly, by analyzing the multi-channel structure of remote communication network, the interference factors of multi-channel weak signal acquisition are determined. The parameter model method is used to estimate the bispectrum of weak signals, complete the multi-channel weak signal extraction of remote communication network, and preprocess the multi-channel weak signals of remote communication network by average filtering method. On this basis, the characteristics of multi-channel weak signals in the remote communication network are judged, and their characteristics are changed through the short time window function in the time domain, and the multi-channel weak signal synchronous catcher in the remote communication network is constructed to realize the synchronous acquisition of multi-channel weak signals in the remote communication network. The experimental results show that this method has high accuracy, short time-consuming and good network throughput. The acquisition accuracy of this method is always maintained at more than 90%.
引用
收藏
页码:2135 / 2148
页数:14
相关论文
共 18 条
[1]   Network intrusion detection using multi-architectural modular deep neural network [J].
Atefinia, Ramin ;
Ahmadi, Mahmood .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (04) :3571-3593
[2]   Unsupervised learning approach for network intrusion detection system using autoencoders [J].
Choi, Hyunseung ;
Kim, Mintae ;
Lee, Gyubok ;
Kim, Wooju .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (09) :5597-5621
[3]   A Formal Security Analysis of the Signal Messaging Protocol [J].
Cohn-Gordon, Katriel ;
Cremers, Cas ;
Dowling, Benjamin ;
Garratt, Luke ;
Stebila, Douglas .
JOURNAL OF CRYPTOLOGY, 2020, 33 (04) :1914-1983
[4]  
Graves CE, 2019, IEEE T NANOTECHNOL, V15, P1
[5]  
Guo F., 2021, Laser J., V42, P98
[6]   A hybrid deep learning model for efficient intrusion detection in big data environment [J].
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Alsanad, Ahmed ;
Alrubaian, Majed ;
Fortino, Giancarlo .
INFORMATION SCIENCES, 2020, 513 :386-396
[7]  
Holm J, 2021, IEEE COMMUN LETT, V33, P141
[8]  
Imran M, 2021, COMPUT ELECTR ENG, V14, P65
[9]  
Lee H, 2021, IEEE COMMUN LETT, V79, P264
[10]  
[马莉莉 Ma Lili], 2020, [应用光学, Journal of Applied Optics], V41, P1305