首页 > 最新文献

Journal of Sensor and Actuator Networks最新文献

英文 中文
A Salinity-Impact Analysis of Polarization Division Multiplexing-Based Underwater Optical Wireless Communication System with High-Speed Data Transmission 基于偏振分复用的水下高速数据传输光无线通信系统盐度影响分析
Q1 Mathematics Pub Date : 2023-10-07 DOI: 10.3390/jsan12050072
Sushank Chaudhary, Abhishek Sharma, Sunita Khichar, Shashi Shah, Rizwan Ullah, Amir Parnianifard, Lunchakorn Wuttisittikulkij
The majority of the Earth’s surface is covered by water, with oceans holding approximately 97% of this water and serving as the lifeblood of our planet. These oceans are essential for various purposes, including transportation, sustenance, and communication. However, establishing effective communication networks between the numerous sub-islands present in many parts of the world poses significant challenges. Underwater optical wireless communication, or UWOC, can indeed be an excellent solution to provide seamless connectivity underwater. UWOC holds immense significance due to its ability to transmit data at high rates, low latency, and enhanced security. In this work, we propose polarization division multiplexing-based UWOC system under the impact of salinity with an on–off keying (OOK) modulation format. The proposed system aims to establish high-speed network connectivity between underwater divers/submarines in oceans at different salinity levels. The numerical simulation results demonstrate the effectiveness of our proposed system with a 2 Gbps data rate up to 10.5 m range in freshwater and up to 1.8 m in oceanic waters with salinity up to 35 ppt. Successful transmission of high-speed data is reported in underwater optical wireless communication, especially where salinity impact is higher.
地球表面的大部分被水覆盖,海洋拥有大约97%的水,是我们星球的命脉。这些海洋对各种目的都是必不可少的,包括运输、食物和通讯。然而,在世界许多地方的众多子岛屿之间建立有效的通信网络构成了重大挑战。水下光学无线通信(UWOC)确实是提供水下无缝连接的绝佳解决方案。UWOC具有巨大的意义,因为它能够以高速率、低延迟和增强的安全性传输数据。在这项工作中,我们提出了一种开关键控(OOK)调制格式的基于极化分复用的盐度影响下的UWOC系统。该系统旨在在不同盐度水平的海洋中建立水下潜水员/潜艇之间的高速网络连接。数值模拟结果证明了我们提出的系统的有效性,在淡水中数据速率为2 Gbps,可达10.5 m范围,在盐度高达35 ppt的海水中可达1.8 m范围。据报道,水下无线光通信中高速数据传输成功,特别是在盐度影响较大的情况下。
{"title":"A Salinity-Impact Analysis of Polarization Division Multiplexing-Based Underwater Optical Wireless Communication System with High-Speed Data Transmission","authors":"Sushank Chaudhary, Abhishek Sharma, Sunita Khichar, Shashi Shah, Rizwan Ullah, Amir Parnianifard, Lunchakorn Wuttisittikulkij","doi":"10.3390/jsan12050072","DOIUrl":"https://doi.org/10.3390/jsan12050072","url":null,"abstract":"The majority of the Earth’s surface is covered by water, with oceans holding approximately 97% of this water and serving as the lifeblood of our planet. These oceans are essential for various purposes, including transportation, sustenance, and communication. However, establishing effective communication networks between the numerous sub-islands present in many parts of the world poses significant challenges. Underwater optical wireless communication, or UWOC, can indeed be an excellent solution to provide seamless connectivity underwater. UWOC holds immense significance due to its ability to transmit data at high rates, low latency, and enhanced security. In this work, we propose polarization division multiplexing-based UWOC system under the impact of salinity with an on–off keying (OOK) modulation format. The proposed system aims to establish high-speed network connectivity between underwater divers/submarines in oceans at different salinity levels. The numerical simulation results demonstrate the effectiveness of our proposed system with a 2 Gbps data rate up to 10.5 m range in freshwater and up to 1.8 m in oceanic waters with salinity up to 35 ppt. Successful transmission of high-speed data is reported in underwater optical wireless communication, especially where salinity impact is higher.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135300581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Online Method for Supporting and Monitoring Repetitive Physical Activities Based on Restricted Boltzmann Machines 基于受限玻尔兹曼机的重复性体力活动在线支持与监测方法
Q1 Mathematics Pub Date : 2023-09-22 DOI: 10.3390/jsan12050070
Marcio Alencar, Raimundo Barreto, Eduardo Souto, Horacio Oliveira
Human activity recognition has been widely used to monitor users during physical activities. By embedding a pre-trained model into wearable devices with an inertial measurement unit, it is possible to identify the activity being executed, count steps and activity duration time, and even predict when the user should hydrate himself. Despite these interesting applications, these approaches are limited by a set of pre-trained activities, making them unable to learn new human activities. In this paper, we introduce a novel approach for generating runtime models to give the users feedback that helps them to correctly perform repetitive physical activities. To perform a distributed analysis, the methodology focuses on applying the proposed method to each specific body segment. The method adopts the Restricted Boltzmann Machine to learn the patterns of repetitive physical activities and, at the same time, provides suggestions for adjustments if the repetition is not consistent with the model. The learning and the suggestions are both based on inertial measurement data mainly considering movement acceleration and amplitude. The results show that by applying the model’s suggestions to the evaluation data, the adjusted output was up to 3.68x more similar to the expected movement than the original data.
人体活动识别已被广泛应用于监测用户的身体活动。通过将预先训练好的模型嵌入到带有惯性测量单元的可穿戴设备中,可以识别正在执行的活动,计算步数和活动持续时间,甚至可以预测用户何时应该补水。尽管有这些有趣的应用,但这些方法受到一组预先训练的活动的限制,使它们无法学习新的人类活动。在本文中,我们介绍了一种新的方法来生成运行时模型,为用户提供反馈,帮助他们正确执行重复的物理活动。为了执行分布式分析,该方法侧重于将所提出的方法应用于每个特定的身体部分。该方法采用受限玻尔兹曼机学习重复性体力活动的模式,同时在重复与模型不一致的情况下提供调整建议。学习和建议都是基于惯性测量数据,主要考虑运动加速度和振幅。结果表明,将模型建议应用于评价数据后,调整后的输出与预期运动的相似度比原始数据高3.68倍。
{"title":"An Online Method for Supporting and Monitoring Repetitive Physical Activities Based on Restricted Boltzmann Machines","authors":"Marcio Alencar, Raimundo Barreto, Eduardo Souto, Horacio Oliveira","doi":"10.3390/jsan12050070","DOIUrl":"https://doi.org/10.3390/jsan12050070","url":null,"abstract":"Human activity recognition has been widely used to monitor users during physical activities. By embedding a pre-trained model into wearable devices with an inertial measurement unit, it is possible to identify the activity being executed, count steps and activity duration time, and even predict when the user should hydrate himself. Despite these interesting applications, these approaches are limited by a set of pre-trained activities, making them unable to learn new human activities. In this paper, we introduce a novel approach for generating runtime models to give the users feedback that helps them to correctly perform repetitive physical activities. To perform a distributed analysis, the methodology focuses on applying the proposed method to each specific body segment. The method adopts the Restricted Boltzmann Machine to learn the patterns of repetitive physical activities and, at the same time, provides suggestions for adjustments if the repetition is not consistent with the model. The learning and the suggestions are both based on inertial measurement data mainly considering movement acceleration and amplitude. The results show that by applying the model’s suggestions to the evaluation data, the adjusted output was up to 3.68x more similar to the expected movement than the original data.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136094261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quad-Port Nature-Inspired Lotus-Shaped Wideband Terahertz Antenna for Wireless Applications 用于无线应用的四端口自然启发莲花形宽带太赫兹天线
Q1 Mathematics Pub Date : 2023-09-21 DOI: 10.3390/jsan12050069
Jeenal Raghunathan, Praveen Kumar, Tanweer Ali, Pradeep Kumar, Parveez Shariff Bhadrvathi Ghouse, Sameena Pathan
This article is aimed at designing an inventive compact-size quad-port antenna that can be operated within terahertz (THz) frequency spectra for a 6G high-speed wireless communication link. The single-element antenna comprises a lotus-petal-like radiating patch and a defected ground structure (DGS) on a 20 × 20 × 2 µm3 polyamide substrate and is designed to operate within the 8.96–13.5 THz frequency range. The THz antenna is deployed for a two-port MIMO configuration having a size of 46 × 20 × 2 µm3 with interelement separation of less than a quarter-wavelength of 0.18λ (λ at 9 THz). The two-port configuration operates in the 9–13.25 THz frequency range, with better than −25 dB isolation. Further, the two-port THz antenna is mirrored vertically with a separation of 0.5λ to form the four-port MIMO configuration. The proposed four-port THz antenna has dimensions of 46 × 46 × 2 µm3 and operates in the frequency range of 9–13 THz. Isolation improvement better than −25 dB is realized by incorporating parasitic elements onto the ground plane. Performance analysis of the proposed antenna in terms of MIMO diversity parameters, viz., envelope correlation coefficient (ECC) < 0.05, diversity gain (DG) ≈ 10, mean effective gain (MEG) < −3 dB, total active reflection coefficient (TARC) < −10 dB, channel capacity loss (CCL) < 0.3 bps/Hz, and multiplexing efficiency (ME) < 0 dB, is performed to justify the appropriateness of the proposed antenna for MIMO applications. The antenna has virtuous radiation properties with good gain, which is crucial for any wireless communication system, especially for the THz communication network.
本文旨在为6G高速无线通信链路设计一种可在太赫兹(THz)频谱范围内工作的创新型紧凑型四端口天线。单元件天线在20 × 20 × 2µm3聚酰胺衬底上包含一个莲花花瓣状辐射贴片和一个缺陷地结构(DGS),设计工作在8.96-13.5 THz频率范围内。太赫兹天线用于双端口MIMO配置,尺寸为46 × 20 × 2µm3,元件间分离小于四分之一波长0.18λ (λ在9太赫兹)。双端口配置工作在9-13.25 THz频率范围内,具有优于- 25 dB的隔离。此外,双端口太赫兹天线以0.5λ的间隔垂直镜像,形成四端口MIMO配置。提出的四端口太赫兹天线尺寸为46 × 46 × 2µm3,工作频率范围为9-13太赫兹。通过在地平面上加入寄生元件,实现了优于- 25 dB的隔离。基于MIMO分集参数的天线性能分析,即包络相关系数(ECC) <0.05,多样性增益(DG)≈10,平均有效增益(MEG) <−3db,总主动反射系数(TARC) <−10db,信道容量损失(CCL) <0.3 bps/Hz,复用效率(ME) <0 dB,以证明所提出的天线适合MIMO应用。该天线具有良好的辐射特性和良好的增益,这对于任何无线通信系统,特别是太赫兹通信网络都是至关重要的。
{"title":"A Quad-Port Nature-Inspired Lotus-Shaped Wideband Terahertz Antenna for Wireless Applications","authors":"Jeenal Raghunathan, Praveen Kumar, Tanweer Ali, Pradeep Kumar, Parveez Shariff Bhadrvathi Ghouse, Sameena Pathan","doi":"10.3390/jsan12050069","DOIUrl":"https://doi.org/10.3390/jsan12050069","url":null,"abstract":"This article is aimed at designing an inventive compact-size quad-port antenna that can be operated within terahertz (THz) frequency spectra for a 6G high-speed wireless communication link. The single-element antenna comprises a lotus-petal-like radiating patch and a defected ground structure (DGS) on a 20 × 20 × 2 µm3 polyamide substrate and is designed to operate within the 8.96–13.5 THz frequency range. The THz antenna is deployed for a two-port MIMO configuration having a size of 46 × 20 × 2 µm3 with interelement separation of less than a quarter-wavelength of 0.18λ (λ at 9 THz). The two-port configuration operates in the 9–13.25 THz frequency range, with better than −25 dB isolation. Further, the two-port THz antenna is mirrored vertically with a separation of 0.5λ to form the four-port MIMO configuration. The proposed four-port THz antenna has dimensions of 46 × 46 × 2 µm3 and operates in the frequency range of 9–13 THz. Isolation improvement better than −25 dB is realized by incorporating parasitic elements onto the ground plane. Performance analysis of the proposed antenna in terms of MIMO diversity parameters, viz., envelope correlation coefficient (ECC) < 0.05, diversity gain (DG) ≈ 10, mean effective gain (MEG) < −3 dB, total active reflection coefficient (TARC) < −10 dB, channel capacity loss (CCL) < 0.3 bps/Hz, and multiplexing efficiency (ME) < 0 dB, is performed to justify the appropriateness of the proposed antenna for MIMO applications. The antenna has virtuous radiation properties with good gain, which is crucial for any wireless communication system, especially for the THz communication network.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Agent Intrusion Detection System Optimized by a Deep Reinforcement Learning Approach with a Dataset Enlarged Using a Generative Model to Reduce the Bias Effect 基于深度强化学习优化的多智能体入侵检测系统,并使用生成模型扩大数据集以减少偏差效应
Q1 Mathematics Pub Date : 2023-09-18 DOI: 10.3390/jsan12050068
Matthieu Mouyart, Guilherme Medeiros Machado, Jae-Yun Jun
Intrusion detection systems can defectively perform when they are adjusted with datasets that are unbalanced in terms of attack data and non-attack data. Most datasets contain more non-attack data than attack data, and this circumstance can introduce biases in intrusion detection systems, making them vulnerable to cyberattacks. As an approach to remedy this issue, we considered the Conditional Tabular Generative Adversarial Network (CTGAN), with its hyperparameters optimized using the tree-structured Parzen estimator (TPE), to balance an insider threat tabular dataset called the CMU-CERT, which is formed by discrete-value and continuous-value columns. We showed through this method that the mean absolute errors between the probability mass functions (PMFs) of the actual data and the PMFs of the data generated using the CTGAN can be relatively small. Then, from the optimized CTGAN, we generated synthetic insider threat data and combined them with the actual ones to balance the original dataset. We used the resulting dataset for an intrusion detection system implemented with the Adversarial Environment Reinforcement Learning (AE-RL) algorithm in a multi-agent framework formed by an attacker and a defender. We showed that the performance of detecting intrusions using the framework of the CTGAN and the AE-RL is significantly improved with respect to the case where the dataset is not balanced, giving an F1-score of 0.7617.
当入侵检测系统被攻击数据和非攻击数据不平衡的数据集所调整时,入侵检测系统的性能会出现缺陷。大多数数据集包含的非攻击数据比攻击数据多,这种情况会给入侵检测系统带来偏差,使它们容易受到网络攻击。作为解决这个问题的方法,我们考虑了条件表格生成对抗网络(CTGAN),其超参数使用树结构Parzen估计器(TPE)进行优化,以平衡内部威胁表格数据集CMU-CERT,该数据集由离散值列和连续值列组成。我们通过这种方法证明了实际数据的概率质量函数(PMFs)与使用CTGAN生成的数据的PMFs之间的平均绝对误差可以相对较小。然后,从优化后的CTGAN中生成合成的内部威胁数据,并将其与实际数据相结合,平衡原始数据集。我们将结果数据集用于在由攻击者和防御者组成的多代理框架中使用对抗环境强化学习(AE-RL)算法实现的入侵检测系统。我们发现,在数据集不平衡的情况下,使用CTGAN和AE-RL框架检测入侵的性能显着提高,f1得分为0.7617。
{"title":"A Multi-Agent Intrusion Detection System Optimized by a Deep Reinforcement Learning Approach with a Dataset Enlarged Using a Generative Model to Reduce the Bias Effect","authors":"Matthieu Mouyart, Guilherme Medeiros Machado, Jae-Yun Jun","doi":"10.3390/jsan12050068","DOIUrl":"https://doi.org/10.3390/jsan12050068","url":null,"abstract":"Intrusion detection systems can defectively perform when they are adjusted with datasets that are unbalanced in terms of attack data and non-attack data. Most datasets contain more non-attack data than attack data, and this circumstance can introduce biases in intrusion detection systems, making them vulnerable to cyberattacks. As an approach to remedy this issue, we considered the Conditional Tabular Generative Adversarial Network (CTGAN), with its hyperparameters optimized using the tree-structured Parzen estimator (TPE), to balance an insider threat tabular dataset called the CMU-CERT, which is formed by discrete-value and continuous-value columns. We showed through this method that the mean absolute errors between the probability mass functions (PMFs) of the actual data and the PMFs of the data generated using the CTGAN can be relatively small. Then, from the optimized CTGAN, we generated synthetic insider threat data and combined them with the actual ones to balance the original dataset. We used the resulting dataset for an intrusion detection system implemented with the Adversarial Environment Reinforcement Learning (AE-RL) algorithm in a multi-agent framework formed by an attacker and a defender. We showed that the performance of detecting intrusions using the framework of the CTGAN and the AE-RL is significantly improved with respect to the case where the dataset is not balanced, giving an F1-score of 0.7617.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135202441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems 基于决策树交叉验证的递归特征消除:基于机器学习的入侵检测系统特征选择方法
Q1 Mathematics Pub Date : 2023-09-18 DOI: 10.3390/jsan12050067
Mohammed Awad, Salam Fraihat
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time detection systems relies on several factors, including the number of features utilized to make a prediction. Thus, minimizing them is crucial as it implies faster prediction and lower storage space. This paper utilizes recursive feature elimination with cross-validation using a decision tree model as an estimator (DT-RFECV) to select an optimal subset of 15 of UNSW-NB15’s 42 features and evaluates them using several ML classifiers, including tree-based ones, such as random forest. The proposed NIDS exhibits an accurate prediction model for network flow with a binary classification accuracy of 95.30% compared to 95.56% when using the entire feature set. The reported scores are comparable to those attained by the state-of-the-art systems despite decreasing the number of utilized features by about 65%.
近年来,针对物联网(IoT)网络的网络攻击频率显著增加。基于异常的网络入侵检测系统(nids)通过检测和报告臭名昭著的零日攻击提供了额外的网络保护层。然而,实时检测系统的效率取决于几个因素,包括用于预测的特征数量。因此,最小化它们是至关重要的,因为这意味着更快的预测和更低的存储空间。本文利用递归特征消除和交叉验证,使用决策树模型作为估计器(DT-RFECV),从UNSW-NB15的42个特征中选择15个最优子集,并使用几个ML分类器(包括基于树的分类器,如随机森林)对它们进行评估。所提出的NIDS展示了一个准确的网络流量预测模型,与使用整个特征集时的95.56%相比,其二值分类准确率为95.30%。报告的分数与最先进的系统所获得的分数相当,尽管使用的特征数量减少了约65%。
{"title":"Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems","authors":"Mohammed Awad, Salam Fraihat","doi":"10.3390/jsan12050067","DOIUrl":"https://doi.org/10.3390/jsan12050067","url":null,"abstract":"The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time detection systems relies on several factors, including the number of features utilized to make a prediction. Thus, minimizing them is crucial as it implies faster prediction and lower storage space. This paper utilizes recursive feature elimination with cross-validation using a decision tree model as an estimator (DT-RFECV) to select an optimal subset of 15 of UNSW-NB15’s 42 features and evaluates them using several ML classifiers, including tree-based ones, such as random forest. The proposed NIDS exhibits an accurate prediction model for network flow with a binary classification accuracy of 95.30% compared to 95.56% when using the entire feature set. The reported scores are comparable to those attained by the state-of-the-art systems despite decreasing the number of utilized features by about 65%.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135109997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Output-Based Dynamic Periodic Event-Triggered Control with Application to the Tunnel Diode System 基于输出的动态周期事件触发控制及其在隧道二极管系统中的应用
Q1 Mathematics Pub Date : 2023-09-14 DOI: 10.3390/jsan12050066
Mahmoud Abdelrahim, Dhafer Almakhles
The integration of communication channels with the feedback loop in a networked control system (NCS) is attractive for many applications. A major challenge in the NCS is to reduce transmissions over the network between the sensors, the controller, and the actuators to avoid network congestion. An efficient approach to achieving this goal is the event-triggered implementation where the control actions are only updated when necessary from stability/performance perspectives. In particular, periodic event-triggered control (PETC) has garnered recent attention because of its practical implementation advantages. This paper focuses on the design of stabilizing PETC for linear time-invariant systems. It is assumed that the plant state is partially known; the feedback signal is sent to the controller at discrete-time instants via a digital channel; and an event-triggered controller is synthesized, solely based on the available plant measurement. The constructed event-triggering law is novel and only verified at periodic time instants; it is more adapted to practical implementations. The proposed approach ensures a global asymptotic stability property for the closed-loop system under mild conditions. The overall model is developed as a hybrid dynamical system to truly describe the mixed continuous-time and discrete-time dynamics. The stability is studied using appropriate Lyapunov functions. The efficiency of the technique is illustrated in the dynamic model of the tunnel diode system.
在网络控制系统(NCS)中,通信信道与反馈回路的集成具有广泛的应用前景。NCS的一个主要挑战是减少传感器、控制器和执行器之间的网络传输,以避免网络拥塞。实现这一目标的有效方法是事件触发实现,从稳定性/性能的角度来看,控制操作仅在必要时更新。特别是,周期性事件触发控制(PETC)由于其实际实现的优势而引起了人们的关注。本文主要研究线性定常系统的稳定PETC的设计。假设植物状态是部分已知的;反馈信号在离散时刻通过数字通道发送到控制器;并合成了一个事件触发控制器,仅基于可用的工厂测量。所构建的事件触发律是新颖的,且仅在周期时间瞬间得到验证;它更适合于实际实现。该方法保证了在温和条件下闭环系统的全局渐近稳定性。为了真实地描述连续时间和离散时间的混合动力学,将整个模型发展为一个混合动力系统。利用适当的李雅普诺夫函数研究了其稳定性。隧道二极管系统的动力学模型说明了该技术的有效性。
{"title":"Output-Based Dynamic Periodic Event-Triggered Control with Application to the Tunnel Diode System","authors":"Mahmoud Abdelrahim, Dhafer Almakhles","doi":"10.3390/jsan12050066","DOIUrl":"https://doi.org/10.3390/jsan12050066","url":null,"abstract":"The integration of communication channels with the feedback loop in a networked control system (NCS) is attractive for many applications. A major challenge in the NCS is to reduce transmissions over the network between the sensors, the controller, and the actuators to avoid network congestion. An efficient approach to achieving this goal is the event-triggered implementation where the control actions are only updated when necessary from stability/performance perspectives. In particular, periodic event-triggered control (PETC) has garnered recent attention because of its practical implementation advantages. This paper focuses on the design of stabilizing PETC for linear time-invariant systems. It is assumed that the plant state is partially known; the feedback signal is sent to the controller at discrete-time instants via a digital channel; and an event-triggered controller is synthesized, solely based on the available plant measurement. The constructed event-triggering law is novel and only verified at periodic time instants; it is more adapted to practical implementations. The proposed approach ensures a global asymptotic stability property for the closed-loop system under mild conditions. The overall model is developed as a hybrid dynamical system to truly describe the mixed continuous-time and discrete-time dynamics. The stability is studied using appropriate Lyapunov functions. The efficiency of the technique is illustrated in the dynamic model of the tunnel diode system.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134914136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management 支持vnf的5G网络编排框架,用于切片创建、隔离和管理
Q1 Mathematics Pub Date : 2023-09-13 DOI: 10.3390/jsan12050065
Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra
Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.
网络切片被广泛认为是5G网络中为不同用户需求分配网络资源的最关键技术。软件定义网络(SDN)和网络功能虚拟化(NFV)是根据用例对物理基础设施进行切片的两种广泛使用的策略。通过最优资源分配算法的应用,实现了虚拟网络的最有效利用。大量关于5G网络资源分配的研究论文集中在网络切片或切片网络的最佳资源分配上。本研究使用网络切片和最优资源分配来实现基于需求的网络切片的性能优化。提出的方法包括三个阶段:(1)通过机器学习方法(SCML)创建片,(2)通过多标准决策方法对请求进行资源分配(SIRA)的片隔离,以及(3)通过资源转移(SMART)进行片管理。我们从用户那里收到一组网络服务请求(nsr)。收到nsr后,使用SCML组成分片,并使用SIRA和SMART为这些分片分配资源。准确测量可接受率和资源效率有助于提高整体性能。仿真结果表明,SMART方案可以根据测试条件动态改变资源分配。针对一系列网络情况和网络服务请求(nsr),研究了性能效益。模拟的结果与文献的结果进行了比较,以说明所提出工作的有用性。
{"title":"VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management","authors":"Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra","doi":"10.3390/jsan12050065","DOIUrl":"https://doi.org/10.3390/jsan12050065","url":null,"abstract":"Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135742074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations 事件触发实现下双馈风力发电机组输出反馈镇定
Q1 Mathematics Pub Date : 2023-09-12 DOI: 10.3390/jsan12050064
Mahmoud Abdelrahim, Dhafer Almakhles
The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions.
本文研究了风力发电机组双馈感应发电机对外界扰动的鲁棒镇定问题。假设风力涡轮机的角速度只能通过网络以离散时间方式测量并发送给控制器。为了生成采样时间,开发了三种不同的触发机制:时间触发机制、静态事件触发机制和动态事件触发机制;此外,还对这些方法进行了性能比较。设计方法基于仿真,首先在连续时间内稳定对象,然后基于线性二次高斯调节器(LQG)方法构建鲁棒反馈律。然后,考虑网络的影响,建立事件触发机制,通过时间正则化来保持闭环稳定性,避免芝诺现象。将必要的稳定性约束框架化为线性矩阵不等式,并将整个系统建模为混合动力系统。通过数值仿真验证了该控制策略的有效性。结果表明,与周期性采样相比,事件触发机制在传输中显著降低了约50%。与现有方法的数值比较表明,该方法在稳定性保证和传输次数方面具有更好的性能。
{"title":"Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations","authors":"Mahmoud Abdelrahim, Dhafer Almakhles","doi":"10.3390/jsan12050064","DOIUrl":"https://doi.org/10.3390/jsan12050064","url":null,"abstract":"The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135827675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Binaural System (RBS) for Noise Acoustic Monitoring 用于噪声监测的远程双耳系统(RBS)
IF 3.5 Q1 Mathematics Pub Date : 2023-08-14 DOI: 10.3390/jsan12040063
Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.
最近出现的云计算、人工智能和数据科学等先进信息技术改进和优化了声学中的各种过程,具有潜在的现实应用。大型地形上的噪声监测任务可以使用一系列声级计进行捕捉。然而,当前的监测系统只依赖于与捕获信号的声能相关的奇异测量值的知识,而忽略了补充人类对噪声感知的空间方面。该项目提出了一个根据人类主观感知进行双耳测量的系统。介绍了消声室内的声学特性,以及最初在短时间内在现场获得的声学指标。这项工作的主要贡献是构建了一个类似人类头部的双耳原型,该原型在云上传输和处理声学数据。以上允许通过双耳听力而不是单一捕获设备来监测噪声水平。同样,可以强调的是,该系统允许基于耳间互相关函数(IACF)获得空间声学指示符,以及检测源在方位平面上的位置。
{"title":"Remote Binaural System (RBS) for Noise Acoustic Monitoring","authors":"Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio","doi":"10.3390/jsan12040063","DOIUrl":"https://doi.org/10.3390/jsan12040063","url":null,"abstract":"The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47940198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Hidden Authentication Factors from Possessive Information 从占有信息中提取隐藏的认证因素
IF 3.5 Q1 Mathematics Pub Date : 2023-08-11 DOI: 10.3390/jsan12040062
Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.
智能手机已经成为一种无处不在的个人小工具,可以作为个人重要个人数据的存储库。因此,被归类为生物识别技术的生理和行为特征都被用于身份验证系统,以保护保存在智能手机上的数据免受未经授权的访问。已经开发了许多身份验证技术;然而,一些身份验证变量在面对外部影响或身体损伤时表现出不稳定性。身份验证系统的潜在故障可能归因于几种不可预测的情况。这项研究表明,在个人的一生中使用独特和一致的元素可以用来开发身份验证分类模型。该模型将基于流行的个人行为生物特征,并且可以很容易地在安全认证系统中实现。在数据输入过程中,从个人的打字能力中获得的生物生物特征包括他们的姓名、姓氏、电子邮件和电话号码。因此,可以建立和使用一种基于生物特征的安全系统,该系统可以在个人一生中持续使用,而无需明确依赖智能手机设备的功能。实验结果表明,使用移动触摸屏作为所提出的验证机制的基础,有望成为一种高精度的身份验证解决方案。
{"title":"Extraction of Hidden Authentication Factors from Possessive Information","authors":"Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol","doi":"10.3390/jsan12040062","DOIUrl":"https://doi.org/10.3390/jsan12040062","url":null,"abstract":"Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":null,"pages":null},"PeriodicalIF":3.5,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47708758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Sensor and Actuator Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1