ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Artikel  (210)
  • 2020-2022  (210)
  • 2010-2014
  • 1980-1984
  • 1975-1979
  • 1950-1954
  • 2020  (210)
  • 163708
  • Elektrotechnik, Elektronik, Nachrichtentechnik  (210)
  • Werkstoffwissenschaften, Fertigungsverfahren, Fertigung
  • 1
    Publikationsdatum: 2020-08-01
    Beschreibung: Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). This project aims to develop the concept of “communicating concretes,” which are concrete elements embedding wireless sensor networks, for applications dedicated to Structure Health Monitoring in the construction industry. Due to applicative constraints, the topology of the wireless sensor network follows a chain-based structure. Node batteries cannot be replaced or easily recharged, it is crucial to evaluate the energy consumed by each node during the monitoring process. This area has been extensively studied leading to different energy models to evaluate energy consumption for chain-based structures. However, no simple, practical, and analytical network energy models have yet been proposed. Energy evaluation models of periodic data collection for chain-based structures are proposed. These models are compared and evaluated with an Arduino XBee–based platform. Experimental results show the mean prediction error of our models is 5%. Realizing aggregation at nodes significantly reduces energy consumption and avoids hot-spot problem with homogeneous consumptions along the chain. Models give an approximate lifetime of the wireless sensor network and communicating concretes services. They can also be used online by nodes for a self-assessment of their energy consumptions.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Publikationsdatum: 2020-07-01
    Beschreibung: As concrete is a building material that is widely used in the field of infrastructure construction, and its quality is related to the quality and service life in infrastructure engineering, concrete strength is an important reference index that reflects the concrete quality. Based on this, two commercial concretes A and B are selected in Henan Province, China, to perform the concrete strength test under same condition curing and standard condition curing in the pull-out post-insert method, cubic compression, rebound method, and drilling core method. The relationships between the different curing conditions, cubic compressive strength, core sample strength, rebound strength, and pull-out force of different commercial concretes are compared and analyzed. Through a comparative analysis and while considering the convenience and accuracy requirements, the strength curves of the two different concretes based on the pull-out post-insert method were fitted and analyzed, and the local strength curve test in Henan based on the pull-out post-insert method was established. The research results provide technical support for evaluating the strength of concrete structures using the pull-out post-insert method, which has important engineering significance for improving the popularize and application of the pull-out post-insert method.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Publikationsdatum: 2020-07-01
    Beschreibung: This correspondence proposes a jointly-designed quasi-cyclic (QC) low-density parity-check (LDPC)-coded multi-relay cooperation with a destination node realized by multiple receive antennas. First, a deterministic approach is utilized to construct different classes of binary QC-LDPC codes with no length-4 cycles. Existing methods put some limitations in terms of code length and rate in order to provide high error-correction performance. Therefore, this article gives three classes of QC-LDPC codes based on a combinatoric design approach, known as cyclic difference packing (CDP), with flexibility in terms of code-length and rate selection. Second, the proposed CDP-based construction is utilized to jointly-design QC-LDPC codes for coded-relay cooperation. At the receiver, the destination node is realized by multiple receive antennas, where maximal-ratio combining (MRC) and sum-product algorithm (SPA)-based joint iterative decoding are utilized to decode the corrupted sequences coming from the source and relay nodes. Simulation results show that the proposed QC-LDPC coded-relay cooperations outperform their counterparts with a coding gain of about 0.25 dB at bit-error rate (BER) [Formula: see text] over a Rayleigh fading channel in the presence of additive white Gaussian noise. Furthermore, the extrinsic-information transfer (EXIT) chart analysis has been used to detect the convergence threshold of proposed jointly-designed QC-LDPC codes. Numerical analysis shows that the proposed jointly-designed QC-LDPC codes provide a better convergence as compared to their counterparts under the same conditions.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Publikationsdatum: 2020-07-01
    Beschreibung: Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers or central authorities, for example, roadside units and reputation management centers to ensure message reliability and build nodes’ reputation. Also, none of the proposed schemes operate in different environments, for example, urban and rural. To overcome these limitations, we propose a novel trust management scheme for self-organized vehicular ad-hoc networks. The scheme is based on a crediting technique and does not rely on other peers or central authorities which distinguishes it as an economical solution. Moreover, it is hybrid, in the sense it is data-based and entity-based which makes it capable of revoking malicious nodes and discarding fake messages. Furthermore, it operates in a dual-mode (urban and rural). The simulation has been performed utilizing Veins, an open-source framework along with OMNeT++, a network simulator, and SUMO, a traffic simulator. The scheme has been tested with two trust models (urban and rural). The simulation results prove the performance and security efficacy of the proposed scheme.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Publikationsdatum: 2020-07-01
    Beschreibung: In underwater wireless sensor networks, sensor position information has important value in network protocols and collaborative detection. However, many challenges were introduced in positioning sensor nodes due to the complexity of the underwater environment. Aiming at the problem of the stratification effect of underwater acoustic waves, the long propagation delay of messages, as well as the mobility of sensor nodes, a mobile target localization scheme for underwater wireless sensor network is proposed based on iterative tracing. Four modules are established in the mobile target localization based on iterative tracing: the data collection and rough position estimation, the estimation and compensation of propagation delay, the node localization, and the iteration. The deviation of distance estimation due to the assumption that acoustic waves propagate along straight lines in an underwater environment is compensated by the mobile target localization based on iterative tracing, and weighted least squares estimation method is used to perform linear regression. Moreover, an interacting multiple model algorithm is put forward to reduce the positioning error caused by the mobility of sensor nodes, and the two services of node time synchronization and localization assist each other during the iteration to improve the accuracy of both parties. The simulation results show that the proposed scheme can achieve higher localization accuracy than the similar schemes, and the positioning errors caused by the above three problems can be reduced effectively.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Publikationsdatum: 2020-08-01
    Beschreibung: In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. In this article, a novel resource management method, consisting of power and channel allocation, is proposed to solve this problem. An optimization model to maximum the system throughput and spectrum efficiency of the system, which is constrained by Signal to Interference plus Noise Ratio requirements of all users in diverse layers, is established. To solve the non-convex mixed integer nonlinear optimization problem, the optimization model is decomposed into two sub-problems, which are all solvable quasi-convex power allocation and non-convex channel allocation. The first step is to solve a power allocation problem based on solid geometric programming with the vertex search method. Then, a channel allocation constructed by three-dimensional hypergraph matching is established, and the best result of this problem is obtained by a heuristic greed algorithm based on the bipartite conflict graph and µ-claw search. Finally, the simulation results show that the proposed scheme improves the throughput performance at least 6% over other algorithms.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Publikationsdatum: 2020-04-01
    Beschreibung: To improve the accuracy and generalization of tunnel personnel positioning systems, this article proposes a quadratic weighted centroid algorithm. By adopting a Gaussian filter model to improve the range accuracy of the received signal strength indicator algorithm and combining the centroid algorithm and weighting factor with a trilateration positioning model, a quadratic weighted centroid algorithm is proposed to improve the positioning accuracy of unknown positioning nodes. The key ideas behind the quadratic weighted centroid algorithm include an optimization of the received signal strength indicator range value scheme, a centroid algorithm based on trilateral measurement positioning, and a weighting factor to improve the positioning accuracy of the trilateral centroid positioning algorithm. Compared with the centroid algorithm, the Min-Max multilateration algorithm, and the weighted centroid based on distance algorithm, the simulation results showed that (1) the positioning performance of the quadratic weighted centroid algorithm was superior to the other three algorithms; (2) when the reference nodes were symmetrically arranged, the positioning accuracy was higher than a fold line layout; and (3) when the lateral reference node spacing was extended from 20 to 30 m, the average positioning error met positioning accuracy requirements, which could reduce overall system costs.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Publikationsdatum: 2020-04-01
    Beschreibung: Tensor compression algorithms play an important role in the processing of multidimensional signals. In previous work, tensor data structures are usually destroyed by vectorization operations, resulting in information loss and new noise. To this end, this article proposes a tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction, which mainly includes three parts: tensor dictionary representation, dictionary preprocessing, and dictionary update. Specifically, the tensor is respectively performed by the sparse representation and Tucker decomposition, from which one can obtain the dictionary, sparse coefficient, and core tensor. Furthermore, the sparse representation can be obtained through the relationship between sparse coefficient and core tensor. In addition, the dimensionality of the input tensor is reduced by using the concentrated dictionary learning. Finally, some experiments show that, compared with other algorithms, the proposed algorithm has obvious advantages in preserving the original data information and denoising ability.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Publikationsdatum: 2020-04-01
    Beschreibung: With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communication, are information security and information jamming. Carefully considering the given challenges, this study uses a new advanced anti-jamming approach, a modulation technique based on the frequency-hopping spread spectrum, which has notably high resistance accounted against various potential jammers. The objective of this study is two-fold. First, the physical channel properties are considered, and the random bits are transmitted, employing a cryptographic secured hoping-spread pattern, having a set of carrier frequencies, known at both sides of the transmission. Second, the hashing code is computed only for the key, and transmitted along the original hopset, but with distinct frequencies set. The deployed practical anti-jamming approach, therefore, computed a high efficiency to examine the information secrecy well and primarily the connection availability even in the presence of the jammers. Moreover, this study considered and modeled a communication system and evaluated the proposed system’s performance, applying the theories of Shannon’s entropy and Wyner’s entropy (i.e. Wyner’s wiretap channel), to anticipate the system’s perfect secrecy, even in the worst case when jammer has unlimited computational capabilities.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Publikationsdatum: 2020-05-01
    Beschreibung: Histogram shifting is an effective manner to achieve reversible watermarking, which works by shifting pixels between the peak point and its nearest zero point in histogram to make room for watermark embedding. However, once zero point is absent, the algorithm suffers from overflowing problem. Even though some works attempt to deal with this risk by introducing auxiliary information, such as a location map, they occupy a lot of embedding capacity inevitably. In this article, in order to deal with overflowing problem efficiently, we propose a border following–based reversible watermarking algorithm for images. With the help of border following algorithm and pre-processing, available regions with at least one zero point are recognized to embed watermark so that auxiliary information is not needed any more. And the algorithm utilized also ensures the same border can be re-recognized from the watermarked image without error, thus the correctness is also guaranteed. The performance of the proposed algorithm is evaluated using classic image datasets in this area, and the results not only validate the effectiveness of the proposed algorithm but also indicate its advantages compared with the classic histogram shifting–based reversible watermarking algorithm as well as the state of the art.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Publikationsdatum: 2020-05-01
    Beschreibung: The architecture model of the Internet of thing system is the primary foundation for the design and implementation of the Internet of thing system. This article discusses the method and practice of time automaton modeling and model checking for the architecture of the Internet of thing system from the state and time dimensions. This article introduces the theory and method of modeling using time automata. And then, combined with the actual need of the elderly health cabin Internet of thing system, a dynamic and fault-tolerant time automaton model is established through a relatively complete architecture modeling. The model checking method verifies that the designed Internet of thing system has no deadlock system activity, service correctness, and timeliness correctness. The results of modeling experiments and model validation show that the reference model of time automata Internet of thing architecture established in this article can better reflect the nature of interaction with the physical world, heterogeneity and large-scale, dynamic, and incompleteness of the Internet of thing system.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Publikationsdatum: 2020-05-01
    Beschreibung: It is a potential threat to persons and companies to reveal private or company-sensitive data through the Internet of Things by the color image steganography. The existing rich model features for color image steganalysis fail to utilize the fact that the content-adaptive steganography changes the pixels in complex textured regions with higher possibility. Therefore, this article proposes a variant of spatial rich model feature based on the embedding change probabilities in differential channels. The proposed feature is extracted from the residuals in the differential channels to reduce the image content information and enhance the stego signals significantly. Then, the embedding change probability of each element in the differential channels is added to the corresponding co-occurrence matrix bin to emphasize the interference of the residuals in textured regions to the improved co-occurrence matrix feature. The experimental results show that the proposed feature can significantly improve the detection performances for the WOW and S-UNIWARD steganography, especially when the payload size is small. For example, when the payload size is 0.05 bpp, the detection errors can be reduced respectively by 5.20% and 4.90% for WOW and S-UNIWARD by concatenating the proposed feature to the color rich model feature CRMQ1.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Publikationsdatum: 2020-05-01
    Beschreibung: Aimed at the problem of the boundary defense easily being out of availability caused by the static network structure, a novel dynamic enterprise network defense system based on holographic transformation is designed and implemented. To increase the uncertainty of network structure and the position of target nodes, the network view is dynamically changed by constantly transforming endpoint information. Virtual endpoint mutation and hopping period selection are achieved by the hopping address generation module. It takes the advantages of anti-collision and good randomicity of the Chinese national SM3 hash algorithm. The full-cycle hopping period is managed and controlled by the hopping period management mechanism based on the ciphertext policy attribute-based broadcast holographic transformation. Experiments show that the system achieves expected security goals and has good interactivity and high stability.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Publikationsdatum: 2020-05-01
    Beschreibung: This article aims to provide an efficient fault diagnosis method for gearbox. A self-organizing map–based fault model is developed to provide effective diagnosis of the faults of gearboxes using the gear signals extracted from gearboxes operating with zero and three different types of faults. The gear signals are collected by vibration and acoustic sensors, and pre-denoised using wavelet denoising and wavelet packet decomposition. The characteristic values are subsequently obtained using fast Fourier transform and infinite impulse response filtering. The results showed of the self-organizing map neural network diagnosis model can effectively diagnose gear fault information with a 95% diagnostic accuracy using four input characteristic values: (1) Y-axis vibration displacement amplitude, (2) Y-axis vibration acceleration amplitude, (3) acoustic emission energy amplitude, and (4) acoustic emission signal peak value. The proposed approach provides a novel method to more accurate diagnosis of gear fault pattern and improvement of working efficiency of mechanical instruments.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Publikationsdatum: 2020-05-01
    Beschreibung: Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Publikationsdatum: 2020-05-01
    Beschreibung: The growing interest in precision livestock farming is prompted by a desire to understand the basic behavioural needs of the animals and optimize the contribution of each animal. The aim of this study was to develop a system that automatically generated individual animal behaviour and localization data in sheep. A sensor-fusion-system tracking individual sheep position and detecting sheep standing/lying behaviour was proposed. The mean error and standard deviation of sheep position performed by the ultra-wideband location system was 0.357 ± 0.254 m, and the sensitivity of the sheep standing and lying detection performed by infrared radiation cameras and three-dimenional computer vision technology were 98.16% and 100%, respectively. The proposed system was able to generate individual animal activity reports and the real-time detection was achieved. The system can increase the convenience for animal behaviour studies and monitoring of animal welfare in the production environment.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Publikationsdatum: 2020-05-01
    Beschreibung: In the era of 5G mobile communication, radio environment maps are increasingly viewed as a powerful weapon for the optimization of spectrum resources, especially in the field of autonomous vehicles. However, due to the constraint of limited resources when it comes to sensor networks, it is crucial to select a suitable scale of sensor measurements for radio environment map construction. This article proposes an adaptive ordinary Kriging algorithm based on affinity propagation clustering as a novel spatial interpolation method for the construction of the radio environment map, which can provide precise awareness of signal strength at locations where no measurements are available. Initially, a semivariogram is obtained from all the sensor measurements. Then, in order to select the minimum scale of measurements and at the same time guarantee accuracy, the affinity propagation clustering is introduced in the selection of sensors. Moreover, the sensor estimation groups are created based on the clustering result, and estimation results are obtained by ordinary Kriging. In the end, the simulation of the proposed algorithm is analyzed through comparisons with three conventional algorithms: inverse distance weighting, nearest neighbor, and ordinary Kriging. As a result, the conclusion can be drawn that the proposed algorithm is superior to others in accuracy as well as in efficiency.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Publikationsdatum: 2020-05-01
    Beschreibung: With the wide application of Internet of things technology and era of large data in agriculture, smart agricultural design based on Internet of things technology can efficiently realize the function of real-time data communication and information processing and improve the development of smart agriculture. In the process of analyzing and processing a large amount of planting and environmental data, how to extract effective information from these massive agricultural data, that is, how to analyze and mine the needs of these large amounts of data, is a pressing problem to be solved. According to the needs of agricultural owners, this article studies and optimizes the data storage, data processing, and data mining of large data generated in the agricultural production process, and it uses the k-means algorithm based on the maximum distance to study the data mining. The crop growth curve is simulated and compared with improved K-means algorithm and the original k-means algorithm in the experimental analysis. The experimental results show that the improved K-means clustering method has an average reduction of 0.23 s in total time and an average increase of 7.67% in the F metric value. The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Publikationsdatum: 2020-05-01
    Beschreibung: The availability of massive amount of dam safety monitoring data can make it difficult to analyze and characterize dam behavior. This article describes the use of the Cloud model to transform quantitative monitoring data into qualitative information. Each monitoring point returning dam safety data is regarded as a cloud drop, and parameters such as the expectation, entropy, and hyper-entropy of the monitoring data are obtained through a backward cloud generator to represent the operational state of the dam. The monitoring points are then treated as vectors, and the cloud similarity is calculated using the cosine value of the angle between them. The cloud similarity coefficient is then determined to characterize the similarity of dam behavior. Experimental analysis shows that the process of identifying cloud parameters has a good effect on the discovery of abnormal monitoring values regarding dam safety and demonstrates the feasibility of characterizing the dam behavior. Clustering analysis is applied to the similarity coefficients to further achieve the hierarchical management of dam monitoring points.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Publikationsdatum: 2020-05-01
    Beschreibung: This article focuses on the evaluation of geometric dilution of precision for three-dimensional angle-of-arrival target localization in wireless sensor networks. We calculate a general analytical expression for the geometric dilution of precision for three-dimensional angle-of-arrival target localization. Unlike the existing works in the literature, in this article, no assumptions are made regarding the observation ranges, noise variances, or the number of sensors in the derivation of the geometric dilution of precision. Necessary and sufficient conditions regarding the existence of geometric dilution of precision are also derived, which can be readily used to evaluate the observability of three-dimensional angle-of-arrival target localization in wireless sensor networks. Moreover, a concise procedure is also presented to calculate the geometric dilution of precision when it exists. Finally, several examples are used to illustrate our results, and it is shown that the performance of the proposed regular deployment configurations of angle-of-arrival sensors is better than the one with random deployment patterns.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Publikationsdatum: 2020-05-01
    Beschreibung: Power load forecasting is an important guarantee of safe, stable, and economic operation of power systems. It is appropriate to use interval data to represent fuzzy information in power load forecasting. The dual possibilistic regression models approximate the observed interval data from the outside and inside directions, respectively, which can estimate the inherent uncertainty existing in the given fuzzy phenomenon well. In this article, efficient dual possibilistic regression models of support vector machines based on solving a group of quadratic programming problems are proposed. And each quadratic programming problem containing fewer optimization variables makes the training speed of the proposed approach fast. Compared with other interval regression approaches based on support vector machines, such as quadratic loss support vector machine approach and two smaller quadratic programming problem support vector machine approach, the proposed approach is more efficient on several artificial datasets and power load dataset.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Publikationsdatum: 2020-05-01
    Beschreibung: The unmanned aerial vehicle features with high flexibility and easy deployment. It could be used as an air base station and provide fast communication services for the ground users. It plays an important role in some special occasions such as natural disasters, emergency communications and temporary large-scale activities. A single unmanned aerial vehicle equipped with base station has limited range of services, but a multiple unmanned aerial vehicle equipped with base station network can serve a wider range of users. The research goal of unmanned aerial vehicle equipped with base station network coverage control is to maximize the network coverage under the condition of maintaining the service quality. In view of the low dynamic coverage ratio of unmanned aerial vehicle equipped with base station network, this article proposes a relative distance–based unmanned aerial vehicle equipped with base station deployment method. The unmanned aerial vehicle realizes on-demand coverage and maintains a stable network topology under the influence of three relative distances by sensing the uncovered area of the ground, the neighbouring unmanned aerial vehicles and the location of the coverage boundary or obstacles. In addition, the algorithm is also adapted to a variety of scenarios. The simulation results show that the coverage of the proposed algorithm is 22.4% higher than that of random deployment, and it is 9.9%, 4.7% and 2.1% higher than similar virtual force-oriented node, circular binary segmentation and hybrid local virtual force algorithms.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Publikationsdatum: 2020-05-01
    Beschreibung: The sorting mechanism underlying the traditional evaluation grid method with attractive factors mainly represents the time or the paired comparison method. However, the current approach employed to identify abstract factors of attractiveness may not be comprehensive. The objective of this article is to propose a hybrid method with an integrated fuzzy Kano model and fuzzy importance–performance analysis to evaluate attractive factors. Fuzzy importance–performance analysis is a more accurate quantitative–qualitative method for two-dimensional analysis, and integrated fuzzy Kano model compensates for the low-resolution problem of the traditional Kano model. A combination of both models arrives at a more comprehensive and reliable evaluation grid method evaluation mechanism. The results indicate that the attractive factors sorted through integrated fuzzy Kano model–fuzzy importance–performance analysis have deconstructed abstract factors and feature factors of the customer service robot. Moreover, the key factors of the products sorted by through integrated fuzzy Kano model–fuzzy importance–performance analysis provide a better understanding of customer expectations associated with the products, which consequently enables developers and designers to accurately understand the design style and conceive new ideas.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Publikationsdatum: 2020-05-01
    Beschreibung: With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. However, insider threats pose very significant privacy and security risks to systems. Traditional access-control models can no longer satisfy the reasonable authorization of resources in these new cross-domain environments. Therefore, a dynamic and semantic-aware access-control model is proposed for privacy preservation in multiple data center environments, which implements a semantic dynamic authorization strategy based on an anomaly assessment of users’ behavior sequences. The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Publikationsdatum: 2020-05-01
    Beschreibung: Technology evolves quickly. Low-cost and ready-to-connect devices are designed to provide new services and applications. Smart grids or smart health care systems are some examples of these applications. In this totally connected scenario, some security issues arise due to the large number of devices and communications. In this way, new solutions for monitoring and detecting security events are needed to address new challenges brought about by this scenario, among others, the real-time requirement allowing quick security event detection and, consequently, quick response to attacks. In this sense, Intrusion Detection Systems are widely used though their evaluation often relies on the use of predefined network datasets that limit their application in real environments. In this work, a real-time and ready-to-use tool for monitoring and detecting security events is introduced. The Multivariate Statistical Network Monitoring–Sensor is based on the Multivariate Statistical Network Monitoring methodology and provides an alternative way for evaluating Multivariate Statistical Network Monitoring–based Intrusion Detection System solutions. Experimental results based on the detection of well-known attacks in hierarchical network systems prove the suitability of this tool for complex scenarios, such as those found in smart cities or Internet of Things ecosystems.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Publikationsdatum: 2020-05-01
    Beschreibung: Partial discharges are the main insulation defects encountered in gas-insulated switchgears. When it occurs inside the gas-insulated switchgear cavity, it degrades insulation, and, sooner or later, causes a breakdown. Therefore, it is important to discover insulation defects as early as possible, locate the discharge, and perform both defect identification and maintenance. Current ultra high frequency-based partial discharge location methods mainly use time delay. To obtain accurate delay times, however, a very high sampling rate is needed, which requires expensive hardware and greatly limits its application. Therefore, in this article, a localization method based on received signal strength indicator ranging is proposed, and location estimation is carried out. An easily implementable particle swarm optimization algorithm with high positioning accuracy is selected to compensate for the low positioning accuracy of current received signal strength indicator ranging methods. To further improve positioning accuracy, the convergence conditions of the particle swarm optimization are investigated, and, considering their constraints, an improved particle swarm optimization algorithm is proposed. By combining the characteristics of ultra high frequency wireless sensor array positioning, the particle size is optimized. The simulation results show that the location accuracy using the ultra high frequency switchgear partial discharge location method based on received signal strength indicator ranging with the improved particle swarm optimization algorithm performs significantly better.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Publikationsdatum: 2020-05-01
    Beschreibung: Sparse decomposition has excellent adaptability and high flexibility in describing arbitrary complex signals based on redundant and over-complete dictionary, thus having the advantage of being free from the limitations of traditional signal processing methods such as wavelet and fast Fourier transform being imposed by orthogonal basis. Sparse decomposition provides an effective approach for feature extraction of intricate vibration signals collected from rotating machinery. Self-learning over-complete dictionary and pre-defined over-complete dictionary are the two dictionary construction modes of sparse decomposition. Normally, the former mode owns the virtues of much more adaptive and flexible than the latter one, and several kinds of classical self-learning over-complete dictionary methods have been arising in recent years. K-means singular value decomposition is a classical self-learning over-complete dictionary method and has been used in image processing, speech processing, and vibration signal processing. However, K-means singular value decomposition has relative low reconstruction accuracy and poor stability to enhance the desired features. To overcome the above-mentioned shortcomings of K-means singular value decomposition, a new K-means singular value decomposition sparse representation method based on traditional K-means singular value decomposition method was proposed in this article, which uses the sparse adaptive matching pursuit algorithm and an iterative method based on the minimum similarity of atomic structure. The effectiveness and advantage of the proposed method were verified through simulation and experiment.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Publikationsdatum: 2020-05-01
    Beschreibung: Nowadays, wireless sensor network technology is being increasingly popular which is applied to a wide range of Internet of Things. Especially, Power Internet of Things is an important and rapidly growing section in Internet of Thing systems, which benefited from the application of wireless sensor networks to achieve fine-grained information collection. Meanwhile, the privacy risk is gradually exposed, which is the widespread concern for electricity power consumers. Non-intrusive load monitoring, in particular, is a technique to recover state of appliances from only the energy consumption data, which enables adversary inferring the behavior privacy of residents. There can be no doubt that applying local differential privacy to achieve privacy preserving in the local setting is more trustworthy than centralized approach for electricity customers. Although it is hard to control the risk and achieve the trade-off between privacy and utility by traditional local differential privacy obfuscation mechanisms, some existing obfuscation mechanisms based on artificial intelligence, called advanced obfuscation mechanisms, can achieve it. However, the large computing resource consumption to train the machine learning model is not affordable for most Power Internet of Thing terminal. In this article, to solve this problem, IFed was proposed—a novel federated learning framework that let electric provider who normally is adequate in computing resources to help Power Internet of Thing users. First, the optimized framework was proposed in which the trade-off between local differential privacy, data utility, and resource consumption was incorporated. Concurrently, the following problem of privacy preserving on the machine learning model transport between electricity provider and customers was noted and resolved. Last, users were categorized based on different levels of privacy requirements, and stronger privacy guarantee was provided for sensitive users. The formal local differential privacy analysis and the experiments demonstrated that IFed can fulfill the privacy requirements for Power Internet of Thing users.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Publikationsdatum: 2020-05-01
    Beschreibung: Linear predictive coding is an extremely effective voice generation method that operates through simple process. However, linear predictive coding–generated voices have limited variations and exhibit excessive noise. To resolve these problems, this article proposes an artificial intelligence model that combines a denoise autoencoder with generative adversarial networks. This model generates voices with similar semantics through the random input from the latent space of generator. The experimental results indicate that voices generated exclusively by generative adversarial networks exhibit excessive noise. To solve this problem, a denoise autoencoder was connected to the generator for denoising. The experimental results prove the feasibility of the proposed voice generation method. In the future, this method can be applied in robots and voice generation applications to increase the humanistic language expression ability of robots and enable robots to demonstrate more humanistic and natural speaking performance.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Publikationsdatum: 2020-05-01
    Beschreibung: With the widespread propagation of Internet of Things through wireless sensor networks, massive amounts of sensor data are being generated at an unprecedented rate, resulting in very large quantities of explicit or implicit information. When analyzing such sensor data, it is of particular importance to detect accurately and efficiently not only individual anomalous behaviors but also anomalous events (i.e. patterns of behaviors). However, most previous work has focused only on detecting anomalies while generally ignoring the correlations between them. Even in approaches that take into account correlations between anomalies, most disregard the fact that the anomaly status of sensor data changes over time. In this article, we propose an unsupervised contextual anomaly detection method in Internet of Things through wireless sensor networks. This method accounts for both a dynamic anomaly status and correlations between anomalies based contextually on their spatial and temporal neighbors. We then demonstrate the effectiveness of the proposed method in an anomaly detection model. The experimental results show that this method can accurately and efficiently detect not only individual anomalies but also anomalous events.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Publikationsdatum: 2020-04-01
    Beschreibung: Social Internet of things is one of the most up-to-date research issues in the applications of Internet of things technologies. In social Internet of things, accuracy and reliability are standard features to discerning decisions. We assume that decision support systems based on social Internet of things could leverage research from recommender systems to achieve more stable performance. Therefore, we propose a trust-aware recommender systems suitable for social Internet of things. Trust-aware recommender systems adapt the concept of social networking service and utilize social interaction information. Trust information not only improves recommender systems from opinion spam problems but also more accurately predicts users’ preferences. We confirm that the performance of a recommender system becomes more improved when implicit trust is able to satisfy the properties of trust in the social Internet of things environment. The structure and amount of social link information are context-sensitive, so applying the concept of trust into social Internet of things environments requires a method to optimize implicit and explicit trust with minimal social link information. Our proposed method configures an asymmetric implicit trust network utilizing user–item rating matrix and transforms trust propagation metrics for a directional and weighted trust network. Through experiments, we confirm that the proposed methods enable higher accuracy and wider coverage compared to the existing recommendation methods.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Publikationsdatum: 2020-04-01
    Beschreibung: With the development of modern communication, available spectrum resources are becoming increasingly scarce, which reduce network throughput. Moreover, the mobility of nodes results in the changes of network topological structure. Hence, a considerable amount of control information is consumed, which causes a corresponding increase in network power consumption and exerts a substantial impact on network lifetime. To solve the real-time transmission problem in large-scale wireless mobile sensor networks, opportunistic spectrum access is applied to adjust the transmission power of sensor nodes and the transmission velocity of data. A cognitive routing and optimization protocol based on multiple channels with a cross-layer design is proposed to study joint optimal cognitive routing with maximizing network throughput and network lifetime. Experimental results show that the cognitive routing and optimization protocol based on multiple channels achieves low computational complexity, which maximizes network throughput and network lifetime. This protocol can be also effectively applied to large-scale wireless mobile sensor networks.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Publikationsdatum: 2020-04-01
    Beschreibung: We design a greedy routing scheme specifically for GPS-free large-scale wireless sensor networks deployed on surfaces of complex-connected three-dimensional settings. Compared with other greedy embedding–based surface network routing scheme, the proposed one is cut free such that no pair of nodes suffers a long detour to reach each other. The routing scheme is designed to be resilient to node or link failures especially under random node or link failure model where each node in a network has an equal and independent probability of failure during some time interval. The proposed algorithm is fully distributed and scalable to both the size and the topological complexity of a network. Each sensor node requires only limited and constant storage. Simulation results show the proposed routing scheme with a higher successful delivery ratio, a lower average stretch factor, and a lower normalized communication cost compared with other resilient routing methods.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Publikationsdatum: 2020-04-01
    Beschreibung: In order to improve the control ability of the human body in the process of physical training, it is necessary to carry out the inverse simulation analysis of the physical training process and establish the process control model of the physical training. The complex problem of high-dimensional spatial motion planning involved in physical training is decomposed into a series of sub-problems in low-dimensional space, and the inertial attitude parameter fusion is carried out according to the position and pose state of the human body in the end of the workspace during the process of physical training. The design of sensor node and base station in the system can realize real-time collection of motion parameters of motion collectors. The multi-dimensional control of physical training process is carried out by fuzzy constraint and inverse integral control, and the attitude parameters of human body are adjusted by means of mechanical analysis model and inertial parameter analysis method. The simulation results show that the inversion simulation control has better convergence, higher control quality, and better inverse simulation performance in the process of physical training, which can effectively guide physical training and improve the effect of physical training.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Publikationsdatum: 2020-05-01
    Beschreibung: The trajectory tracking control strategy for intelligent vehicle is proposed in this article. Considering the parameters perturbations and external disturbances of the vehicle system, based on the vehicle dynamics and the preview follower theory, the lateral preview deviation dynamics model of the vehicle system is established which uses lateral preview position deviation, lateral preview velocity deviation, lateral preview attitude angle deviation, and lateral preview attitude angle velocity deviation as the tracking state variables. For this uncertain system, the adaptive sliding mode control algorithm is adopted to design the preview controller to eliminate the effects of uncertainties and realize high accuracy of the target trajectory tracking. According to the real-time deviations of lateral position and lateral attitude angle, the feedback controller is designed based on the fuzzy control algorithm. For improving the adaptability to the multiple dynamic states, the extension theory is introduced to design the coordination controller to adjusting the control proportions of the preview controller and the feedback controller to the front wheel steering angle. Simulation results verify the adaptability, robustness, accuracy of the control strategy under which the intelligent vehicle has good handling stability.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Publikationsdatum: 2020-05-01
    Beschreibung: The mobile crowdsourcing technology has been widely researched and applied with the wide popularity of smartphones in recent years. In the applications, the smartphone and its user act as a whole, which called as the composite node in this article. Since smartphone is usually under the operation of its user, the user’s participation cannot be excluded out the applications. But there are a few works noticed that humans and their smartphones depend on each other. In this article, we first present the relation between the smartphone and its user as the conditional decision and sensing. Under this relation, the composite node performs the sensing decision of the smartphone which based on its user’s decision. Then, this article studies the performance of the composite sensing process under the scenario which composes of an application server, some objects, and users. In the progress of the composite sensing, users report their sensing results to the server. Then, the server returns rewards to some users to maximize the overall reward. Under this scenario, this article maps the composite sensing process as the partially observable Markov decision process, and designs a composite sensing solution for the process to maximize the overall reward. The solution includes optimal and myopic policies. Besides, we provide necessary theoretical analysis, which ensures the optimality of the optimal algorithm. In the end, we conduct some experiments to evaluate the performance of our two policies in terms of the average quality, the sensing ratio, the success report ratio, and the approximate ratio. In addition, the delay and the progress proportion of optimal policy are analyzed. In all, the experiments show that both policies we provide are obviously superior to the random policy.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Publikationsdatum: 2020-04-01
    Beschreibung: Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. We show that the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack. We then use our general scheme to construct practical proxy signature schemes for three well-known and promising multivariate public key cryptographic signature schemes. We implement our schemes and compare with several previous constructions to show our efficiency advantage, which further indicates the potential application prospect in the distributed network environment.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Publikationsdatum: 2020-04-01
    Beschreibung: In designing a real-time MAC protocol for wireless sensor networks, it is desirable to shorten the data acquisition cycle time to satisfy more applications with a tighter time constraint in data collection. To achieve this, one often tries to improve throughput by employing a slot reuse technique. Meanwhile, the slotted sense multiple access protocol that uses a sharable slot was proven to be advantageous for timely and reliable data delivery. However, since the nodes at lower tree levels process more packets or bigger packets with data aggregation, they need a bigger sharable slot. Thus, it is not easy to employ a slot reuse technique due to the size variation of sharable slots. To tackle this problem, we try to reduce the size of an aggregated packet by limiting the number of packets for aggregation using two channels. If every node is allowed to send a single packet during data acquisition cycle time, an equal-sized sharable slot can be allocated to every tree level. It is shown that the proposed approach can reduce data acquisition cycle time significantly while maintaining good reliability in data transmission compared with slotted sense multiple access and also reduce energy consumption greatly compared with another multi-channel MAC protocol.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Publikationsdatum: 2020-05-01
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Publikationsdatum: 2020-05-01
    Beschreibung: With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Publikationsdatum: 2020-05-01
    Beschreibung: The automatic detection of falls within environments where sensors are deployed has attracted considerable research interest due to the prevalence and impact of falling people, especially the elderly. In this work, we analyze the capabilities of non-invasive thermal vision sensors to detect falls using several architectures of convolutional neural networks. First, we integrate two thermal vision sensors with different capabilities: (1) low resolution with a wide viewing angle and (2) high resolution with a central viewing angle. Second, we include fuzzy representation of thermal information. Third, we enable the generation of a large data set from a set of few images using ad hoc data augmentation, which increases the original data set size, generating new synthetic images. Fourth, we define three types of convolutional neural networks which are adapted for each thermal vision sensor in order to evaluate the impact of the architecture on fall detection performance. The results show encouraging performance in single-occupancy contexts. In multiple occupancy, the low-resolution thermal vision sensor with a wide viewing angle obtains better performance and reduction of learning time, in comparison with the high-resolution thermal vision sensors with a central viewing angle.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Publikationsdatum: 2020-04-01
    Beschreibung: In recent years, Internet of things (IoT) devices are playing an important role in business, education, medical as well as in other fields. Devices connected to the Internet is much more than the number of world population. However, it may face all kinds of attacks from the Internet easily for its accessibility. As we all know, most attacks against IoT devices are based on Web applications. So protecting the security of Web services can effectively improve the situation of IoT ecosystem. Conventional Web attack detection methods highly rely on samples, and artificial intelligence detection results are uninterpretable. Hence, this article introduced a supervised detection algorithm based on benign samples. Seq2Seq algorithm is been chosen and applied to detect malicious web requests. Meanwhile, the attention mechanism is introduced to label the attack payload and highlight labeling abnormal characters. The results of experiments show that on the premise of training a benign sample, the precision of proposed model is 97.02%, and the recall is 97.60%. It explains that the model can detect Web attack requests effectively. Simultaneously, the model can label attack payload visually and make the model “interpretable.”
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Publikationsdatum: 2020-04-01
    Beschreibung: Classification of imbalanced data is a vastly explored issue of the last and present decade and still keeps the same importance because data are an essential term today and it becomes crucial when data are distributed into several classes. The term imbalance refers to uneven distribution of data into classes that severely affects the performance of traditional classifiers, that is, classifiers become biased toward the class having larger amount of data. The data generated from wireless sensor networks will have several imbalances. This review article is a decent analysis of imbalance issue for wireless sensor networks and other application domains, which will help the community to understand WHAT, WHY, and WHEN of imbalance in data and its remedies.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Publikationsdatum: 2020-05-01
    Beschreibung: In this article, we consider a directional data forwarding problem to multiple destinations under distinct deadline constraints in vehicular ad hoc networks. We present a simple yet effective data forwarding algorithm based on only vehicle-to-vehicle communications in infrastructure-less and map-less environments. Our algorithm consists of two phases: relay selection and proliferation. We design a relay selection algorithm that encourages a shared ride for data delivery toward a certain common intermediate point from time to time for forwarding efficiency. It chooses a strong next relay candidate among nearby connected vehicles by considering their current position, velocity, and also the current progress toward the destination. In case that one of the progress lagging indicators becomes signaled, the number of vehicle relays increases under control depending on the degree of deterioration during a packet replication procedure called proliferation. Embedding two essential parts in designing a timely data forwarding scheme validates its accurate on-time data delivery performance and forwarding efficiency in network overhead based on real-world data-driven experiments.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Publikationsdatum: 2020-05-01
    Beschreibung: In the research of industrial robot design, designing using only the perceptual thinking and creativity of an industrial designer or overemphasizing the intervention of quantitative data research in the field of emotional cognition is relatively one sided. In this article, research on how to combine the above two aspects effectively will be conducted. The aim is to present a design method which provides artistic creativity and scientific support for industrial robot design. Therefore, a method for representing perceptual image spaces of industrial robots through pictures and semantics by evaluating the perceptual images and using statistical approaches such as factor analysis will be proposed. Perceptual design elements of industrial robots are decomposed from the perspective of style and color. After the quantitative type I analysis, the numerical relationships between the semantics of images and design elements are identified. Also, a method for mapping relationships between the perceptual image spaces and design elements of industrial robots is developed. After three-dimensional modeling and simulation, the semantic difference methods are used in combination with the emotional evaluation and measurement methods for physiological experiments such as eye tracking, skin conductance, heart rate, and electroencephalography experiments with the aid of virtual reality. Finally, a perceptual design method is extracted for smart industrial robots based on virtual reality and synchronous quantitative physiological signals.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Publikationsdatum: 2020-05-01
    Beschreibung: Users are each day more aware of their privacy and data protection. Although this problem is transversal to every digital service, it is especially relevant when critical and personal information is managed, as in eHealth and well-being services. During the last years, many different innovative services in this area have been proposed. However, data management challenges are still in need of a solution. In general, data are directly sent to services but no trustworthy instruments to recover these data or remove them from services are available. In this scheme, services become the users’ data owners although users keep the rights to access, modify, and be forgotten. Nevertheless, the adequate implementation of these rights is not guaranteed, as services use the received data with commercial purposes. In order to address and solve this situation, we propose a new trustworthy personal data protection mechanism for well-being services, based on privacy-by-design technologies. This new mechanism is based on Blockchain networks and indirection functions and tokens. Blockchain networks execute transparent smart contracts, where users’ rights are codified, and store the users’ personal data which are never sent or given to external services. Besides, permissions and privacy restrictions designed by users to be applied to their data and services consuming them are also implemented in these smart contracts. Finally, an experimental validation is also described to evaluate the Quality of Experience (in terms of user satisfaction) and Quality of Service (in terms of processing delay) compared to traditional service provision solutions.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Publikationsdatum: 2020-05-01
    Beschreibung: In this article, versatile video coding, the next-generation video coding standard, is combined with a deep convolutional neural network to achieve state-of-the-art image compression efficiency. The proposed hierarchical grouped residual dense network exhaustively exploits hierarchical features in each architectural level to maximize the image quality enhancement capability. The basic building block employed for hierarchical grouped residual dense network is residual dense block which exploits hierarchical features from internal convolutional layers. Residual dense blocks are then combined into a grouped residual dense block exploiting hierarchical features from residual dense blocks. Finally, grouped residual dense blocks are connected to comprise a hierarchical grouped residual dense block so that hierarchical features from grouped residual dense blocks can also be exploited for quality enhancement of versatile video coding intra-coded images. Various non-architectural and architectural aspects affecting the training efficiency and performance of hierarchical grouped residual dense network are explored. The proposed hierarchical grouped residual dense network respectively obtained 10.72% and 14.3% of Bjøntegaard-delta-rate gains against versatile video coding in the experiments conducted on two public image datasets with different characteristics to verify the image compression efficiency.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Publikationsdatum: 2020-05-01
    Beschreibung: Irregularities in microphone distribution enrich the diversity of spatial differences to decorrelate interferences from the beamforming target. However, the large degrees of freedom of irregular placements make it difficult to analyse and optimize array performance. This article proposes fast and feasible optimal irregular array design methods with improved beamforming performance for human speech. Important geometric features are extracted to be used as the input vector of the neural network structure to determine the optimal irregular arrangements of sensors. In addition, a hyperbola design method is proposed to directly cluster microphones in the hyperbola areas to produce rich differential distance entropies and yield significant signal-to-noise ratio improvements. These methods can be easily applied to guide non-computer-aided optimal irregular array designs for human speech in acoustic scenes such as immersive cocktail party environments.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Publikationsdatum: 2020-05-01
    Beschreibung: Due to the special characteristics of highway tunnels and vehicles, the interior of the tunnel is required to provide appropriate lighting to ensure the safety of driving vehicles, especially at the entrance section of the tunnel. At present, most of the tunnel entrance lighting control system only considers one single factor, the brightness outside the tunnel. However, in practice, the required lighting brightness in the tunnel is also related to traffic flow, speed, and other factors. Comprehensively utilizing these factors to improve the control strategy is urgently needed. To deal with this problem, this article has designed a multi-source information acquisition system for tunnel lighting based on the Internet of things technology, which combined with fuzzy control theory in order to develop an intelligent control system for LED lighting at the entrance section of the tunnel. The designed system was implemented and long-term tested in a real highway tunnel. The experimental results have shown that the system designed in this article can automatically control the brightness of the lighting inside the tunnel according to the real-time measurements of the brightness outside the tunnel, traffic flow, speed, and so on. Furthermore, the utilizations of the system can minimize the human and power consumption of tunnel lighting while ensuring the safety of tunnel traffic.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Publikationsdatum: 2020-05-01
    Beschreibung: In relational databases, embedding watermarks in integer data using traditional histogram shifting method has the problem of large data distortion. To solve this problem, a reversible database watermarking method without redundant shifting distortion is proposed, taking advantage of a large number of gaps in the integer histogram. This method embeds the watermark bit by bit on the basis of grouping. First, an integer data histogram is constructed with the absolute value of the prediction error of the data as a variable. Second, the positional relationship between each column and the gap in the histogram is analyzed to find out all the columns adjacent to the gap. Third, the highest column is selected as the embedded point. Finally, a watermark bit is embedded on the group by the histogram non-redundant shifting method. Experimental results show that compared with existing reversible database watermarking methods, such as genetic algorithm and histogram shift watermarking and histogram gap–based watermarking, the proposed method has no data distortion caused by the shifting redundant histogram columns after embedding watermarks on forest cover type data set and effectively reduces the data distortion rate after embedding watermarks.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Publikationsdatum: 2020-05-01
    Beschreibung: Since the working situation of photovoltaic modules cannot be tracked in the real time and defective components cannot be located and controlled specifically, a remote monitoring system of photovoltaic modules based on wireless sensor networks is designed to improve the management efficiency of photovoltaic power plants. The monitoring data (current, voltage, and illumination, etc.) of photovoltaic modules are collected by the wireless sensor network nodes in real time, and then, there are orderly transmitted to the coordinator and server by the ZigBee communication protocol with the time synchronization algorithm. Time synchronization algorithm based on Gaussian delay model performs best in synchronization accuracy and energy-efficient reference broadcast synchronization algorithm is the most advantageous in synchronization energy consumption. Adaptive energy–efficient reference broadcasting synchronization algorithm is proposed with a balance between energy consumption and accuracy, which is applicable to large networks and thus conducive to the application of wireless sensor network in large-scale photovoltaic module monitoring. With the analysis and processing of the received data, the situation of the photovoltaic modules can be accordingly judged and thus the information management of photovoltaic power plant can be realized. For a photovoltaic power plant with a total power output of 100 kW and with 400 photovoltaic modules, experimental results show that the overall efficiency of the photovoltaic power plant can be increased by a wide margin.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Publikationsdatum: 2020-05-01
    Beschreibung: Data volume demand has increased dramatically due to huge user device increasement along with the development of cellular networks. And macrocell in 5G networks may encounter sudden traffic due to dense users caused by sports or celebration activities. To resolve such temporal hotspot, additional network access point has become a new solution for it, and unmanned aerial vehicle equipped with base stations is taken as an effective solution for coverage and capacity improvement. How to plan the best three-dimensional location of the aerial base station according to the users’ business needs and service scenarios is a key issue to be solved. In this article, first, aiming at maximizing the spectral efficiency and considering the effects of line-of-sight and non-line-of-sight path loss for 5G mmWave networks, a mathematical optimization model for the location planning of the aerial base station is proposed. For this model, the model definition and training process of deep Q-learning are constructed, and through the large-scale pre-learning experience of different user layouts in the training process to gain experience, finally improve the timeliness of the training process. Through the simulation results, it points out that the optimization model can achieve more than 90% of the theoretical maximum spectral efficiency with acceptable service quality.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Publikationsdatum: 2020-05-01
    Beschreibung: This article focuses on the problem of scheduling the optimal paths of multiple mobile elements (e.g. robots, vehicles, etc.) to minimize the travel distance and balance the energy consumption and the data gathering latency in wireless sensor networks for smart cities. To partition the network for the multiple mobile elements and compute the trajectories of the multiple mobile elements, we utilize the sensor’s communication range and construct a multiple mobile elements scheduling problem. A heuristic mobile data gathering approach is proposed to solve this problem, which includes the following three steps. The sensor nodes are preliminarily partitioned into four levels, and then the clusterheads are further partitioned, and the traveling tour is scheduled for each cluster. After the first two steps, all the sensor nodes are partitioned reasonably for the multiple mobile elements. In the last step, the traveling tour is scheduled for each cluster, and the meeting point of each clusterhead is determined. We compare the proposed heuristic mobile data gathering with the existing approaches. The results indicate that the travel distance and the data gathering latency are reduced significantly, which further validates that the communication range is beneficial to minimize the travel distance.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Publikationsdatum: 2020-05-01
    Beschreibung: Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. First, in view of the open-access policies formulated by data owners in the cloud environment and the linear growth of bilinear pairing operations with the number of attributes in the decryption process, a verifiable outsourced attribute-based encryption with partial policy hidden scheme is proposed, in which the attribute name of access policy can be sent while attribute value involving sensitive information can be hidden, so nobody can infer information from the access policy. Second, the bilinear pairing operation and modular power operation are outsourced to the cloud server, then users only need to perform constant exponential operation to decrypt. In addition, the proposed scheme is based on the composite order bilinear group and satisfies full secure under the standard model. Finally, compared with other schemes in term of function and performance, it shows that this scheme is more efficient and suitable for resource-constrained mobile devices in outsourcing environment.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Publikationsdatum: 2020-05-01
    Beschreibung: Globally, under-five child mortality is a substantial health problem. In developing countries, reducing child mortality and improving child health are the key priorities in health sectors. Despite the significant reduction in deaths of under-five children globally, developing countries are still struggling to maintain an acceptable mortality rate. Globally, the death rate of under-five children is 41 per 1000 live births. However, the death rate of children in developing nations like Pakistan and Ethiopia per 1000 live births is 74 and 54, respectively. Such nations find it very challenging to decrease the mortality rate. Data analytics on healthcare data plays a pivotal role in identifying the trends and highlighting the key factors behind the children deaths. Similarly, predictive analytics with the help of Internet of Things based frameworks significantly advances the smart healthcare systems to forecast death trends for timely intervention. Moreover, it helps in capturing hidden associations between health-related variables and key death factors among children. In this study, a predictive analytics framework has been developed to predict the death rates with high accuracy and to find the significant determinants that cause high child mortality. Our framework uses an automated method of information gain to rank the information-rich mortality variables for accurate predictions. Ethiopian Demographic Health Survey and Pakistan Demographic Health Survey data sets have been used for the validation of our proposed framework. These real-world data sets have been tested using machine learning classifiers, such as Naïve Bayes, decision tree, rule induction, random forest, and multi-layer perceptron, for the prediction task. It has been revealed through our experimentation that Naïve Bayes classifier predicts the child mortality rate with the highest average accuracy of 96.4% and decision tree helps in identifying key classification rules covering the factors behind children deaths.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Publikationsdatum: 2020-06-01
    Beschreibung: With rapid industrialization, the construction of high-rise buildings is a good and effective solution to the rational and effective use of land resources and alleviation of existing land resource tensions. Especially in the construction process, if there is a problem with the pile foundation, the building will inevitably be tilted, which will directly affect the personal safety of the construction workers and resident users. The experiments in this article use the concept of big data to divide the system into modules such as data collection, data preprocessing, feature extraction, prediction model building, and model application in order to provide massive data storage and parallel computing services to form a security test system. The experimental data show that wireless sensor technology is applied to the inclination monitoring of buildings, and a monitoring system based on wireless inclination sensors is designed to enable real-time dynamic monitoring of buildings to ensure human safety. When the experimental model frame is stable under normal environmental conditions, a nonstationary vibration is artificially produced for a period of time from the outside world, which is about 60 s higher than the traditional method, and the efficiency is also increased by about 80%, a situation where a building has a reversible tilt change.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Publikationsdatum: 2020-06-01
    Beschreibung: In this article, we adapted a sensor-based smart insole to monitor the workload of the construction material carrying work frequently occurring at the construction site. Generally, the tasks of the construction material carrying work by the construction site workers proceed through walk. Therefore, we designed and implemented an application and server to receive and calculate data from the Internet of Things sensors to automatically estimate the weight of the construction material being carried and time of these works based on the characteristic of walking. As a result of the experimental tests with 15 people using the proposed method, it was confirmed that there was a correlation between the signal change at the foot plantar pressure during walking and the weight change of the construction material carried by the workers. It was confirmed that the foot pressure value during walking can be used to estimate the weight of the construction material that the worker currently possesses. Based on this, we were able to estimate the actual weight of the object with an accuracy of 91% from the 20 new test workers, and we were able to measure the work time with an accuracy of 97%.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Publikationsdatum: 2020-06-01
    Beschreibung: In various applications of satellite navigation and positioning, it is a key topic to select suitable satellites for positioning solutions to reduce the computational burden of the receiver in satellite selection system. Moreover, in order to reduce the processing burden of receivers, the satellite selection algorithm based on Gibbs sampler is proposed. First, the visible satellites are randomly sampled and divided into a group. The group is regarded as an initial combination selection scheme. Then, the geometric dilution of precision is chosen as an objective function to evaluate the scheme’s quality. In addition, the scheme is updated by the conditional probability distribution model of the Gibbs sampler algorithm, and it gradually approaches the global optimal solution of the satellite combination with better geometric distribution of the space satellite. Furthermore, an “adaptive perturbation” strategy is introduced to improve the global searching ability of the algorithm. Finally, the extensive experimental results demonstrate that when the number of selected satellite is more than 6, the time that the proposed algorithm with the improvement of “adaptive perturbation” takes to select satellite once is 43.7% of the time that the primitive Gibbs sampler algorithm takes. And its solutions are always 0.1 smaller than the related algorithms in geometric dilution of precision value. Therefore, the proposed algorithm can be considered as a promising candidate for satellite navigation application systems.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Publikationsdatum: 2020-07-01
    Beschreibung: In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying the ceil function and floor function. On the receiver side, the secret data extraction and the cover image restoration can be performed by using the correlation between two stego-images. After recovering the cover image from two stego-images, the secret data can be extracted using the maximum difference value and the log function. The experimental results show that the proposed scheme has a higher embedding capacity and the proposed scheme differs in embedding the secret data depending on the characteristics of the cover image with less distortion. Also, the proposed scheme maintains the degree of image distortion that cannot be perceived by the human visual system.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Publikationsdatum: 2020-07-01
    Beschreibung: Intensive animal husbandry is becoming more and more popular with the adoption of modern livestock farming technologies. In such circumstances, it is required that the welfare of animals be continuously monitored in a real-time way. To this end, this study describes one on-farm welfare monitoring system for goats, with a combination of Internet of Things and machine learning. First, the system was designed for uninterruptedly monitoring goat growth in a multifaceted and multilevel manner, by means of collecting on-farm videos and representative environmental data. Second, the monitoring hardware and software systems were presented in detail, aiming at supporting remote operation and maintenance, and convenience for further development. Third, several key approaches were put forward, including goat behavior analysis, anomaly data detection, and processing based on machine learning. Through practical deployment in the real situation, it was demonstrated that the developed system performed well and had good potential for offering real-time monitoring service for goats’ welfare, with the help of accurate environmental data and analysis of goat behavior.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Publikationsdatum: 2020-06-01
    Beschreibung: In video surveillance, person tracking is considered as challenging task. Numerous computer vision, machine and deep learning–based techniques have been developed in recent years. Majority of these techniques are based on frontal view images/video sequences. The advancement of convolutional neural network reforms the way of object tracking. The network layers of convolutional neural network models trained on a number of images or video sequences improve speed and accuracy of object tracking. In this work, the generalization performance of existing pre-trained deep learning models have investigated for overhead view person detection and tracking, under different experimental conditions. The object tracking method Generic Object Tracking Using Regression Networks (GOTURN) which has been yielding outstanding tracking results in recent years is explored for person tracking using overhead views. This work mainly focused on overhead view person tracking using Faster region convolutional neural network (Faster-RCNN) in combination with GOTURN architecture. In this way, the person is first identified in overhead view video sequences and then tracked using a GOTURN tracking algorithm. Faster-RCNN detection model achieved the true detection rate ranging from 90% to 93% with a minimum false detection rate up to 0.5%. The GOTURN tracking algorithm achieved similar results with the success rate ranging from 90% to 94%. Finally, the discussion is made on output results along with future direction.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Publikationsdatum: 2020-06-01
    Beschreibung: Smart City Internet of Things will become a fundamental infrastructure to support massive machine-type communications between the widely deployed sensors serving big cities. Since there exists many location constraints for the existing terrestrial Internet of Things, the non-terrestrial Internet of Things sheds light on breaking these limits. Therefore, this article conducts a comprehensive survey on non-terrestrial Internet of Things technologies for Smart City, which is an important complement to terrestrial Internet of Things. We first present the application scenarios of Internet of Things and point out where the existing terrestrial Internet of Things cannot work perfectly. Two non-terrestrial Internet of Things technical proposals are then introduced, namely satellite Internet of Things and unmanned aerial vehicle Internet of Things. However, the focuses of these non-terrestrial Internet of Things are distinct, that is, the major problems of satellite and unmanned aerial vehicle Internet of Things are the high dynamic nature of channel and high maneuverability of unmanned aerial vehicles, respectively. The key technologies for satellite and unmanned aerial vehicle Internet of Things are then reviewed separately. Both physical and non-physical layer technologies are surveyed for satellite Internet of Things, and the route planning is mainly investigated for the unmanned aerial vehicle Internet of Things. Finally, we draw a conclusion and give some potential research directions of non-terrestrial Internet of Things.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Publikationsdatum: 2020-06-01
    Beschreibung: Nowadays, smart farming involves the integration of advanced technologies that incorporate low-cost robots to meet the required knowledge and maintain the health of plants in farming. Technologies like precision agriculture are also used to optimize resources based on the field condition. Internet of Green Things is also one of the technologies to integrate and share the information between people and healthy farm things. Internet of Green Things gives the information like soil moisture, temperature, humidity, and nutrient level by means of respective sensors. Monitoring and information gathering in green houses with the help of robots is a tedious and expensive process. In this connection, information is shared among low-cost robots encouraging data availability of the current state of a plant with other robots. This will emphasize the monitoring of green houses in a well-organized way. In this article, a Flask-based framework through Raspberry Pi is proposed for interoperability among the low-cost ESP8266 robots. Data gathering is performed by smart robots that are accessible through Message Queuing Telemetry Transport subscribes by means of Representational State Transfer Application Programming Interface. A cloud-like database server is provided to stock up the data. The integration of robotics with Internet of Green Things gains more advantage in gathering about spatial information data that are connected with the irrigation. Visualization techniques and perspectives based on Internet of Green Things for precision agriculture in the field of farming are highlighted.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Publikationsdatum: 2020-06-01
    Beschreibung: Internet of Things integrates various technologies, including wireless sensor networks, edge computing, and cloud computing, to support a wide range of applications such as environmental monitoring and disaster surveillance. In these types of applications, IoT devices operate using limited resources in terms of battery, communication bandwidth, processing, and memory capacities. In this context, load balancing, fault tolerance, and energy and memory efficiency are among the most important issues related to data dissemination in IoT networks. In order to successfully cope with the abovementioned issues, two main approaches—data-centric storage and distributed data storage—have been proposed in the literature. Both approaches suffer from data loss due to memory and/or energy depletion in the storage nodes. Even though several techniques have been proposed so far to overcome the abovementioned problems, the proposed solutions typically focus on one issue at a time. In this article, we propose a cross-layer optimization approach to increase memory and energy efficiency as well as support load balancing. The optimization problem is a mixed-integer nonlinear programming problem, and we solve it using a genetic algorithm. Moreover, we integrate the data-centric storage features into distributed data storage mechanisms and present a novel heuristic approach, denoted as Collaborative Memory and Energy Management, to solve the underlying optimization problem. We also propose analytical and simulation frameworks for performance evaluation. Our results show that the proposed method outperforms the existing approaches in various IoT scenarios.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Publikationsdatum: 2020-06-01
    Beschreibung: As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works can be executed offline. However, a challenging issue is the well-known identity-based online/offline encryption schemes unable to resist continual key leakage attacks of the secret keys. To address the above security challenge, we put forth the first continual leakage-resilient identity-based online/offline encryption scheme which is suitable for ensuring secure communications in wireless sensor networks. More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. Above all, compared to the existing identity-based online/offline encryption schemes, an identity-based online/offline encryption scheme with continual leakage resilient meets wireless sensor networks with strong security.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Publikationsdatum: 2020-06-01
    Beschreibung: Both coverage and connectivity are important problems in wireless sensor networks. As more and more non-orientation sensors are continuously added into the region of interest, the size of covered component and connected component increases; at some point, the network can achieve an entire coverage and full connectivity after which the network percolates. In this article, we analyze the critical density in non-orientation directional sensor network in which the orientations of the sensors are random and the sensors are deployed according to the Poisson point process. We propose an approach to compute the critical density in such a network. A collaborating path is proposed with the sum of field-of-view angles of two collaborating sensors being π. Then a correlated model of non-orientation directional sensing sectors for percolation is proposed to solve the coverage and connectivity problems together. The numerical simulations confirm that percolation occurs on the estimated critical densities. It is worth mentioning that the theoretical analysis and simulation results give insights into the design of directional sensor network in practice.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Publikationsdatum: 2020-07-01
    Beschreibung: We consider the composite hypothesis testing problem of time-bandwidth-constrained distributed detection. In this scenario, the probability distribution of the observed signal when the event of interest is happening is unknown. In addition, local decisions are censored and only those uncensored local decisions will be sent to the fusion center over a shared and noisy collision channel. The fusion center also has a limited time duration to collect transmitted decisions and make a final decision. Two types of medium access control that the sensor nodes apply to send their decisions are investigated: time division multiple access and slotted-Aloha. Unlike using the time division multiple access protocol, the slotted-Aloha-based distributed detection will experience packet collisions. However, in this article, since only uncensored decisions are sent, packet collisions are informative. We derive fusion rules according to generalized likelihood ratio test, Rao test, and Wald test for both the time division multiple access–based distributed detection and the slotted-Aloha-based distributed detection. We see that the fusion rules for the slotted-Aloha-based distributed detection here also exploit packet collisions in the final decision-making. In addition, the asymptotic performances and energy consumption of both schemes are analyzed. Extensive simulation and numerical results are provided to compare the performances of these two schemes. We show that, for a given time delay, the slotted-Aloha-based distributed detection can outperform the time division multiple access–based distributed detection by increasing the number of sensor nodes which results in higher energy consumption.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Publikationsdatum: 2020-06-01
    Beschreibung: For the successful operation of smart home environments, it is important to know the state or activity of an occupant. A large number of sensors can be deployed and embedded in places or things. All sensor nodes measure the physical world and send data to the base station for processing. However, the processing of all collected data from every sensor node can consume significant energy and time. In order to enhance the sensor network in smart home applications, we propose the irrelevant data elimination based on k-means clustering algorithm to enhance data aggregation. This approach embeds the cluster head–based algorithm into cluster heads to omit irrelevant data from the base station. The pattern of measured data in each room can be clustered as an active pattern when human activity happens in that room and a stable pattern when human activity does not happen in the room. The irrelevant data elimination based on k-means clustering algorithm approach can reduce 55.94% of the original data with similar results in human activity classification. This study proves that the proposed approach can eliminate meaningless data and intelligently aggregate data by delivering only data from rooms in which human activity likely occurs.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Publikationsdatum: 2020-06-01
    Beschreibung: Recently, a wide range of small devices, such as Wi-Fi Internet of things development boards, which are a kind of the microcontroller units in a general purpose board, are interrelated throughout the planet. In addition, certain microcontroller units interact inside our homes when turning lights on or detecting movements, measuring various parameters, such as gas concentrations, [Formula: see text], humidity, and the temperature inside a room, or adjusting the intensity of the lights inside and outside of the house. Likewise, there is a great diversity of microcontroller units, ranging from smart cellular telephones or reduced general purpose devices, ESP8266 or RaspberryPi3 to any type of Internet of things devices. Therefore, the general way of connecting the microcontroller units to the Internet is through hub nodes, so that the information can be propagated and shared among them. The main purpose of this article is to yield an adaptive reconfiguration algorithm to link all the sensor nodes (microcontroller units) of a network based on the fractal topology, avoiding the use of hub nodes, in order for the microcontroller units to share all the parameters established in the Internet of things network only through two adjacent sensor nodes as long as any sensor node in the network knows all the parameters of the other ones, even if the sensor nodes are not adjacent. To achieve the above, in this work, an Internet of things network was built based on the Hilbert fractal for being a filling-space curve yielded from the L-systems paradigm, so this fractal Hilbert topology allows access to the entire Internet of things network in a dynamic way, and it is possible to reconfigure the network topology when a new sensor node is attached by applying artificial intelligence to intelligent and dynamic environments.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Publikationsdatum: 2020-07-01
    Beschreibung: We propose electronic voting authentication scheme, which is a key management mechanism for electronic voting system intended to limit the number of attacks on a polling station and strengthen the security control. The motivation is to diversify security requirements of messages exchanged between polling stations. There are different types of messages exchanged between polling stations and each type of message has different security needs. A security mechanism developed on the basis of a single key is not enough to ensure the diverse security needs of voting network. In electronic voting authentication scheme, every polling station is responsible to support three different types of keys. These are global key, pairwise key, and individual key. The global keys are public keys shared with all polling stations in the voting network. The pairwise key can be used for communication with polling stations. Individual keys will be used for communication with the server. To ensure authentication of local broadcast, electronic voting authentication scheme uses one-way key chains in a well-organized way. The support of source authentication is a visible advantage of this scheme. We examine the authentication of electronic voting authentication scheme on numerous attack models. The measurement demonstrates that electronic voting authentication scheme is very operative in protecting against numerous elegant attacks such as wormhole attack, Sybil attack, and HELLO Flood attack. The proposed system is evaluated and the results demonstrate that the proposed system is practical and secure as compared to the direct recording electronic and manual systems.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Publikationsdatum: 2020-06-01
    Beschreibung: In this article, three novel systems for wireless sensor networks based on Alamouti decoding were investigated and then compared, which are Alamouti space–time block coding multiple-input single-output/multiple-input multiple-output multicarrier modulation (MCM) system, extended orthogonal space–time block coding multiple-input single-output MCM system, and multiple-input multiple-output system. Moreover, the proposed work is applied over multiple-input multiple-output systems rather than the conventional single-antenna orthogonal chirp division multiplexing systems, based on the discrete fractional cosine transform orthogonal chirp division multiplexing system to mitigate the effect of frequency-selective and time-varying channels, using low-complexity equalizers, specifically by ignoring the intercarrier interference coming from faraway subcarriers and using the LSMR iteration algorithm to decrease the equalization complexity, mainly with long orthogonal chirp division multiplexing symbols, such as the TV symbols. The block diagrams for the proposed systems are provided to simplify the theoretical analysis by making it easier to follow. Simulation results confirm that the proposed multiple-input multiple-output and multiple-input single-output orthogonal chirp division multiplexing systems outperform the conventional multiple-input multiple-output and multiple-input single-output orthogonal frequency division multiplexing systems. Finally, the results show that orthogonal chirp division multiplexing exhibited a better channel energy behavior than classical orthogonal frequency division multiplexing, thus improving the system performance and allowing the system to decrease the equalization complexity.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Publikationsdatum: 2020-06-01
    Beschreibung: Multi-node cooperative sensing can effectively improve the performance of spectrum sensing. Multi-node cooperation will generate a large number of local data, and each node will send its own sensing data to the fusion center. The fusion center will fuse the local sensing results and make a global decision. Therefore, the more nodes, the more data, when the number of nodes is large, the global decision will be delayed. In order to achieve the real-time spectrum sensing, the fusion center needs to quickly fuse the data of each node. In this article, a fast algorithm of big data fusion is proposed to improve the real-time performance of the global decision. The algorithm improves the computing speed by reducing repeated computation. The reinforcement learning mechanism is used to mark the processed data. When the same environment parameter appears, the fusion center can directly call the nodes under the parameter environment, without having to conduct the sensing operation again. This greatly reduces the amount of data processed and improves the data processing efficiency of the fusion center. Experimental results show that the algorithm in this article can reduce the computation time while improving the sensing performance.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Publikationsdatum: 2020-06-01
    Beschreibung: In Taiwan, where residential and industrial areas are in close proximity, finding ways to effectively continuous monitor and manage water quality is an essential issue. This study established a total solution for an Internet of things water quality monitoring network that integrates domestic miniaturized water quality monitoring sensors for real-time transport data of pH, temperature, conductivity, chemical oxygen demand, and copper ions. The data will be used to establish an analysis model based on continuous monitoring of the nation’s background concentration. We designed an automatic continuous monitoring and early warning analysis module for automatic analysis of environmental and instrumental anomalies for decision makers, a “pollution source analysis module” utilizing static and dynamic cross-environment data to swiftly trace upstream pollution sources, and a “pollution hotspot analysis module” to evaluate the impact area of pollutants, and immediate response measures to achieve early warning and swift evaluation for the prevention of water pollution. To do this, we installed 100 domestic miniaturized water monitoring devices in Taoyuan City for testing the solution. We found that the establishment of an Internet of things environment analysis and response model integrated with cross-environment analysis can be applied in water quality monitoring and management to assure improved environmental quality.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Publikationsdatum: 2020-06-01
    Beschreibung: In copper mining, there are two main separation processes: leaching for oxidized minerals and flotation for sulfide minerals. In Chile, the increase of sulfide minerals in the deposits and the decrease of oxidized minerals have led to an increase in the investigation of flotation processes and the optimization of their associated operations. One of the concentration processes is the use of thickeners, whose main objective is to treat the tailings that leave the plants in pulp form with approximately 30% solids and obtain a pulp with a concentration greater than 50% with clear water flow. The recovery of water is the main goal, so knowing the concentration profiles of solids and sedimentation is crucial. However, the characteristics of the pulp and the operation of the thickeners are complex because a great variety of forms can be found in the concentration profile of said pulp. This limits conventional measurement techniques and makes it difficult to apply deterministic models to the solids profile, given the high nonlinearities and variability of the system. In this article, a solution is proposed by developing a sensor that allows the online estimation of sludge level and concentration of solids, based on a model of neural networks (with the model of Maxwell for dispersions), allowing to measure the solids profile regardless of the operating conditions. The structure selected has nine inputs with a hidden layer, two neurons, and two outputs being trained with tailings from Chuquicamata, obtaining the information from a 50 L pilot with 10-electrode bar of 60 cm of length, resulting in an estimation error of 0.8 cm with a network of 26 parameters.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Publikationsdatum: 2020-06-01
    Beschreibung: The development of wireless sensor and actuator network is leading to high complexity networks and subsequently, new challenges in task assignment for effective sensor–actuator coordination. This article proposes an adaptive auction protocol for task assignment in multi-hop wireless actuator networks, considering a scenario where all actuators are immobile and each of them can obtain the target information from sensors. Unlike existing methods that neglect the adaptive auction area required by dynamic networks, the proposed method uses an adaptive factor [Formula: see text] (reflects the adaptive auction area) that is deduced based on the relation between network characteristics and protocol performance. Simulation results show that the adaptive protocol can dynamically change the auction area during the network operation. In addition, comparison with existing methods, such as simple auction protocol, 1 hop simple auction aggregation protocol, and 1 hop simple auction aggregation protocol greedy extension, shows that the adaptive auction protocol can choose the optimal solution at a low communication cost with a high probability, irrespective of the changes in the network.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Publikationsdatum: 2020-06-01
    Beschreibung: The best service mechanism in multimedia wireless sensor networks can be achieved based on the multimedia traffic flow by developing a proper simulation algorithm process model, to be a trustable indication for real implementations, which is proposed in this article, together with the algorithm model outcome analysis. The quality estimation of the proposed mechanism is investigated by simulating real data transmission and obtaining the integral criterion of the processed mechanism, to determine the queue formation and loading control. Accordingly, it was proved that the first-in first-out algorithm is not useful as a flow algorithm; however, it is regarded as suitable to be considered as the benchmark algorithm when compared with the other algorithms such as priority queue, custom queue, fair queuing, and weighted fair queuing algorithms. Finally, each algorithm’s advantages and disadvantages were verified and the best usage conditions according to certain parameters, such as packet loss probability, average time delay, and jitter, were declared.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Publikationsdatum: 2020-06-01
    Beschreibung: Due to globalization and digitalization of industrial systems, standard compliance is gaining more attention. In order to stay competitive and remain in business, different sectors within industry are required to comply with multiple regulations. Compliance aims to fulfill regulations by including all measures imposed by laws and standards. Every device, application, or service implements several technologies at many levels, and standards support interoperability across them. They help to create global markets for industries and enable networked development in order to be successful and sustainable. This work highlights the importance of standard compliance and continuous verification in industrial Internet of Things and implements an automatic monitoring and standard compliance verification framework. In this work, we focus on security, safety, and organizational aspects of industrial Internet of Things. We identify a number of standards and best practice guidelines, which are used to extract security, safety, and organizational measurable indicator points. In addition, a metric model is provided that forms the basis for the necessary information needed for compliance verification, including requirements, standards, and metrics. Also, we present the prototype of the monitoring and standard compliance verification framework used to show the security compliance of an industrial Internet of Things use case.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Publikationsdatum: 2020-06-01
    Beschreibung: With the rapid development of data centers in smart cities, how to reduce energy consumption and how to raise economic benefits and network performance are becoming an important research subject. In particular, data center networks do not always run at full load, which leads to significant energy consumption. In this article, we focus on the energy-efficient routing problem in software-defined network–based data center networks. For the scenario of in-band control mode of software-defined data centers, we formulate the dual optimal objective of energy-saving and the load balancing between controllers. In order to cope with a large solution space, we design the deep Q-network-based energy-efficient routing algorithm to find the energy-efficient data paths for traffic flow and control paths for switches. The simulation result reveals that the deep Q-network-based energy-efficient routing algorithm only trains part of the states and gets a good energy-saving effect and load balancing in control plane. Compared with the solver and the CERA heuristic algorithm, energy-saving effect of the deep Q-network-based energy-efficient routing algorithm is almost the same as the heuristic algorithm; however, its calculation time is reduced a lot, especially in a large number of flow scenarios; and it is more flexible to design and resolve the multi-objective optimization problem.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Publikationsdatum: 2020-06-01
    Beschreibung: In modern times, swarm intelligence has played an increasingly important role in finding an optimal solution within a search range. This study comes up with a novel solution algorithm named QUasi-Affine TRansformation-Pigeon-Inspired Optimization Algorithm, which uses an evolutionary matrix in QUasi-Affine TRansformation Evolutionary Algorithm for the Pigeon-Inspired Optimization Algorithm that was designed using the homing behavior of pigeon. We abstract the pigeons into particles of no quality and improve the learning strategy of the particles. Having different update strategies, the particles get more scientific movement and space exploration on account of adopting the matrix of the QUasi-Affine TRansformation Evolutionary algorithm. It increases the versatility of the Pigeon-Inspired Optimization algorithm and makes the Pigeon-Inspired Optimization less simple. This new algorithm effectively improves the shortcoming that is liable to fall into local optimum. Under a number of benchmark functions, our algorithm exhibits good optimization performance. In wireless sensor networks, there are still some problems that need to be optimized, for example, the error of node positioning can be further reduced. Hence, we attempt to apply the proposed optimization algorithm in terms of positioning, that is, integrating the QUasi-Affine TRansformation-Pigeon-Inspired Optimization algorithm into the Distance Vector–Hop algorithm. Simultaneously, the algorithm verifies its optimization ability by node location. According to the experimental results, they demonstrate that it is more outstanding than the Pigeon-Inspired Optimization algorithm, the QUasi-Affine TRansformation Evolutionary algorithm, and particle swarm optimization algorithm. Furthermore, this algorithm shows up minor errors and embodies a much more accurate location.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Publikationsdatum: 2020-06-01
    Beschreibung: In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Publikationsdatum: 2020-06-01
    Beschreibung: The arc generated by breaking the main circuit exacerbates the ablation of the contact, which affects the life of the contactor seriously. By controlling the breaking time of the contactor and making contact break in the optimum time zone are the effective ways to weaken the arc. In this article, the contact movement characteristic is concerned directly in order to control the contact breaking time. A back-to-back double-E alternating current contactor is proposed, and its structural parameters are optimized by particle swarm optimization algorithm. The mathematical model of circuit and magnetic is established. A closed-loop control system based on velocity feedback is proposed. The simulation results show that the designed contactor and the proposed control method are correct, and the actual velocity curve of the contact is consistent with the planned motion curve. It can realize zero-crossing breaking of the main circuit to achieve the effect of no-arc breaking.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Publikationsdatum: 2020-06-01
    Beschreibung: An increase in the quantity and density of antenna elements increases the mismatched failure rate and measurement difficulty of the multiple-input multiple-output. To simplify the measurement method of the S11 parameter utilizing the traditional vector network analyzer, this article proposes a multiple-input multiple-output measurement method based on microwave imaging. The multiple-input multiple-output element was designed, and then the existence of mismatched scattering of the mismatched state through microwave one-dimensional and two-dimensional imaging simulations was verified. A wideband Vivaldi antenna was designed for measurement imaging verification. The research results show that the proposed method is capable of detecting the mismatched scattering of mismatched elements as well as accurately locating the mismatched elements and mismatched position of circuits behind the element, which improves the measurement efficiency.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Publikationsdatum: 2020-06-01
    Beschreibung: With the wide application of microgrid system, fluctuation and randomness are the characteristics of distributed generation output. The traditional energy management system can’t meet the requirements to ensure the security and stability of the grid. The microgrid energy management is of great significance to the stable operation of power grid. In order to obtain higher economic benefits and pay less environmental costs, reasonable scheduling of various distributed power sources is able to achieve this goal. In this article, microgrid energy management including distributed generation is studied. The objective function includes the economic objective and the environmental objective. The model of energy management is considered as a multi-objectives and multi-parametric optimization problem. The multi-parameter dynamic programming is used to optimize the energy management of microgrid. Finally, the efficiency of the proposed method is examined by the simulation studies.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Publikationsdatum: 2020-06-01
    Beschreibung: We propose to perform wearable sensors-based human physical activity recognition. This is further extended to an Internet-of-Things (IoT) platform which is based on a web-based application that integrates wearable sensors, smartphones, and activity recognition. To this end, a smartphone collects the data from wearable sensors and sends it to the server for processing and recognition of the physical activity. We collect a novel data set of 13 physical activities performed both indoor and outdoor. The participants are from both the genders where their number per activity varies. During these activities, the wearable sensors measure various body parameters via accelerometers, gyroscope, magnetometers, pressure, and temperature. These measurements and their statistical are then represented in features vectors that used to train and test supervised machine learning algorithms (classifiers) for activity recognition. On the given data set, we evaluate a number of widely known classifiers such random forests, support vector machine, and many others using the WEKA machine learning suite. Using the default settings of these classifiers in WEKA, we attain the highest overall classification accuracy of 90%. Consequently, such a recognition rate is encouraging, reliable, and effective to be used in the proposed platform.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Publikationsdatum: 2020-06-01
    Beschreibung: The purpose of this work is to develop a new methodology that uses the minimum numbers of strain gauges, strain grids, and measurement channels to calculate the bending moment and torque in a slender circular beam under combined loading from measured strains in it. In general, each independent variable requires a minimum of one independent measurement. Two grids of a single-rosette strain gauge located at 45° and −45° from the longitudinal axis of the beam are used in conjunction with two measurement channels to gather all measurements and form a combined loading transducer. A theoretical set of equations of the new methodology is developed to minimize numbers of strain grids and measurement channels, and an experimental configuration was tested in a variety of scenarios. Calibration factors were independently developed for the bending moment and torque of the beam by separately loading it in their respective directions. These calibration factors were applied to different combined loading scenarios, where errors were found to be on average 1.6% for moment comparison and 6.7% for torque comparison.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Publikationsdatum: 2020-06-01
    Beschreibung: As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Publikationsdatum: 2020-09-01
    Beschreibung: As the key technology for Internet of things, wireless sensor networks have received more attentions in recent years. Mobile localization is one of the significant topics in wireless sensor networks. In wireless sensor network, non-line-of-sight propagation is a common phenomenon leading to the growing non-line-of-sight error. It is a fatal impact for the localization accuracy of the mobile target. In this article, a novel method based on the nearest neighbor variable estimation is proposed to mitigate the non-line-of-sight error. First, the linear regression model of the extended Kalman filter is used to obtain the residual of the distance measurement value. After that, the residual analysis is used to complete the identification of the measurement value state. Then, by analyzing the statistical characteristics of the non-line-of-sight residual, the nearest neighbor variable estimation is proposed to estimate the probability density function of residual. Finally, the improved M-estimation is proposed to locate the mobile robot. Experiment results prove that the accuracy and robustness of the proposed algorithm are better than other methods in the mixed line-of-sight/non-line-of-sight environment. The proposed algorithm effectively inhibits the non-line-of-sight error.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Publikationsdatum: 2020-09-01
    Beschreibung: In the recent past, a significant increase has been observed in the use of underwater wireless sensor networks for aquatic applications. However, underwater wireless sensor networks face several challenges including large propagation delays, high mobility, limited bandwidth, three-dimensional deployments, expensive manufacturing, and energy constraints. It is crucial for underwater wireless sensor networks to mitigate all these limitations primarily caused by the harsh underwater environment. To address some of the pertinent challenges, adaptive hop-by-hop cone vector-based forwarding routing protocol is proposed in this article which is based on the adaptive hop-by-hop vector-based forwarding. The novelty of adaptive hop-by-hop cone vector-based forwarding includes increasing the transmission reliability in sparse sensor regions by changing the base angle of the cone according to the network structure. The number of duplicate packets and end-to-end delay is also reduced because of the reduced base angle and a smart selection criterion for the potential forwarder node. The proposed routing protocol adaptively tunes the height and opening of the cone based on the network structure to effectively improve the performance of the network. Conclusively, this approach significantly reduces energy tax, end-to-end delay, and packet delivery ratio.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Publikationsdatum: 2020-09-01
    Beschreibung: Access points in wireless local area networks are deployed in many indoor environments. Device-free wireless localization systems based on available received signal strength indicators have gained considerable attention recently because they can localize the people using commercial off-the-shelf equipment. Majority of localization algorithms consider two-dimensional models that cause low positioning accuracy. Although three-dimensional localization models are available, they possess high computational and localization errors, given their use of numerous reference points. In this work, we propose a three-dimensional indoor localization system based on a Bayesian graphical model. The proposed model has been tested through experiments based on fingerprinting technique which collects received signal strength indicators from each access point in an offline training phase and then estimates the user location in an online localization phase. Results indicate that the proposed model achieves a high localization accuracy of more than 25% using reference points fewer than that of benchmarked algorithms.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Publikationsdatum: 2020-09-01
    Beschreibung: Wireless sensor network is a hot research topic with massive applications in different domains. Generally, wireless sensor network comprises hundreds to thousands of sensor nodes, which communicate with one another by the use of radio signals. Some of the challenges exist in the design of wireless sensor network are restricted computation power, storage, battery and transmission bandwidth. To resolve these issues, clustering and routing processes have been presented. Clustering and routing processes are considered as an optimization problem in wireless sensor network which can be resolved by the use of swarm intelligence–based approaches. This article presents a novel swarm intelligence–based clustering and multihop routing protocol for wireless sensor network. Initially, improved particle swarm optimization technique is applied for choosing the cluster heads and organizes the clusters proficiently. Then, the grey wolf optimization algorithm–based routing process takes place to select the optimal paths in the network. The presented improved particle swarm optimization–grey wolf optimization approach incorporates the benefits of both the clustering and routing processes which leads to maximum energy efficiency and network lifetime. The proposed model is simulated under an extension set of experimentation, and the results are validated under several measures. The obtained experimental outcome demonstrated the superior characteristics of the improved particle swarm optimization–grey wolf optimization technique under all the test cases.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Publikationsdatum: 2020-08-01
    Beschreibung: Wireless sensor networks form the crux of a wide range of automated applications that are gaining popularity with every passing day. The journey of wireless sensor networks has seen simple sensory monitoring to sensing-processing-actuation based end-to-end applications to the design and deployment of highly sophisticated service-oriented use cases. This highly disruptive field has seen rapid transformations to gain insights and assess the relative merits. Demerits of competing design strategies, it very important to know the evolutionary milestones this technology has undergone in achieving the state-of-the-art in this area. In this article, a systematic review is carried out that captures the evolution of architectural designs and developments in wireless sensor network–based applications. This review delves into the relative pros and cons of various epochs in developments and delineates the future areas of research in wireless sensor network design paradigm.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Publikationsdatum: 2020-08-01
    Beschreibung: Wireless body area network is a promising technology that brings healthcare to a new level of personalization. The applications of wireless body area network are not limited to healthcare monitoring applications but vastly used in entertainment applications. The applications are emerging at a fast pace and attract the attention of researchers. IEEE 802.15.6 provides a communication standard which specifies the physical layer and media access control layer operations for wireless body area networks. A fixed superframe structure is used for handling of heterogeneous traffics of wireless body area networks through pre-defined user priorities. This leads to inefficient use of superframe time duration because of fixed time phases for different types of data traffic. In this article, a novel group-based classification of traffic is introduced to avoid contention and inefficient use of superframe duration. A group-based media access control is developed to adjust the superframe duration according to high priority traffic whereas the rest of the traffic is controlled using node-based buffering. The experimental results showed that the proposed media access control outperformed adaptive beaconing medium access control and priority media access control, in terms of stability period, delay, throughput, transmission loss, and residual energy.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Publikationsdatum: 2020-09-01
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Publikationsdatum: 2020-08-01
    Beschreibung: Recent developments in cloud computing have made it a powerful solution for executing large-scale scientific problems. The complexity of scientific workflows demands efficient utilization of cloud resources to satisfy user requirements. Scheduling of scientific workflows in a cloud environment is a challenge for researchers. The problem is considered as NP-hard. Some constraints such as a heterogeneous environment, dependencies between tasks, quality of service and user deadlines make it difficult for the scheduler to fully utilize available resources. The problem has been extensively studied in the literature. Different researchers have targeted different parameters. This article presents a multi-objective scheduling algorithm for scheduling scientific workflows in cloud computing. The solution is based on genetic algorithm that targets makespan, monetary cost, and load balance. The proposed algorithm first finds the best solution for each parameter. Based on these solutions, the algorithm finds the superbest solution for all parameters. The proposed algorithm is evaluated with benchmark datasets and comparative results with the standard genetic algorithm, particle swarm optimization, and specialized scheduler are presented. The results show that the proposed algorithm achieves an improvement in makespan and reduces the cost with a well load balanced system.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Publikationsdatum: 2020-08-01
    Beschreibung: In wireless sensor networks, sensors are extremely vulnerable to false positive and false negative attacks due to their stringent energy and computational constraints. Several en-route filtering schemes mainly focus on saving energy through early detection of false data within a short distance against these attacks; however, they cannot immediately block the false data injected by compromised nodes. A security scheme uses context-aware architecture for a probabilistic voting–based filtering scheme to detect the compromised nodes and block the injection of false data, unlike security protocols. Although these schemes effectively obstruct the false data forwarding, they cannot make any detour around the compromised node to avoid it during data forwarding. In this article, we propose a discrete event simulation–based energy efficient path determination scheme that takes a detour around the compromised node against the attacks. Our proposed scheme extracts candidate paths considering the network status and selects a path with the highest energy efficiency from among the candidates using discrete event simulation. Simulation results indicate that the proposed scheme provides energy savings of up to 12% while maintaining the security strength against the two attacks compared to the existing schemes.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Publikationsdatum: 2020-07-01
    Beschreibung: Recently, Internet-based devices have evolved into platforms for new networks, with Internet of Things technology being applied in various areas. The expansion of scope of this technology and exchange of real-time information enables users to check their content whenever. The real-time Internet of Things motion detection platform has been developed to detect and monitor users in installed spaces. In this article, the real-time Internet of Things motion detection platform utilizes a non-contact sensor module and motion recovery printed circuit board module to quickly respond to emergency situations through real-time monitoring. This is visualized on the display by sending data extracted from the motion recovery printed circuit board module combined with open source hardware by the non-contact sensor module receiving information from smartphone users. The administrator’s display continuously analyzes real-time moving objects by detecting them with respect to location coordinates and providing automatically recognized data to the cloud server. In addition, real-time Internet of Things motion detection monitoring system was configured to quickly respond to real-time alerts and effectively manage problems. Therefore, installing real-time Internet of Things motion detection platform at an actual site will enable quick resolving of emergency situations through information provision and user awareness monitoring.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Publikationsdatum: 2020-09-01
    Beschreibung: In an IEEE 802.11 Distributed Coordination Function–based wireless network with multiple hops, a node operates on its own with several predefined data rates (i.e. following modulation and coding schemes). Moreover, the IEEE 802.11 Distributed Coordination Function node’s communication is characterized by transmission and carrier-sensing distances. The transmission one is, in general, reverse proportional to the data rate. Meanwhile, the carrier distance keeps constant regardless of the modulation and coding scheme. Therefore, when a node has a high transmission rate, within its carrier-sensing range, the number of nodes may increase. The previous works have not yet extensively investigated the impact of data rates on such a scenario. This article addresses that issue aiming to quantify the network performance of the multi-hop IEEE 802.11 networks. As a solution, we propose the mathematical expressions, which consider data rates, for end-to-end throughputs, as well as delays in the network with string topology. We confirm the expressions’ correctness by presenting the quantitative agreements between the analytical and simulation results.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Publikationsdatum: 2020-09-01
    Beschreibung: With the rapid development of cloud computing, an increasing number of data owners are willing to employ cloud storage service. In cloud storage, the resource-constraint data owners can outsource their large-scale data to the remote cloud server, by which they can greatly reduce local storage overhead and computation cost. Despite plenty of attractive advantages, cloud storage inevitably suffers from some new security challenges due to the separation of outsourced data ownership and its management, such as secure data insertion and deletion. The cloud server may maliciously reserve some data copies and return a wrong deletion result to cheat the data owner. Moreover, it is very difficult for the data owner to securely insert some new data blocks into the outsourced data set. To solve the above two problems, we adopt the primitive of Merkle sum hash tree to design a novel publicly verifiable cloud data deletion scheme, which can also simultaneously achieve provable data storage and dynamic data insertion. Moreover, an interesting property of our proposed scheme is that it can satisfy private and public verifiability without requiring any trusted third party. Furthermore, we formally prove that our proposed scheme not only can achieve the desired security properties, but also can realize the high efficiency and practicality.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Publikationsdatum: 2020-10-01
    Beschreibung: In the context of smart home, it is very important to identify usage patterns of Internet of things (IoT) devices. Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. This article describes a method for mining implicit correlations among the actions of IoT devices through embedded associative analysis. Based on support, confidence, and lift metrics, our proposed method identifies the most relevant correlations between a pair of actions of different IoT devices and suggests the integration between them through hypertext transfer protocol requests. We have compared our proposed method with a centralized method. Experimental results show that the most relevant rules for both methods are the same in 99.75% of cases. Moreover, our proposed method was able to identify relevant correlations that were not identified by the centralized one. Thus, we show that associative analysis of IoT device state change is efficient to provide an intelligent and highly integrated IoT platform while avoiding the single point of failure problem.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Publikationsdatum: 2020-10-01
    Beschreibung: Internet of things have emerged enough due to its applications in a wide range of fields such as governance, industry, healthcare, and smart environments (home, smart, cities, and so on). Internet of things–based networks connect smart devices ubiquitously. In such scenario, the role of wireless sensor networks becomes vital in order to enhance the ubiquity of the Internet of things devices with lower cost and easy deployment. The sensor nodes are limited in terms of energy storage, processing, and data storage capabilities, while their radio frequencies are very sensitive to noise and interference. These factors consequently threaten the energy consumption, lifetime, and throughput of network. One way to cope with energy consumption issue is energy harvesting techniques used in wireless sensor network–based Internet of things. However, some recent studies addressed the problems of clustering and routing in energy harvesting wireless sensor networks which either concentrate on energy efficiency or quality of service. There is a need of an adequate approach that can perform efficiently in terms of energy utilization as well as to ensure the quality of service. In this article, a novel protocol named energy-efficient multi-attribute-based clustering scheme (E2-MACH) is proposed which addresses the energy efficiency and communication reliability. It uses selection criteria of reliable cluster head based on a weighted function defined by multiple attributes such as link statistics, neighborhood density, current residual energy, and the rate of energy harvesting of nodes. The consideration of such parameters in cluster head selection helps to preserve the node’s energy and reduce its consumption by sending data over links possessing better signal-to-noise ratio and hence ensure minimum packet loss. The minimized packet loss ratio contributes toward enhanced network throughput, energy consumption, and lifetime with better service availability for Internet of things applications. A set of experiments using network simulator 2 revealed that our proposed approach outperforms the state-of-the-art low-energy adaptive clustering hierarchy and other recent protocols in terms of first-node death, overall energy consumption, and network throughput.
    Print ISSN: 1550-1329
    Digitale ISSN: 1550-1477
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik
    Publiziert von Sage Publications
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...