ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (4,027)
  • Maps
  • Sage Publications  (4,027)
  • Electrical Engineering, Measurement and Control Technology  (4,027)
Collection
Years
Journal
  • 1
    Publication Date: 2020-08-01
    Description: Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). This project aims to develop the concept of “communicating concretes,” which are concrete elements embedding wireless sensor networks, for applications dedicated to Structure Health Monitoring in the construction industry. Due to applicative constraints, the topology of the wireless sensor network follows a chain-based structure. Node batteries cannot be replaced or easily recharged, it is crucial to evaluate the energy consumed by each node during the monitoring process. This area has been extensively studied leading to different energy models to evaluate energy consumption for chain-based structures. However, no simple, practical, and analytical network energy models have yet been proposed. Energy evaluation models of periodic data collection for chain-based structures are proposed. These models are compared and evaluated with an Arduino XBee–based platform. Experimental results show the mean prediction error of our models is 5%. Realizing aggregation at nodes significantly reduces energy consumption and avoids hot-spot problem with homogeneous consumptions along the chain. Models give an approximate lifetime of the wireless sensor network and communicating concretes services. They can also be used online by nodes for a self-assessment of their energy consumptions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2020-07-01
    Description: As concrete is a building material that is widely used in the field of infrastructure construction, and its quality is related to the quality and service life in infrastructure engineering, concrete strength is an important reference index that reflects the concrete quality. Based on this, two commercial concretes A and B are selected in Henan Province, China, to perform the concrete strength test under same condition curing and standard condition curing in the pull-out post-insert method, cubic compression, rebound method, and drilling core method. The relationships between the different curing conditions, cubic compressive strength, core sample strength, rebound strength, and pull-out force of different commercial concretes are compared and analyzed. Through a comparative analysis and while considering the convenience and accuracy requirements, the strength curves of the two different concretes based on the pull-out post-insert method were fitted and analyzed, and the local strength curve test in Henan based on the pull-out post-insert method was established. The research results provide technical support for evaluating the strength of concrete structures using the pull-out post-insert method, which has important engineering significance for improving the popularize and application of the pull-out post-insert method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2020-07-01
    Description: This correspondence proposes a jointly-designed quasi-cyclic (QC) low-density parity-check (LDPC)-coded multi-relay cooperation with a destination node realized by multiple receive antennas. First, a deterministic approach is utilized to construct different classes of binary QC-LDPC codes with no length-4 cycles. Existing methods put some limitations in terms of code length and rate in order to provide high error-correction performance. Therefore, this article gives three classes of QC-LDPC codes based on a combinatoric design approach, known as cyclic difference packing (CDP), with flexibility in terms of code-length and rate selection. Second, the proposed CDP-based construction is utilized to jointly-design QC-LDPC codes for coded-relay cooperation. At the receiver, the destination node is realized by multiple receive antennas, where maximal-ratio combining (MRC) and sum-product algorithm (SPA)-based joint iterative decoding are utilized to decode the corrupted sequences coming from the source and relay nodes. Simulation results show that the proposed QC-LDPC coded-relay cooperations outperform their counterparts with a coding gain of about 0.25 dB at bit-error rate (BER) [Formula: see text] over a Rayleigh fading channel in the presence of additive white Gaussian noise. Furthermore, the extrinsic-information transfer (EXIT) chart analysis has been used to detect the convergence threshold of proposed jointly-designed QC-LDPC codes. Numerical analysis shows that the proposed jointly-designed QC-LDPC codes provide a better convergence as compared to their counterparts under the same conditions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2020-07-01
    Description: Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers or central authorities, for example, roadside units and reputation management centers to ensure message reliability and build nodes’ reputation. Also, none of the proposed schemes operate in different environments, for example, urban and rural. To overcome these limitations, we propose a novel trust management scheme for self-organized vehicular ad-hoc networks. The scheme is based on a crediting technique and does not rely on other peers or central authorities which distinguishes it as an economical solution. Moreover, it is hybrid, in the sense it is data-based and entity-based which makes it capable of revoking malicious nodes and discarding fake messages. Furthermore, it operates in a dual-mode (urban and rural). The simulation has been performed utilizing Veins, an open-source framework along with OMNeT++, a network simulator, and SUMO, a traffic simulator. The scheme has been tested with two trust models (urban and rural). The simulation results prove the performance and security efficacy of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2020-07-01
    Description: In underwater wireless sensor networks, sensor position information has important value in network protocols and collaborative detection. However, many challenges were introduced in positioning sensor nodes due to the complexity of the underwater environment. Aiming at the problem of the stratification effect of underwater acoustic waves, the long propagation delay of messages, as well as the mobility of sensor nodes, a mobile target localization scheme for underwater wireless sensor network is proposed based on iterative tracing. Four modules are established in the mobile target localization based on iterative tracing: the data collection and rough position estimation, the estimation and compensation of propagation delay, the node localization, and the iteration. The deviation of distance estimation due to the assumption that acoustic waves propagate along straight lines in an underwater environment is compensated by the mobile target localization based on iterative tracing, and weighted least squares estimation method is used to perform linear regression. Moreover, an interacting multiple model algorithm is put forward to reduce the positioning error caused by the mobility of sensor nodes, and the two services of node time synchronization and localization assist each other during the iteration to improve the accuracy of both parties. The simulation results show that the proposed scheme can achieve higher localization accuracy than the similar schemes, and the positioning errors caused by the above three problems can be reduced effectively.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2020-08-01
    Description: In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. In this article, a novel resource management method, consisting of power and channel allocation, is proposed to solve this problem. An optimization model to maximum the system throughput and spectrum efficiency of the system, which is constrained by Signal to Interference plus Noise Ratio requirements of all users in diverse layers, is established. To solve the non-convex mixed integer nonlinear optimization problem, the optimization model is decomposed into two sub-problems, which are all solvable quasi-convex power allocation and non-convex channel allocation. The first step is to solve a power allocation problem based on solid geometric programming with the vertex search method. Then, a channel allocation constructed by three-dimensional hypergraph matching is established, and the best result of this problem is obtained by a heuristic greed algorithm based on the bipartite conflict graph and µ-claw search. Finally, the simulation results show that the proposed scheme improves the throughput performance at least 6% over other algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2020-04-01
    Description: To improve the accuracy and generalization of tunnel personnel positioning systems, this article proposes a quadratic weighted centroid algorithm. By adopting a Gaussian filter model to improve the range accuracy of the received signal strength indicator algorithm and combining the centroid algorithm and weighting factor with a trilateration positioning model, a quadratic weighted centroid algorithm is proposed to improve the positioning accuracy of unknown positioning nodes. The key ideas behind the quadratic weighted centroid algorithm include an optimization of the received signal strength indicator range value scheme, a centroid algorithm based on trilateral measurement positioning, and a weighting factor to improve the positioning accuracy of the trilateral centroid positioning algorithm. Compared with the centroid algorithm, the Min-Max multilateration algorithm, and the weighted centroid based on distance algorithm, the simulation results showed that (1) the positioning performance of the quadratic weighted centroid algorithm was superior to the other three algorithms; (2) when the reference nodes were symmetrically arranged, the positioning accuracy was higher than a fold line layout; and (3) when the lateral reference node spacing was extended from 20 to 30 m, the average positioning error met positioning accuracy requirements, which could reduce overall system costs.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2020-04-01
    Description: Tensor compression algorithms play an important role in the processing of multidimensional signals. In previous work, tensor data structures are usually destroyed by vectorization operations, resulting in information loss and new noise. To this end, this article proposes a tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction, which mainly includes three parts: tensor dictionary representation, dictionary preprocessing, and dictionary update. Specifically, the tensor is respectively performed by the sparse representation and Tucker decomposition, from which one can obtain the dictionary, sparse coefficient, and core tensor. Furthermore, the sparse representation can be obtained through the relationship between sparse coefficient and core tensor. In addition, the dimensionality of the input tensor is reduced by using the concentrated dictionary learning. Finally, some experiments show that, compared with other algorithms, the proposed algorithm has obvious advantages in preserving the original data information and denoising ability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2020-04-01
    Description: With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communication, are information security and information jamming. Carefully considering the given challenges, this study uses a new advanced anti-jamming approach, a modulation technique based on the frequency-hopping spread spectrum, which has notably high resistance accounted against various potential jammers. The objective of this study is two-fold. First, the physical channel properties are considered, and the random bits are transmitted, employing a cryptographic secured hoping-spread pattern, having a set of carrier frequencies, known at both sides of the transmission. Second, the hashing code is computed only for the key, and transmitted along the original hopset, but with distinct frequencies set. The deployed practical anti-jamming approach, therefore, computed a high efficiency to examine the information secrecy well and primarily the connection availability even in the presence of the jammers. Moreover, this study considered and modeled a communication system and evaluated the proposed system’s performance, applying the theories of Shannon’s entropy and Wyner’s entropy (i.e. Wyner’s wiretap channel), to anticipate the system’s perfect secrecy, even in the worst case when jammer has unlimited computational capabilities.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2020-05-01
    Description: Histogram shifting is an effective manner to achieve reversible watermarking, which works by shifting pixels between the peak point and its nearest zero point in histogram to make room for watermark embedding. However, once zero point is absent, the algorithm suffers from overflowing problem. Even though some works attempt to deal with this risk by introducing auxiliary information, such as a location map, they occupy a lot of embedding capacity inevitably. In this article, in order to deal with overflowing problem efficiently, we propose a border following–based reversible watermarking algorithm for images. With the help of border following algorithm and pre-processing, available regions with at least one zero point are recognized to embed watermark so that auxiliary information is not needed any more. And the algorithm utilized also ensures the same border can be re-recognized from the watermarked image without error, thus the correctness is also guaranteed. The performance of the proposed algorithm is evaluated using classic image datasets in this area, and the results not only validate the effectiveness of the proposed algorithm but also indicate its advantages compared with the classic histogram shifting–based reversible watermarking algorithm as well as the state of the art.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...