首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Interoperability Structure of Smart Water Conservancy Based on Internet of Things 基于物联网的智能水利互操作结构
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2024-05-16 DOI: 10.1155/2024/7724783
SongSong Wang, Ouguan Xu
Massive smart water conservancy object (WCO) need to be connected for real-time monitoring and control, which produces massive data. Unfortunately, heterogeneous data structures and semantics lead to low interoperability between WCO and management systems. To address this challenge, we propose a novel interoperability structure for a smart water conservancy system based on the Internet of Things (IoT), and the key design includes a smart WCO terminal, interoperability network, special interoperability protocol, WCO information model, and cloud platform. Universal terminal and network are the base of interoperability hardware, and special interoperability protocol and information model for interconnection of WCO are designed for smart water conservancy management system. WCO can be connected to a water conservancy Big Data processing cloud platform for interoperability applications. The application results demonstrate that our proposed WCO’s interoperability structure has obvious advantages than the general IoT at WCO interoperability. The interoperability protocol is reliable, the information model can ease interoperability and security, and the semantic dictionary is very rich and covers all semantic services of WCO.
大规模智能水利对象(WCO)需要连接起来进行实时监测和控制,从而产生大量数据。遗憾的是,异构的数据结构和语义导致 WCO 与管理系统之间的互操作性较低。为应对这一挑战,我们提出了一种基于物联网(IoT)的新型智能水利系统互操作结构,其关键设计包括智能 WCO 终端、互操作网络、专用互操作协议、WCO 信息模型和云平台。通用终端和网络是互操作性硬件的基础,为智能水利管理系统设计了专用互操作协议和 WCO 互联信息模型。WCO 可连接到水利大数据处理云平台进行互操作应用。应用结果表明,我们提出的 WCO 互操作结构比一般物联网在 WCO 互操作方面具有明显优势。互操作协议可靠,信息模型便于互操作和安全,语义字典非常丰富,涵盖了WCO的所有语义服务。
{"title":"Interoperability Structure of Smart Water Conservancy Based on Internet of Things","authors":"SongSong Wang, Ouguan Xu","doi":"10.1155/2024/7724783","DOIUrl":"https://doi.org/10.1155/2024/7724783","url":null,"abstract":"Massive smart water conservancy object (WCO) need to be connected for real-time monitoring and control, which produces massive data. Unfortunately, heterogeneous data structures and semantics lead to low interoperability between WCO and management systems. To address this challenge, we propose a novel interoperability structure for a smart water conservancy system based on the Internet of Things (IoT), and the key design includes a smart WCO terminal, interoperability network, special interoperability protocol, WCO information model, and cloud platform. Universal terminal and network are the base of interoperability hardware, and special interoperability protocol and information model for interconnection of WCO are designed for smart water conservancy management system. WCO can be connected to a water conservancy Big Data processing cloud platform for interoperability applications. The application results demonstrate that our proposed WCO’s interoperability structure has obvious advantages than the general IoT at WCO interoperability. The interoperability protocol is reliable, the information model can ease interoperability and security, and the semantic dictionary is very rich and covers all semantic services of WCO.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Predictor for Spontaneous Combustion in Cotton Storages Using Wireless Sensor Network and Machine Learning 利用无线传感器网络和机器学习的棉花储藏室自燃智能预测器
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2024-03-01 DOI: 10.1155/2024/5551759
U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan
The splendid technological inventions supersede many traditional agricultural monitoring systems. In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. One such hazard to cotton storage is spontaneous combustion, a process by which an element having comparatively low ignition temperature (hay, straw, peat, etc.) starts to relieve heat. In the presence of spontaneous combustion and lack of oxygen, if cotton catches any sparks from bales or physicochemical heat to ignite, the combustion can convert in to smoldering, and it can last up to several days without being discovered. Consequently, the actual fire occurs, cotton silently smoldering which not only affects cotton quality but also became the reason of big fire event. Many researchers propose valuable tools and techniques based on laboratory methods and modern techniques as well for detection and prevention of security hazards in storages. However, there is no standalone efficient tool/technique to monitor the storage area for spontaneous combustion. In current research, we propose an efficient wireless sensor network (WSN) and machine learning- (ML-) based storage area monitoring system for early prediction of spontaneous combustion in the cotton storage area. The WSN is used to collect real-time values from storage field by different combinations of sensors and send this over the network, where data is processed to identify spontaneous combustion and distribute the prediction results to the end user. The real-time data collection and ML-based analysis make the system efficient and reliable. The efficiency of the current system is verified by presenting two groups of cotton stored with different conditions. The results showed that the proposed system is able to detect spontaneous combustion well in time with a 95% accuracy rate.
辉煌的技术发明取代了许多传统的农业监测系统。在过去的十年中,人们提出了各种新技术和新工具来监测储藏区,从而为不同作物提供更安全可靠的储藏。所谓储藏区监控,是指检查和避免火灾危险,而其他许多危险也需要关注。自燃是棉花储存过程中的一种危险,自燃是指点火温度相对较低的元素(干草、稻草、泥炭等)开始释放热量的过程。在自燃和缺氧的情况下,如果棉花从棉包或物理化学热中产生火花而被点燃,燃烧就会转化为燃烧,并可持续数天而不被发现。因此,在实际火灾发生时,棉花默默地燃烧不仅会影响棉花质量,还会成为大火的原因。许多研究人员在实验室方法和现代技术的基础上提出了一些有价值的工具和技术,用于检测和预防仓库中的安全隐患。然而,目前还没有独立的高效工具/技术来监测储藏区的自燃情况。在当前的研究中,我们提出了一种基于无线传感器网络(WSN)和机器学习(ML)的高效仓储区监控系统,用于早期预测棉花仓储区的自燃情况。WSN 用于通过不同的传感器组合收集储藏区的实时值,并将其发送到网络上,在网络上对数据进行处理,以识别自燃并将预测结果发送给最终用户。实时数据收集和基于 ML 的分析使系统高效可靠。通过展示两组不同条件下储存的棉花,验证了当前系统的效率。结果表明,所提出的系统能够及时发现自燃现象,准确率高达 95%。
{"title":"Smart Predictor for Spontaneous Combustion in Cotton Storages Using Wireless Sensor Network and Machine Learning","authors":"U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan","doi":"10.1155/2024/5551759","DOIUrl":"https://doi.org/10.1155/2024/5551759","url":null,"abstract":"The splendid technological inventions supersede many traditional agricultural monitoring systems. In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. One such hazard to cotton storage is spontaneous combustion, a process by which an element having comparatively low ignition temperature (hay, straw, peat, etc.) starts to relieve heat. In the presence of spontaneous combustion and lack of oxygen, if cotton catches any sparks from bales or physicochemical heat to ignite, the combustion can convert in to smoldering, and it can last up to several days without being discovered. Consequently, the actual fire occurs, cotton silently smoldering which not only affects cotton quality but also became the reason of big fire event. Many researchers propose valuable tools and techniques based on laboratory methods and modern techniques as well for detection and prevention of security hazards in storages. However, there is no standalone efficient tool/technique to monitor the storage area for spontaneous combustion. In current research, we propose an efficient wireless sensor network (WSN) and machine learning- (ML-) based storage area monitoring system for early prediction of spontaneous combustion in the cotton storage area. The WSN is used to collect real-time values from storage field by different combinations of sensors and send this over the network, where data is processed to identify spontaneous combustion and distribute the prediction results to the end user. The real-time data collection and ML-based analysis make the system efficient and reliable. The efficiency of the current system is verified by presenting two groups of cotton stored with different conditions. The results showed that the proposed system is able to detect spontaneous combustion well in time with a 95% accuracy rate.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140085223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Sharing of Electronic Medical Records Based on Blockchain 基于区块链的电子病历安全共享
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2024-02-03 DOI: 10.1155/2024/5569121
Song Luo, N. Han, Tan Hu, Yuhua Qian
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.
随着网络技术的发展和越来越多的人使用设备,信息的爆炸式增长和数据泄露的威胁使数据存储成为一项重大挑战。在传统医疗机构中,大部分医疗数据都是通过云计算技术集中存储在机构的数据中心。这种集中存储方式存在诸多安全隐患,一旦中心服务器遭到攻击,就会导致医疗数据丢失,从而导致患者隐私数据泄露。同时,电子病历是当前医疗领域最关键的数据。在传统的集中式医疗服务系统(HSS)中,由于人为因素,电子病历存在数据泄露和篡改问题。同时,由于各家医院都是独立建设,导致目前的集中式医疗服务系统存在数据孤岛问题,难以实现机构间医疗数据的安全共享。随着系统用户数量的增加,系统中的电子病历数据也逐渐增多,导致解密计算开销不断增加。因此,本文提出了一种基于区块链的多方授权访问控制方案,以确保电子病历的安全性。该方案采用 SM 加密算法对系统中的医疗数据进行加密。它添加了患者签名以确保数据的保密性和安全性,并将加密后的电子病历(EMR)存储在星际文件系统(IPFS)中,以实现 EMR 的分布式存储。此外,还通过基于智能合约的方式实现了基于角色的多授权访问控制,以确保 EMR 的安全性。我们分析了本文解决方案的安全性,并将其性能与基于其他加密算法的现有方案进行了比较。实验结果表明,本文提出的解决方案显著提高了 EMR 的安全共享,并提供了系统性能。
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139807711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Sharing of Electronic Medical Records Based on Blockchain 基于区块链的电子病历安全共享
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2024-02-03 DOI: 10.1155/2024/5569121
Song Luo, N. Han, Tan Hu, Yuhua Qian
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.
随着网络技术的发展和越来越多的人使用设备,信息的爆炸式增长和数据泄露的威胁使数据存储成为一项重大挑战。在传统医疗机构中,大部分医疗数据都是通过云计算技术集中存储在机构的数据中心。这种集中存储方式存在诸多安全隐患,一旦中心服务器遭到攻击,就会导致医疗数据丢失,从而导致患者隐私数据泄露。同时,电子病历是当前医疗领域最关键的数据。在传统的集中式医疗服务系统(HSS)中,由于人为因素,电子病历存在数据泄露和篡改问题。同时,由于各家医院都是独立建设,导致目前的集中式医疗服务系统存在数据孤岛问题,难以实现机构间医疗数据的安全共享。随着系统用户数量的增加,系统中的电子病历数据也逐渐增多,导致解密计算开销不断增加。因此,本文提出了一种基于区块链的多方授权访问控制方案,以确保电子病历的安全性。该方案采用 SM 加密算法对系统中的医疗数据进行加密。它添加了患者签名以确保数据的保密性和安全性,并将加密后的电子病历(EMR)存储在星际文件系统(IPFS)中,以实现 EMR 的分布式存储。此外,还通过基于智能合约的方式实现了基于角色的多授权访问控制,以确保 EMR 的安全性。我们分析了本文解决方案的安全性,并将其性能与基于其他加密算法的现有方案进行了比较。实验结果表明,本文提出的解决方案显著提高了 EMR 的安全共享,并提供了系统性能。
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139867644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHS: A Pulse Sequence Method Based on Hyperbolic Frequency Modulation for Speed Measurement PHS:基于双曲线频率调制的脉冲序列速度测量法
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2024-01-12 DOI: 10.1155/2024/6670576
Tao Ping, Caixia Song, Zhiguo Qi, Pengmin Xu
The channel in the marine environment is a time-varying and space-varying channel. Pulse-truncated continuous wave (PCW) speed measurement is often used in sonar, but the instability effect of PCW signal in the channel limits the effectiveness of speed measurement. Hyperbolic frequency modulation (HFM) signal is insensitive to Doppler; therefore, HFM signals are widely used in ranging and velocity measurement of sonar and radar. However, due to the filtering effect of the marine environment, the HFM signal of a single frequency band may cause excessive transmission loss, and the echo energy may be too weak to detect the target. Based on the analysis of the influence of speed on the distance measurement of HFM signal, a pulse sequence method based on HFM for speed measurement (PHS) is proposed, which uses HFM signals of different frequency bands and pulse widths in the pulse sequence to perform speed measurement. Extensive simulation results show that PHS method not only guarantees the speed measurement but also makes full use of the energy of the HFM sequence to improve the accuracy of the distance measurement. And PHS method is valuable to the practical application of engineering.
海洋环境中的信道是一个时变和空间变化的信道。声纳中经常使用脉冲截断连续波(PCW)测速,但 PCW 信号在信道中的不稳定效应限制了测速的有效性。双曲频率调制(HFM)信号对多普勒不敏感,因此被广泛用于声纳和雷达的测距和测速。然而,由于海洋环境的滤波效应,单一频段的高频调制信号可能会导致传输损耗过大,回波能量过弱而无法探测到目标。在分析速度对高频调频信号测距影响的基础上,提出了一种基于高频调频的脉冲序列测速方法(PHS),在脉冲序列中使用不同频段和脉宽的高频调频信号进行测速。大量仿真结果表明,PHS 方法不仅能保证速度测量,还能充分利用高频序列的能量,提高距离测量的精度。PHS 方法在实际工程应用中具有重要价值。
{"title":"PHS: A Pulse Sequence Method Based on Hyperbolic Frequency Modulation for Speed Measurement","authors":"Tao Ping, Caixia Song, Zhiguo Qi, Pengmin Xu","doi":"10.1155/2024/6670576","DOIUrl":"https://doi.org/10.1155/2024/6670576","url":null,"abstract":"The channel in the marine environment is a time-varying and space-varying channel. Pulse-truncated continuous wave (PCW) speed measurement is often used in sonar, but the instability effect of PCW signal in the channel limits the effectiveness of speed measurement. Hyperbolic frequency modulation (HFM) signal is insensitive to Doppler; therefore, HFM signals are widely used in ranging and velocity measurement of sonar and radar. However, due to the filtering effect of the marine environment, the HFM signal of a single frequency band may cause excessive transmission loss, and the echo energy may be too weak to detect the target. Based on the analysis of the influence of speed on the distance measurement of HFM signal, a pulse sequence method based on HFM for speed measurement (PHS) is proposed, which uses HFM signals of different frequency bands and pulse widths in the pulse sequence to perform speed measurement. Extensive simulation results show that PHS method not only guarantees the speed measurement but also makes full use of the energy of the HFM sequence to improve the accuracy of the distance measurement. And PHS method is valuable to the practical application of engineering.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139623912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network 基于特征选择和改进型一维卷积神经网络的入侵检测模型
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2023-12-21 DOI: 10.1155/2023/1982173
Qingfeng Li, Bo Li, Linzhi Wen
The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. Traditional machine learning techniques to intrusion detection rely on expert experience to choose features, and deep learning approaches have a low detection efficiency. In this paper, an intrusion detection model based on feature selection and improved one-dimensional convolutional neural network was proposed. This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. Then, the extracted features were fed into the improved one-dimensional convolutional neural network (I1DCNN), and this network training was used to complete the final classification task. The feature selection and improved one-dimensional convolutional neural network (FS-I1DCNN) intrusion detection model not only solved the traditional machine learning method of relying on expert experience to extract features but also improved the detection efficiency of the model, reduced the training time while reducing the dimension, and increased the overall accuracy. In comparison to the I1DCNN model without feature extraction and the conventional one-dimensional convolutional neural network (1DCNN) model, the experimental results demonstrate that the FS-I1DCNN model’s overall accuracy increases by 0.67% and 2.94%, respectively. Its accuracy, precision, recall, and F1-score were significantly better than those of the other intrusion detection models, including SVM and DBN.
由于机器学习在网络安全领域的广泛应用,入侵检测问题有了新的解决方案,但目前仍存在一些问题。传统的机器学习入侵检测技术依赖专家经验来选择特征,深度学习方法的检测效率较低。本文提出了一种基于特征选择和改进一维卷积神经网络的入侵检测模型。该模型首先使用极梯度提升决策树(XGboost)算法对预处理后的数据进行排序,然后使用比较法剔除贡献度较高的 55 个特征。然后,将提取的特征输入改进的一维卷积神经网络(I1DCNN),并利用该网络训练完成最终的分类任务。特征选择和改进的一维卷积神经网络(FS-I1DCNN)入侵检测模型不仅解决了传统机器学习方法中依靠专家经验提取特征的问题,还提高了模型的检测效率,在减少维数的同时缩短了训练时间,提高了整体准确率。实验结果表明,与未进行特征提取的 I1DCNN 模型和传统的一维卷积神经网络(1DCNN)模型相比,FS-I1DCNN 模型的总体准确率分别提高了 0.67% 和 2.94%。其准确率、精确度、召回率和 F1 分数都明显优于其他入侵检测模型,包括 SVM 和 DBN。
{"title":"An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network","authors":"Qingfeng Li, Bo Li, Linzhi Wen","doi":"10.1155/2023/1982173","DOIUrl":"https://doi.org/10.1155/2023/1982173","url":null,"abstract":"The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. Traditional machine learning techniques to intrusion detection rely on expert experience to choose features, and deep learning approaches have a low detection efficiency. In this paper, an intrusion detection model based on feature selection and improved one-dimensional convolutional neural network was proposed. This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. Then, the extracted features were fed into the improved one-dimensional convolutional neural network (I1DCNN), and this network training was used to complete the final classification task. The feature selection and improved one-dimensional convolutional neural network (FS-I1DCNN) intrusion detection model not only solved the traditional machine learning method of relying on expert experience to extract features but also improved the detection efficiency of the model, reduced the training time while reducing the dimension, and increased the overall accuracy. In comparison to the I1DCNN model without feature extraction and the conventional one-dimensional convolutional neural network (1DCNN) model, the experimental results demonstrate that the FS-I1DCNN model’s overall accuracy increases by 0.67% and 2.94%, respectively. Its accuracy, precision, recall, and F1-score were significantly better than those of the other intrusion detection models, including SVM and DBN.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Combination for Wireless Localization Using Biased RSS Measurements 利用有偏差的 RSS 测量进行无线定位的凸面组合
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2023-12-20 DOI: 10.1155/2023/8931636
Qi Wang, Fei Li, Teng Shao, Chao Xu
Received signal strength- (RSS-) based localization in wireless sensor networks (WSNs) has attracted significant attention due to its advantages of low cost and simple implementation. In practice, RSS measurements may suffer from sensor biases, which deteriorates the localization accuracy. However, most of the existing localization methods are designed for bias-free measurements. In this paper, we propose a convex combination method for RSS localization in the presence of sensor biases. The parameter vector composed of unknown location and sensor biases is estimated simultaneously by using a convex combination of some virtual points. These virtual points form a convex hull, into which the parameter vector falls with large probability. By this, the original nonconvex estimation problem is converted to be convex. Numerical examples demonstrate the superiority of the proposed method in terms of localization accuracy, compared to the existing semidefinite programming (SDP) methods.
基于接收信号强度(RSS)的无线传感器网络(WSN)定位因其成本低、实施简单等优点而备受关注。实际上,RSS 测量可能会受到传感器偏差的影响,从而降低定位精度。然而,现有的定位方法大多是针对无偏差测量而设计的。本文提出了一种在存在传感器偏差的情况下进行 RSS 定位的凸组合方法。通过使用一些虚拟点的凸组合来同时估计由未知位置和传感器偏差组成的参数向量。这些虚拟点形成一个凸壳,参数矢量很有可能落入该凸壳中。这样,原来的非凸估计问题就转换成了凸估计问题。数值实例证明,与现有的半定量编程(SDP)方法相比,所提出的方法在定位精度方面更胜一筹。
{"title":"Convex Combination for Wireless Localization Using Biased RSS Measurements","authors":"Qi Wang, Fei Li, Teng Shao, Chao Xu","doi":"10.1155/2023/8931636","DOIUrl":"https://doi.org/10.1155/2023/8931636","url":null,"abstract":"Received signal strength- (RSS-) based localization in wireless sensor networks (WSNs) has attracted significant attention due to its advantages of low cost and simple implementation. In practice, RSS measurements may suffer from sensor biases, which deteriorates the localization accuracy. However, most of the existing localization methods are designed for bias-free measurements. In this paper, we propose a convex combination method for RSS localization in the presence of sensor biases. The parameter vector composed of unknown location and sensor biases is estimated simultaneously by using a convex combination of some virtual points. These virtual points form a convex hull, into which the parameter vector falls with large probability. By this, the original nonconvex estimation problem is converted to be convex. Numerical examples demonstrate the superiority of the proposed method in terms of localization accuracy, compared to the existing semidefinite programming (SDP) methods.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Visual SLAM Navigation Techniques for Dynamic Environments 动态环境下视觉SLAM导航技术研究
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2023-09-01 DOI: 10.1155/2023/2025844
Tongjun Wang, Peijun Zhao
Synchronous positioning and mapping mainly realize the functions of self-positioning and environment map construction for intelligent navigation technology. In order to solve the problems of low positioning accuracy and poor mapping effect of existing SLAM (simultaneous localization and mapping) systems in indoor dynamic environments and to improve the positioning accuracy, timeliness, and robustness of visual SLAM systems in dynamic environments, an improved visual SLAM method is proposed. Aiming at the inconsistency between the direction of dynamic objects and static background optical flow, this method adopts a high-real-time dynamic region mask detection algorithm to eliminate the feature points in the dynamic region mask, remove the camera motion optical flow according to the original feature information, and then cluster the optical flow amplitude of dynamic objects so as to realize the dynamic region mask detection and eliminate the dynamic signpost points combined with the polar geometric constraints. In order to verify the effectiveness of the improved algorithm, the three evaluation indexes of system accuracy, real-time performance, and the amount of drift are analyzed and verified, respectively, on the TUM dataset. The results show that the proposed algorithm not only has good real-time performance but also improves the accuracy of the system and reduces the amount of drift.
同步定位测绘主要实现智能导航技术的自定位和环境图构建功能。为了解决现有SLAM系统在室内动态环境中定位精度低、映射效果差的问题,提高视觉SLAM系统的定位精度、及时性和鲁棒性,提出了一种改进的视觉SLAM方法。针对动态物体方向与静态背景光流不一致的问题,该方法采用高实时的动态区域掩模检测算法,去除动态区域掩膜中的特征点,根据原始特征信息去除相机运动光流,然后对动态物体的光流幅度进行聚类,实现动态区域掩模检测,并结合极几何约束消除动态路标点。为了验证改进算法的有效性,分别在TUM数据集上分析和验证了系统精度、实时性能和漂移量三个评价指标。结果表明,该算法不仅具有良好的实时性,而且提高了系统的精度,减少了漂移量。
{"title":"Research on Visual SLAM Navigation Techniques for Dynamic Environments","authors":"Tongjun Wang, Peijun Zhao","doi":"10.1155/2023/2025844","DOIUrl":"https://doi.org/10.1155/2023/2025844","url":null,"abstract":"Synchronous positioning and mapping mainly realize the functions of self-positioning and environment map construction for intelligent navigation technology. In order to solve the problems of low positioning accuracy and poor mapping effect of existing SLAM (simultaneous localization and mapping) systems in indoor dynamic environments and to improve the positioning accuracy, timeliness, and robustness of visual SLAM systems in dynamic environments, an improved visual SLAM method is proposed. Aiming at the inconsistency between the direction of dynamic objects and static background optical flow, this method adopts a high-real-time dynamic region mask detection algorithm to eliminate the feature points in the dynamic region mask, remove the camera motion optical flow according to the original feature information, and then cluster the optical flow amplitude of dynamic objects so as to realize the dynamic region mask detection and eliminate the dynamic signpost points combined with the polar geometric constraints. In order to verify the effectiveness of the improved algorithm, the three evaluation indexes of system accuracy, real-time performance, and the amount of drift are analyzed and verified, respectively, on the TUM dataset. The results show that the proposed algorithm not only has good real-time performance but also improves the accuracy of the system and reduces the amount of drift.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44570704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Private Data Protection Scheme for Blockchain Smart Contracts 改进的区块链智能合约私有数据保护方案
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2023-08-24 DOI: 10.1155/2023/5963039
Sheng Hu
Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. Firstly, we propose a master-slave multichain architecture based on the traditional single chain and integrate it with a three-layer edge computing structure to address security issues on the edge side. We also design a signature authentication scheme utilizing ECC integrated with blockchain encryption technology. Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. Finally, experimental results demonstrate that our proposed scheme can effectively resist various attacks, significantly improve algorithm efficiency, and maintain a system overhead of less than 160 p, with a maximum transaction throughput of nearly 310 tx/s.
数据安全和隐私保护是制约边缘计算发展的关键挑战。同样,由于可扩展性的限制,区块链技术在解决与边缘计算相关的安全问题方面也面临限制。为了应对这些挑战,促进区块链技术的发展,本文提出了一种利用边缘计算和主从多链架构增强区块链智能合约中隐私数据保护的方案。首先,我们在传统单链的基础上提出主从多链架构,并将其与三层边缘计算结构相结合,解决边缘侧的安全问题。我们还设计了一个集成了区块链加密技术的ECC签名认证方案。其次,将基于角色的访问控制(RBAC)模型与智能合约相结合,精细划分用户权限,构建域间基于角色的访问控制(ID-RBAC)模型,详细设计域内和域间的访问认证流程。实验结果表明,该方案能够有效抵御各种攻击,显著提高算法效率,系统开销保持在160 p以内,最大事务吞吐量接近310 tx/s。
{"title":"Improved Private Data Protection Scheme for Blockchain Smart Contracts","authors":"Sheng Hu","doi":"10.1155/2023/5963039","DOIUrl":"https://doi.org/10.1155/2023/5963039","url":null,"abstract":"Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. Firstly, we propose a master-slave multichain architecture based on the traditional single chain and integrate it with a three-layer edge computing structure to address security issues on the edge side. We also design a signature authentication scheme utilizing ECC integrated with blockchain encryption technology. Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. Finally, experimental results demonstrate that our proposed scheme can effectively resist various attacks, significantly improve algorithm efficiency, and maintain a system overhead of less than 160 p, with a maximum transaction throughput of nearly 310 tx/s.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48241240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameter Identification of Frame Structures by considering Shear Deformation 考虑剪切变形的框架结构参数辨识
IF 2.3 4区 计算机科学 Q1 Engineering Pub Date : 2023-08-16 DOI: 10.1155/2023/6631716
F. Xiao, Weiwei Zhu, Xiangwei Meng, Gang S. Chen
This paper presents a method to identify the damages in frame structures with slender beams. This method adjusts the parameters of the structure to match the analytical and the measured displacements. The effect of transverse shear deformation on the nodal analytical displacement is analyzed, and the parameter identification of frame structures with slender beams is performed. The results demonstrate that parameter-identification accuracy can be considerably improved by considering the transverse shear deformation in the frame structure with slender beams. The proposed method can accurately identify the damages in frame structures with slender beams using displacement measurements.
本文提出了一种识别细长梁框架结构损伤的方法。该方法调整结构的参数以匹配分析位移和测量位移。分析了横向剪切变形对节点解析位移的影响,并对细长梁框架结构进行了参数识别。结果表明,考虑细长梁框架结构的横向剪切变形,可以显著提高参数识别的精度。该方法可以通过位移测量准确识别细长梁框架结构的损伤。
{"title":"Parameter Identification of Frame Structures by considering Shear Deformation","authors":"F. Xiao, Weiwei Zhu, Xiangwei Meng, Gang S. Chen","doi":"10.1155/2023/6631716","DOIUrl":"https://doi.org/10.1155/2023/6631716","url":null,"abstract":"This paper presents a method to identify the damages in frame structures with slender beams. This method adjusts the parameters of the structure to match the analytical and the measured displacements. The effect of transverse shear deformation on the nodal analytical displacement is analyzed, and the parameter identification of frame structures with slender beams is performed. The results demonstrate that parameter-identification accuracy can be considerably improved by considering the transverse shear deformation in the frame structure with slender beams. The proposed method can accurately identify the damages in frame structures with slender beams using displacement measurements.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45531819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1