Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book is a comprehensive guide for anyone in the aeronautical and aerospace fields who wants to understand and leverage the transformative power of artificial intelligence to enhance safety, optimize performance, and drive innovation.
The field of aeronautical and aerospace engineering is on the brink of a transformative revolution driven by rapid advancements in artificial intelligence (AI). This book analyzes AI's multifaceted impact on the industry, exploring AI's potential to address complex challenges, optimize processes, and push technological boundaries with a focus on enhancing safety, security, innovation, and performance. By blending technical insights with practical applications, it provides readers with a roadmap for harnessing AI to solve complex challenges and improve efficiency in aeronautics. Ideal for those seeking a deeper understanding of AI's role in aeronautical and aerospace engineering, this book offers real-world applications, case studies, and expert insights, making it a valuable resource for anyone aiming to stay at the forefront of this rapidly evolving field.
Readers will find this book:
Audience
Aeronautical and aerospace engineers, AI researchers, students, and industry professionals seeking to understand and apply AI solutions in areas like safety, security, and performance optimization.
K. Sathish Kumar, PhD is a professor in the Department of Aeronautical Engineering at the Nehru Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India with over 15 years of research and teaching experience. He has authored numerous articles in international journals and serves as a mentor to several start-ups, fostering innovation in aerospace. His research focuses on jet mixing characteristics, nozzle design, and supersonic flow control.
R. Naren Shankar, PhD is a professor in the Department of Aeronautical Engineering at Vel Tech Rangarajan Dr. Sagunthala Research and Development Institute of Science and Technology, India. He has published one book and 32 research articles, and has filed three patents. His research interests encompass high-speed jets, aerodynamics, propulsion, and unconventional energy engineering.
C. R. Bharathi1* and D. Mahammad Rafi2
1 Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Department of Electronics and Communications, Chennai, Tamil Nadu, India
2 Institute of Aeronautical Engineering (IARE), Dundigal, Hyderabad, India
The Internet of Things created an enormous need for microcontrollers and microprocessors, which anticipates the autonomous interaction of artificial intelligence in avionics while delivering a wide range of smart products. Most studies have focused on intrusion detection as the number of features available grows. The adoption of smart gadgets and the Internet has resulted in an increase in anonymous traffic. However, the lack of storage, computing, and network bandwidth in these IoT devices leaves them vulnerable to hacking and exploitation. Secure IoT development may need scalable security solutions of artificial intelligence in avionics that may help identify and counteract denial-of-service attacks in the model of network. Processing packet capture (PCAP) data files evaluate the DoS assaults using random forest data mining techniques and artificial intelligence techniques in avionics, which can then be used to detect the network threat severity level. This methodology may be used to prevent network assaults (by banning a certain SRC IP that is sending continuous packets to a specified DST IP).
Keywords: Internet of Things, wireless sensor networks, denial-of-service attack, flask
In the context of computer networking, the term "wireless sensor network" (WSN) refers to a structure consisting of linked sensors that examine their respective environments in a continuous and notably persistent way. It transfers their data to an individual node and to its base. The contribution of every node conspicuously in the network has a great involvement in manipulating and computing for transporting out their nominated tasks [4].
For classification and regression applications, the random forest technique and artificial intelligence techniques in avionics are most often utilized. Random forests are produced via decision trees. Making, using, and interpreting decisions with a decision tree are a cinch. It is possible to combine the ease of decision trees with the flexibility of random forests and artificial intelligence in avionics, resulting in a substantial boost in accuracy. As a method of intrusion detection and prevention, decision trees may use several information such as the source port and the destination port to determine whether an incoming packet is an attack or not (Packets A B) and bytes to the destination (Bytes A B), packets to the source (Packets B A) and bytes to the source (Bytes B A), etc.
The spontaneous flow of attack finding in random forest along with artificial intelligence in avionics is depicted in Figure 1.1. Since the random forest algorithm syndicate numerous trees to predict the dataset class, it is likely that the correct output will be predicted by some decision trees, while others might not. But all the trees estimate the right production together. Thus, two conventions for a better random forest classifier are given below. In order for the classifier to be able to predict exactly what will happen, the dataset should have a few genuine values in the included variable of the dataset. Each tree's projections must include a staggering number of correlations. There are a number of benefits to using the random forest method in wireless ad hoc networks' security. Compared to other algorithms, it takes less time to prepare. Additionally, it accurately estimates yield, even for a large dataset. In addition, it can maintain precision even while lacking a large amount of data.
Figure 1.1 Flow of attack finding in random forest along with artificial intelligence in avionics.
The security of Internet of Things devices might be a multi-faceted problem. Intact is only considered a post-production issue for IoT makers [1]. Given the restricted quantity of resources at hand to prepare, store, and transmit information, it is difficult to implement effective solutions for maintaining information privacy. To secure the least amount of security for information when it is in transit or at rest, you need also to demand security keys that are long enough. Instruments for protecting IoT devices from benefit flooding, or denial-of-service attacks, are absent from standard IoT communication, serving as messaging telemetry transport protocol (MQTT), which includes support for transport layer security (TLS), which protects information privacy as well as astuteness. Efforts to decrease the two faces of enormous information between centralized BSs/doors as well as small IoT sensors by effective in situ information processing are another viewpoint shift in edge computing.
To reduce the overall organization's data volume, an intermediate boundary layer facilitates communication between the central cloud as well as IoT sensors. However, the literature does not examine the adequacy of such a layer to protect against DoS attacks. Sensor hubs communicate data to centralized hubs, known as CHs, or in this case, the BS, which processes the information. At these centralized hubs, or BSs, the study of tactile information is essential to facilitate choice making. There are a few techniques in writing that may be used to classify information as it flows through an arrangement. Some of them may be summed up as follows.
The MLP and k-means clustering were suggested by Faraoun and Boukelif [2] as a half-breed method. The k-means calculation used by the professional-looking approach is employed to divide the input data into several clusters of a decided estimate (based on the number of assaults given within the KDD-99 dataset). Interest points for input information and clusters are identified, and as a result, the most intense segregating tests for each course are selected for the learning preparation. Client-toroot (U2R) and tests that are unreachable to clients are among the four categories of attacks presented to the MLP group for categorization (R2L).
Multilayer perceptrons (MLP) use a feed-forward structure to classify input and may be used as a computation for administered learning [2, 3]. The weights of the neural arrange interconnects between the hubs of various levels are adjusted to prepare MLP neural systems (input, yield, or covered up). During the planning phase, characterized capabilities such as gradient-based optimization computation are used to improve these organizational weights.
It was determined that the best collection of features to use in a cuttlefish optimization computation was used by Adel Sabry Eesa et al. (2014) [4]. As a means of generating options, a decision tree classifier was used. Exactness and discovery rate increase when the number of possibilities is reduced. This conclusion is based on experimental evidence. In an NSL-KDD dataset, S. Revathi et al. 2014 [5] provided a methodology for detecting denial-of-service (DoS) assaults by applying central component examination (CCE). Using an arbitrary forest classifier, the results showed an accuracy of roughly 99.9%. For the heterogeneous DDoS distinguishing proof framework, heuristic computing using particular esteem decay (SVD) was employed by Canister Jia et al. 2017 [6], who additionally orchestrated numerical relationships between one or two machine learning approaches and their strategy. The classifiers used Sacking, Arbitrary Woodland, and K-NN. The results of the test show that their TNR, accuracy, and exactness plan are unwavering.
When a DDoS ambush occurs, the victim's TCP blockage window is tampered with, and this information is used to quantify the effect of the attack on the organization. For detecting DDoS ambushes, Xiao et al. 2015 [8] used k-nearest neighbor's activity categorization along with relationship investigation and lattice-based strategy known as r-surveying. Estimationrelated information was pared down as a way to reduce data preparation overhead. When looking for DDoS ambushes based on unique trademark highlights that diverge from the norm, Saied et al. [9] used a counterfeit neural arrange (ANN) computation in 2016. In 2011, Jeanpierre Nziga [10]...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.