Research Article

Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing

Figure 10

Histogram of DBN-ELM accuracy optimized by the fuzzy integral method.