Massive smart water conservancy object (WCO) need to be connected for real-time monitoring and control, which produces massive data. Unfortunately, heterogeneous data structures and semantics lead to low interoperability between WCO and management systems. To address this challenge, we propose a novel interoperability structure for a smart water conservancy system based on the Internet of Things (IoT), and the key design includes a smart WCO terminal, interoperability network, special interoperability protocol, WCO information model, and cloud platform. Universal terminal and network are the base of interoperability hardware, and special interoperability protocol and information model for interconnection of WCO are designed for smart water conservancy management system. WCO can be connected to a water conservancy Big Data processing cloud platform for interoperability applications. The application results demonstrate that our proposed WCO’s interoperability structure has obvious advantages than the general IoT at WCO interoperability. The interoperability protocol is reliable, the information model can ease interoperability and security, and the semantic dictionary is very rich and covers all semantic services of WCO.
{"title":"Interoperability Structure of Smart Water Conservancy Based on Internet of Things","authors":"SongSong Wang, Ouguan Xu","doi":"10.1155/2024/7724783","DOIUrl":"https://doi.org/10.1155/2024/7724783","url":null,"abstract":"Massive smart water conservancy object (WCO) need to be connected for real-time monitoring and control, which produces massive data. Unfortunately, heterogeneous data structures and semantics lead to low interoperability between WCO and management systems. To address this challenge, we propose a novel interoperability structure for a smart water conservancy system based on the Internet of Things (IoT), and the key design includes a smart WCO terminal, interoperability network, special interoperability protocol, WCO information model, and cloud platform. Universal terminal and network are the base of interoperability hardware, and special interoperability protocol and information model for interconnection of WCO are designed for smart water conservancy management system. WCO can be connected to a water conservancy Big Data processing cloud platform for interoperability applications. The application results demonstrate that our proposed WCO’s interoperability structure has obvious advantages than the general IoT at WCO interoperability. The interoperability protocol is reliable, the information model can ease interoperability and security, and the semantic dictionary is very rich and covers all semantic services of WCO.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan
The splendid technological inventions supersede many traditional agricultural monitoring systems. In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. One such hazard to cotton storage is spontaneous combustion, a process by which an element having comparatively low ignition temperature (hay, straw, peat, etc.) starts to relieve heat. In the presence of spontaneous combustion and lack of oxygen, if cotton catches any sparks from bales or physicochemical heat to ignite, the combustion can convert in to smoldering, and it can last up to several days without being discovered. Consequently, the actual fire occurs, cotton silently smoldering which not only affects cotton quality but also became the reason of big fire event. Many researchers propose valuable tools and techniques based on laboratory methods and modern techniques as well for detection and prevention of security hazards in storages. However, there is no standalone efficient tool/technique to monitor the storage area for spontaneous combustion. In current research, we propose an efficient wireless sensor network (WSN) and machine learning- (ML-) based storage area monitoring system for early prediction of spontaneous combustion in the cotton storage area. The WSN is used to collect real-time values from storage field by different combinations of sensors and send this over the network, where data is processed to identify spontaneous combustion and distribute the prediction results to the end user. The real-time data collection and ML-based analysis make the system efficient and reliable. The efficiency of the current system is verified by presenting two groups of cotton stored with different conditions. The results showed that the proposed system is able to detect spontaneous combustion well in time with a 95% accuracy rate.
辉煌的技术发明取代了许多传统的农业监测系统。在过去的十年中,人们提出了各种新技术和新工具来监测储藏区,从而为不同作物提供更安全可靠的储藏。所谓储藏区监控,是指检查和避免火灾危险,而其他许多危险也需要关注。自燃是棉花储存过程中的一种危险,自燃是指点火温度相对较低的元素(干草、稻草、泥炭等)开始释放热量的过程。在自燃和缺氧的情况下,如果棉花从棉包或物理化学热中产生火花而被点燃,燃烧就会转化为燃烧,并可持续数天而不被发现。因此,在实际火灾发生时,棉花默默地燃烧不仅会影响棉花质量,还会成为大火的原因。许多研究人员在实验室方法和现代技术的基础上提出了一些有价值的工具和技术,用于检测和预防仓库中的安全隐患。然而,目前还没有独立的高效工具/技术来监测储藏区的自燃情况。在当前的研究中,我们提出了一种基于无线传感器网络(WSN)和机器学习(ML)的高效仓储区监控系统,用于早期预测棉花仓储区的自燃情况。WSN 用于通过不同的传感器组合收集储藏区的实时值,并将其发送到网络上,在网络上对数据进行处理,以识别自燃并将预测结果发送给最终用户。实时数据收集和基于 ML 的分析使系统高效可靠。通过展示两组不同条件下储存的棉花,验证了当前系统的效率。结果表明,所提出的系统能够及时发现自燃现象,准确率高达 95%。
{"title":"Smart Predictor for Spontaneous Combustion in Cotton Storages Using Wireless Sensor Network and Machine Learning","authors":"U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan","doi":"10.1155/2024/5551759","DOIUrl":"https://doi.org/10.1155/2024/5551759","url":null,"abstract":"The splendid technological inventions supersede many traditional agricultural monitoring systems. In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. One such hazard to cotton storage is spontaneous combustion, a process by which an element having comparatively low ignition temperature (hay, straw, peat, etc.) starts to relieve heat. In the presence of spontaneous combustion and lack of oxygen, if cotton catches any sparks from bales or physicochemical heat to ignite, the combustion can convert in to smoldering, and it can last up to several days without being discovered. Consequently, the actual fire occurs, cotton silently smoldering which not only affects cotton quality but also became the reason of big fire event. Many researchers propose valuable tools and techniques based on laboratory methods and modern techniques as well for detection and prevention of security hazards in storages. However, there is no standalone efficient tool/technique to monitor the storage area for spontaneous combustion. In current research, we propose an efficient wireless sensor network (WSN) and machine learning- (ML-) based storage area monitoring system for early prediction of spontaneous combustion in the cotton storage area. The WSN is used to collect real-time values from storage field by different combinations of sensors and send this over the network, where data is processed to identify spontaneous combustion and distribute the prediction results to the end user. The real-time data collection and ML-based analysis make the system efficient and reliable. The efficiency of the current system is verified by presenting two groups of cotton stored with different conditions. The results showed that the proposed system is able to detect spontaneous combustion well in time with a 95% accuracy rate.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140085223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.
随着网络技术的发展和越来越多的人使用设备,信息的爆炸式增长和数据泄露的威胁使数据存储成为一项重大挑战。在传统医疗机构中,大部分医疗数据都是通过云计算技术集中存储在机构的数据中心。这种集中存储方式存在诸多安全隐患,一旦中心服务器遭到攻击,就会导致医疗数据丢失,从而导致患者隐私数据泄露。同时,电子病历是当前医疗领域最关键的数据。在传统的集中式医疗服务系统(HSS)中,由于人为因素,电子病历存在数据泄露和篡改问题。同时,由于各家医院都是独立建设,导致目前的集中式医疗服务系统存在数据孤岛问题,难以实现机构间医疗数据的安全共享。随着系统用户数量的增加,系统中的电子病历数据也逐渐增多,导致解密计算开销不断增加。因此,本文提出了一种基于区块链的多方授权访问控制方案,以确保电子病历的安全性。该方案采用 SM 加密算法对系统中的医疗数据进行加密。它添加了患者签名以确保数据的保密性和安全性,并将加密后的电子病历(EMR)存储在星际文件系统(IPFS)中,以实现 EMR 的分布式存储。此外,还通过基于智能合约的方式实现了基于角色的多授权访问控制,以确保 EMR 的安全性。我们分析了本文解决方案的安全性,并将其性能与基于其他加密算法的现有方案进行了比较。实验结果表明,本文提出的解决方案显著提高了 EMR 的安全共享,并提供了系统性能。
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139807711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.
随着网络技术的发展和越来越多的人使用设备,信息的爆炸式增长和数据泄露的威胁使数据存储成为一项重大挑战。在传统医疗机构中,大部分医疗数据都是通过云计算技术集中存储在机构的数据中心。这种集中存储方式存在诸多安全隐患,一旦中心服务器遭到攻击,就会导致医疗数据丢失,从而导致患者隐私数据泄露。同时,电子病历是当前医疗领域最关键的数据。在传统的集中式医疗服务系统(HSS)中,由于人为因素,电子病历存在数据泄露和篡改问题。同时,由于各家医院都是独立建设,导致目前的集中式医疗服务系统存在数据孤岛问题,难以实现机构间医疗数据的安全共享。随着系统用户数量的增加,系统中的电子病历数据也逐渐增多,导致解密计算开销不断增加。因此,本文提出了一种基于区块链的多方授权访问控制方案,以确保电子病历的安全性。该方案采用 SM 加密算法对系统中的医疗数据进行加密。它添加了患者签名以确保数据的保密性和安全性,并将加密后的电子病历(EMR)存储在星际文件系统(IPFS)中,以实现 EMR 的分布式存储。此外,还通过基于智能合约的方式实现了基于角色的多授权访问控制,以确保 EMR 的安全性。我们分析了本文解决方案的安全性,并将其性能与基于其他加密算法的现有方案进行了比较。实验结果表明,本文提出的解决方案显著提高了 EMR 的安全共享,并提供了系统性能。
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139867644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The channel in the marine environment is a time-varying and space-varying channel. Pulse-truncated continuous wave (PCW) speed measurement is often used in sonar, but the instability effect of PCW signal in the channel limits the effectiveness of speed measurement. Hyperbolic frequency modulation (HFM) signal is insensitive to Doppler; therefore, HFM signals are widely used in ranging and velocity measurement of sonar and radar. However, due to the filtering effect of the marine environment, the HFM signal of a single frequency band may cause excessive transmission loss, and the echo energy may be too weak to detect the target. Based on the analysis of the influence of speed on the distance measurement of HFM signal, a pulse sequence method based on HFM for speed measurement (PHS) is proposed, which uses HFM signals of different frequency bands and pulse widths in the pulse sequence to perform speed measurement. Extensive simulation results show that PHS method not only guarantees the speed measurement but also makes full use of the energy of the HFM sequence to improve the accuracy of the distance measurement. And PHS method is valuable to the practical application of engineering.
{"title":"PHS: A Pulse Sequence Method Based on Hyperbolic Frequency Modulation for Speed Measurement","authors":"Tao Ping, Caixia Song, Zhiguo Qi, Pengmin Xu","doi":"10.1155/2024/6670576","DOIUrl":"https://doi.org/10.1155/2024/6670576","url":null,"abstract":"The channel in the marine environment is a time-varying and space-varying channel. Pulse-truncated continuous wave (PCW) speed measurement is often used in sonar, but the instability effect of PCW signal in the channel limits the effectiveness of speed measurement. Hyperbolic frequency modulation (HFM) signal is insensitive to Doppler; therefore, HFM signals are widely used in ranging and velocity measurement of sonar and radar. However, due to the filtering effect of the marine environment, the HFM signal of a single frequency band may cause excessive transmission loss, and the echo energy may be too weak to detect the target. Based on the analysis of the influence of speed on the distance measurement of HFM signal, a pulse sequence method based on HFM for speed measurement (PHS) is proposed, which uses HFM signals of different frequency bands and pulse widths in the pulse sequence to perform speed measurement. Extensive simulation results show that PHS method not only guarantees the speed measurement but also makes full use of the energy of the HFM sequence to improve the accuracy of the distance measurement. And PHS method is valuable to the practical application of engineering.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139623912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. Traditional machine learning techniques to intrusion detection rely on expert experience to choose features, and deep learning approaches have a low detection efficiency. In this paper, an intrusion detection model based on feature selection and improved one-dimensional convolutional neural network was proposed. This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. Then, the extracted features were fed into the improved one-dimensional convolutional neural network (I1DCNN), and this network training was used to complete the final classification task. The feature selection and improved one-dimensional convolutional neural network (FS-I1DCNN) intrusion detection model not only solved the traditional machine learning method of relying on expert experience to extract features but also improved the detection efficiency of the model, reduced the training time while reducing the dimension, and increased the overall accuracy. In comparison to the I1DCNN model without feature extraction and the conventional one-dimensional convolutional neural network (1DCNN) model, the experimental results demonstrate that the FS-I1DCNN model’s overall accuracy increases by 0.67% and 2.94%, respectively. Its accuracy, precision, recall, and F1-score were significantly better than those of the other intrusion detection models, including SVM and DBN.
{"title":"An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network","authors":"Qingfeng Li, Bo Li, Linzhi Wen","doi":"10.1155/2023/1982173","DOIUrl":"https://doi.org/10.1155/2023/1982173","url":null,"abstract":"The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. Traditional machine learning techniques to intrusion detection rely on expert experience to choose features, and deep learning approaches have a low detection efficiency. In this paper, an intrusion detection model based on feature selection and improved one-dimensional convolutional neural network was proposed. This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. Then, the extracted features were fed into the improved one-dimensional convolutional neural network (I1DCNN), and this network training was used to complete the final classification task. The feature selection and improved one-dimensional convolutional neural network (FS-I1DCNN) intrusion detection model not only solved the traditional machine learning method of relying on expert experience to extract features but also improved the detection efficiency of the model, reduced the training time while reducing the dimension, and increased the overall accuracy. In comparison to the I1DCNN model without feature extraction and the conventional one-dimensional convolutional neural network (1DCNN) model, the experimental results demonstrate that the FS-I1DCNN model’s overall accuracy increases by 0.67% and 2.94%, respectively. Its accuracy, precision, recall, and F1-score were significantly better than those of the other intrusion detection models, including SVM and DBN.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Received signal strength- (RSS-) based localization in wireless sensor networks (WSNs) has attracted significant attention due to its advantages of low cost and simple implementation. In practice, RSS measurements may suffer from sensor biases, which deteriorates the localization accuracy. However, most of the existing localization methods are designed for bias-free measurements. In this paper, we propose a convex combination method for RSS localization in the presence of sensor biases. The parameter vector composed of unknown location and sensor biases is estimated simultaneously by using a convex combination of some virtual points. These virtual points form a convex hull, into which the parameter vector falls with large probability. By this, the original nonconvex estimation problem is converted to be convex. Numerical examples demonstrate the superiority of the proposed method in terms of localization accuracy, compared to the existing semidefinite programming (SDP) methods.
{"title":"Convex Combination for Wireless Localization Using Biased RSS Measurements","authors":"Qi Wang, Fei Li, Teng Shao, Chao Xu","doi":"10.1155/2023/8931636","DOIUrl":"https://doi.org/10.1155/2023/8931636","url":null,"abstract":"Received signal strength- (RSS-) based localization in wireless sensor networks (WSNs) has attracted significant attention due to its advantages of low cost and simple implementation. In practice, RSS measurements may suffer from sensor biases, which deteriorates the localization accuracy. However, most of the existing localization methods are designed for bias-free measurements. In this paper, we propose a convex combination method for RSS localization in the presence of sensor biases. The parameter vector composed of unknown location and sensor biases is estimated simultaneously by using a convex combination of some virtual points. These virtual points form a convex hull, into which the parameter vector falls with large probability. By this, the original nonconvex estimation problem is converted to be convex. Numerical examples demonstrate the superiority of the proposed method in terms of localization accuracy, compared to the existing semidefinite programming (SDP) methods.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Synchronous positioning and mapping mainly realize the functions of self-positioning and environment map construction for intelligent navigation technology. In order to solve the problems of low positioning accuracy and poor mapping effect of existing SLAM (simultaneous localization and mapping) systems in indoor dynamic environments and to improve the positioning accuracy, timeliness, and robustness of visual SLAM systems in dynamic environments, an improved visual SLAM method is proposed. Aiming at the inconsistency between the direction of dynamic objects and static background optical flow, this method adopts a high-real-time dynamic region mask detection algorithm to eliminate the feature points in the dynamic region mask, remove the camera motion optical flow according to the original feature information, and then cluster the optical flow amplitude of dynamic objects so as to realize the dynamic region mask detection and eliminate the dynamic signpost points combined with the polar geometric constraints. In order to verify the effectiveness of the improved algorithm, the three evaluation indexes of system accuracy, real-time performance, and the amount of drift are analyzed and verified, respectively, on the TUM dataset. The results show that the proposed algorithm not only has good real-time performance but also improves the accuracy of the system and reduces the amount of drift.
{"title":"Research on Visual SLAM Navigation Techniques for Dynamic Environments","authors":"Tongjun Wang, Peijun Zhao","doi":"10.1155/2023/2025844","DOIUrl":"https://doi.org/10.1155/2023/2025844","url":null,"abstract":"Synchronous positioning and mapping mainly realize the functions of self-positioning and environment map construction for intelligent navigation technology. In order to solve the problems of low positioning accuracy and poor mapping effect of existing SLAM (simultaneous localization and mapping) systems in indoor dynamic environments and to improve the positioning accuracy, timeliness, and robustness of visual SLAM systems in dynamic environments, an improved visual SLAM method is proposed. Aiming at the inconsistency between the direction of dynamic objects and static background optical flow, this method adopts a high-real-time dynamic region mask detection algorithm to eliminate the feature points in the dynamic region mask, remove the camera motion optical flow according to the original feature information, and then cluster the optical flow amplitude of dynamic objects so as to realize the dynamic region mask detection and eliminate the dynamic signpost points combined with the polar geometric constraints. In order to verify the effectiveness of the improved algorithm, the three evaluation indexes of system accuracy, real-time performance, and the amount of drift are analyzed and verified, respectively, on the TUM dataset. The results show that the proposed algorithm not only has good real-time performance but also improves the accuracy of the system and reduces the amount of drift.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44570704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. Firstly, we propose a master-slave multichain architecture based on the traditional single chain and integrate it with a three-layer edge computing structure to address security issues on the edge side. We also design a signature authentication scheme utilizing ECC integrated with blockchain encryption technology. Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. Finally, experimental results demonstrate that our proposed scheme can effectively resist various attacks, significantly improve algorithm efficiency, and maintain a system overhead of less than 160 p, with a maximum transaction throughput of nearly 310 tx/s.
{"title":"Improved Private Data Protection Scheme for Blockchain Smart Contracts","authors":"Sheng Hu","doi":"10.1155/2023/5963039","DOIUrl":"https://doi.org/10.1155/2023/5963039","url":null,"abstract":"Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. Firstly, we propose a master-slave multichain architecture based on the traditional single chain and integrate it with a three-layer edge computing structure to address security issues on the edge side. We also design a signature authentication scheme utilizing ECC integrated with blockchain encryption technology. Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. Finally, experimental results demonstrate that our proposed scheme can effectively resist various attacks, significantly improve algorithm efficiency, and maintain a system overhead of less than 160 p, with a maximum transaction throughput of nearly 310 tx/s.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48241240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a method to identify the damages in frame structures with slender beams. This method adjusts the parameters of the structure to match the analytical and the measured displacements. The effect of transverse shear deformation on the nodal analytical displacement is analyzed, and the parameter identification of frame structures with slender beams is performed. The results demonstrate that parameter-identification accuracy can be considerably improved by considering the transverse shear deformation in the frame structure with slender beams. The proposed method can accurately identify the damages in frame structures with slender beams using displacement measurements.
{"title":"Parameter Identification of Frame Structures by considering Shear Deformation","authors":"F. Xiao, Weiwei Zhu, Xiangwei Meng, Gang S. Chen","doi":"10.1155/2023/6631716","DOIUrl":"https://doi.org/10.1155/2023/6631716","url":null,"abstract":"This paper presents a method to identify the damages in frame structures with slender beams. This method adjusts the parameters of the structure to match the analytical and the measured displacements. The effect of transverse shear deformation on the nodal analytical displacement is analyzed, and the parameter identification of frame structures with slender beams is performed. The results demonstrate that parameter-identification accuracy can be considerably improved by considering the transverse shear deformation in the frame structure with slender beams. The proposed method can accurately identify the damages in frame structures with slender beams using displacement measurements.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45531819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}