Design of network security processing system in 5G/6gNG-DSS of intelligent model computer

Author:

Wei Bo1,Chen Huanying1,Huang Zhaoji2

Affiliation:

1. School of Computer Technol, Henan Quality Polytechnic, Pingdingshan, Henan, China

2. School of Software, Henan University, Kaifeng, Henan, China

Abstract

In order to solve the problem of low accuracy of evaluation results caused by the impact of throughput and transmission delay on traditional systems in 6G networks, this paper proposes a design method of network security processing system in 5G/6gNG-DSS of intelligent model computer. Supported by the principle of active defense, this paper designs a server-side structure, using ScanHome SH-800/400 embedded scanning module barcode QR code scanning device as the scanning engine. We put an evaluation device on the RISC chip PA-RISC microprocessor. Once the system fails, it will send an early warning signal. Through setting control, data, and cooperation interfaces, it can support the information exchange between subsystems. The higher pulse width modulator TL494:4 pin is used to design the power source. We use the top-down data management method to design the system software flow, build a mathematical model, introduce network entropy to weigh the benefits, and realize the system security evaluation. The experimental results show that the highest evaluation accuracy of the system can reach 98%, which can ensure user information security. Conclusion: The problem of active defense network security is transformed into a dynamic analysis problem, which provides an effective decision-making scheme for managers. The system evaluation based on Packet Tracer software has high accuracy and provides important decisions for network security analysis.

Publisher

IOS Press

Subject

Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction,Software

Reference21 articles.

1. Cloud service for protecting computer networks of enterprises using intelligent hardware and software devices based on raspberry pi microcomputers;Ospanova;Acta Polytechnica Hungarica,2022

2. Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (idsgt-dnn);Balamurugan;Pattern Recognition Letters,2022

3. Study on intelligent analysis and processing technology of computer big data based on clustering algorithm;Liu;Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering),2023

4. Intelligent model for brain tumor identification using deep learning;Khan;Applied Computational Intelligence and Soft Computing,2022

5. Intelligent manufacturing execution systems: A systematic review;Shojaeinasab;Journal of Manufacturing Systems,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3