Research Article

Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing

Figure 6

The structure diagram of the RBM network and the flow chart of the CD-based fast learning algorithm.