Abstract
In this study, an IT operation and maintenance data encryption transmission verification algorithm based on fuzzy clustering analysis is presented. The key information of IT operation and maintenance data encryption is constructed, the key rearrangement of IT operation and maintenance data is realized through key representation method, the vector quantitative coding design of IT operation and maintenance data is implemented using fuzzy clustering coding method, the coding protocol and encryption transmission verification protocol between IT operation and maintenance data are developed, and the ciphertext control during IT operation and maintenance data encryption is conducted based on fuzzy clustering analysis and quantum evolutionary coding method. The minimum anti attack ability of the method is 0.932, the method has good anti attack ability and high scrambling ability to verify the encryption transmission of it operation and maintenance data, and improves the encryption protection ability of it operation and maintenance data.
Similar content being viewed by others
References
Amirat Y, Münch A (2019) On the controllability of an advection-diffusion equation with respect to the diffusion parameter: Asymptotic analysis and numerical simulations. Acta Mathematicae Applicatae Sinica, English Serie 35(1):54–110
Ni XJ, Gole AM, Zhao CY et al (2018) An improved measure of AC system strength for performance analysis of multi-infeed HVdc systems including VSC and LCC converters. IEEE Trans Power Delivery 33(1):169–178
Wang WK, Wang YT (2019) The well-posedness of solution to semilinear pseudo-parabolic equation. Acta Mathematicae Applicatae Sinica, English Serie 35(2):386–400
Murphy K, Van Ginneken B, Schilham AM et al (2009) A large-scale evaluation of automatic pulmonary nodule detection in chest CT using local image features and k-nearest-neighbour classification. Med Image Anal 13(5):757–770
Lopez T, Fiorina E, Pennazio F et al (2015) Large scale validation of the M5L lung CAD on heterogeneous CT datasets. Med Phys 42(4):1477–1489
Li CF, Zhu GC, Wu XJ et al (2018) False-positive reduction on lung nodules detection in chest radiographs by ensemble of convolutional neural networks. IEEE Access 6(99):16060–16067
Han XQ, Wang F (2012) Research and implementation of show system of its operation and maintenance data. Computer Science 39(2):232–235
Xie HT, Yang DB, Sun NN et al (2019) Automated pulmonary nodule detection in CT images using deep convolutional neural networks. Pattern Recogn 85:109–119
Li W, Cao P, Zhao DZ, et al. Pulmonary nodule classification with deep convolutional neural networks on computed tomography images. Computational and Mathematical Methods in Medicine, 2016: 6215085.
Ding J, Li AX, Hu ZQ, et al. Accurate pulmonary nodule detection in computed tomography images using deep convolutional neural networks. In: Proceedings of the 2017 International Conference on Medical Computing and Computer-assisted Intervention. Berlin: Springer, 2017: 559–567.
Tao W J, Lu Y, Wei X, et al. Software implementation of precision clock synchronization based on PTPd2. Computer Engineering, 2019, 45(3): 47–53, 59.
Li CF, Chen QK (2019) GPU cluster power consumption collection and monitoring system based on sensor. Comput Eng 45(3):65–72
Pan CS, Jia YR, Cai RY et al (2019) Routing strategy for spatial information network based on MPLS. Comput Eng 45(3):85–90
Lee GM, Lee JH. On nonsmooth optimality theorems for robust multiobjective optimization problems. Journal of Nonlinear and Convex Analysis, 2015, 16(10): 2039–2052.
Sun XK, Peng ZY, Guo XL (2016) Some characterizations of robust optimal solutions for uncertain convex optimization problems. Optimization Letters 10(7):1463–1478
Yang Y, Zhong M, Yao H et al (2018) Internet of things for smart ports: Technologies and challenges. IEEE Instrum Meas Mag 21(1):34–43
Yang A, Li S, Ren C et al (2018) Situational awareness system in the smart campus. IEEE Access 6:63976–63986
Kim YK, Choi K, Kim J et al (2014) PIR-based data integrity verification method in sensor network. Journal of Central South University 21(10):3883–3888
Zhu Z, Gao X, Cao LL et al (2016) Research on the shift strategy of HMCVT based on the physical parameters and shift time. Appl Math Model 40(15):6889–6907
Sathiamoorthy J, Ramakrishnan B (2017) A reliable data transmission in EAACK MANETS using hybrid three-tier competent fuzzy cluster algorithm. Wireless Pers Commun 97(2):1–20
Lee K, Kim J, Park Y et al (2017) Latency of cellular-based V2X: Perspectives on TTI-proportional-latency and TTI-independent-latency. IEEE Access 4(99):1–2
Cao B, Fan S, Zhao J, et al. Quantum-enhanced multiobjective large-scale optimization via parallelism. Swarm Evol Comput, 2020, 57: 100697.
Cao B, Wang X, Zhang W et al (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Network 34(5):78–83
Abiodun AS, Anisi MH, Ali I et al (2017) Reducing power consumption in wireless body area networks: A novel data segregation and classification technique. IEEE Consumer Electronics Magazine 6(4):38–47
Aldahdooh A, Masala E, Janssens O et al (2018) Improved performance measures for video quality assessment algorithms using training and validation sets. IEEE Trans Multimedia 21(8):2026–2041
Xiong L, Zhang H, Li Y et al (2016) Improved stability and H∞ performance for neutral systems with uncertain Markovian jump. Nonlinear Anal Hybrid Syst 19:13–25
Zuo C, Li J, Sun J, et al. Transport of intensity equation: A tutorial. Opt Laser Eng, 2020: 106187.
Taylan O, Zytoon MA, Morfeq A et al (2017) Workplace assessment by fuzzy decision tree and topsis methodologies to manage the occupational safety and health performance. Journal of Intelligent and Fuzzy Systems 33(2):1209–1224
Gao W, Zhu L, Guo Y et al (2017) Ontology learning algorithm for similarity measuring and ontology mapping using linear programming. Journal of Intelligent & Fuzzy Systems 33(5):3153–3163
Ding KJ, Kishk AA (2018) 2-D butler matrix and phase-shifter group. IEEE Trans Microw Theory Tech 6(99):1–9
Yan SF, Ma B, Zheng CS, et al. Wear localization and identification under nonlinear condition monitoring data. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49(2): 359–365.
Marcelino LV, Pinto AL, Marques CA (2020) Scientific specialties in Green Chemistry. Iberoamerican Journal of Science Measurement and Communication 1(1):005
Cao B, Zhao J, Lv Z et al (2020) Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction. IEEE Trans Fuzzy Syst 28(5):939–952
Li W, Wu T, Wang W et al (2014) Broadband patterned magnetic microwave absorber. J Appl Phys 116(4):44110
Lv Z, Kumar N (2020) Software defined solutions for sensors in 6G/IoE. Comput Commun 153:42–47
Kovalnogov VN, Simos TE, Tsitouras C (2020) Ninth-Order, explicit, two-step methods for second-order inhomogeneous linear IVPs. Mathematical Methods in the Applied Sciences 43:4918–4926
Simos TE, Tsitouras C. Explicit, ninth order, two step methods for solving inhomogeneous linear problems x ‘‘(t) = lambda x(t) plus f(t). Applied Numerical Mathematics, 2020.
Do HT, Dang TD, Truong HVA et al (2017) Maximum power point tracking and output power control on pressure coupling wind energy conversion system. IEEE Trans Industr Electron 6(99):1–2
Mou B, Bai Y, Patel V. Post-local buckling failure of slender and over-design circular CFT columns with high-strength materials. Engineering Structures, 2020, 210: 110197.
Shi K, Tang Y, Liu X et al (2017) Secondary delay-partition approach on robust performance analysis for uncertain time-varying Lurie nonlinear control system. Optimal Control Applications and Methods 38(6):1208–1226
Chen G, Zhang WG, Wang LM (2017) Fuzzy-neural-network-based speed control method and experiment verification for electromagnetic direct drive robot driver. Chin Sci Bull 62(30):3514–3527
Zhang H, Qu S, Li H et al (2020) A moving shadow elimination method based on fusion of multi-feature. IEEE Access 8:63971–63982
Xu W, Qu S, Zhao L, et al. An improved adaptive sliding mode observer for a middle and high-speed rotors tracking. IEEE Transactions on Power Electronics, 2020, 1.
Medvedeva MA, Simos TE, Tsitouras C. Sixth-Order, P-Stable, Numerov-Type methods for use at moderate accuracies. Mathematical Methods in the Applied Sciences, 2021.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhao, C., Zhang, Y., Xue, Y. et al. Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis. Mobile Netw Appl 27, 1386–1396 (2022). https://doi.org/10.1007/s11036-022-01919-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-022-01919-5