A. Waqas, M. J. U. Rehman, Hammad Dilpazir, M. Sohail, N. Subhani
The unmanned aerial vehicle communication networks (UAVCNs) are composed of unmanned aerial vehicles (UAVs) connected in ad hoc mode to facilitate vertical communication in 5G and beyond networks. UAVs operating in an ad hoc mode of operation mostly use reactive routing protocols to establish routes in the network to reduce the energy consumption of the nodes. In this article, a route discovery method is presented to reduce the overhead faced by reactive routing protocols during the route discovery phase. The expanding ring search (ERS) method is mostly used by reactive routing protocols in the destination discovery phase of the routing algorithm. Although the performance of the ERS method is better than simple flooding, the presented method further reduces energy consumption and routing overhead as compared to the conventional ERS method. To achieve the task, the time to live (TTL) is modified to accommodate a large number of nodes in a search attempt. We proposed variants of the proposed techniques for diverse application requirements and compared the performance with the state-of-the-art ERS technique. It has been demonstrated with the help of simulations that the presented algorithm outperforms the ERS method in terms of reduced routing overhead and reduced energy consumption.
{"title":"A Method to Reduce Route Discovery Cost of UAV Ad Hoc Network","authors":"A. Waqas, M. J. U. Rehman, Hammad Dilpazir, M. Sohail, N. Subhani","doi":"10.1155/2023/1578273","DOIUrl":"https://doi.org/10.1155/2023/1578273","url":null,"abstract":"The unmanned aerial vehicle communication networks (UAVCNs) are composed of unmanned aerial vehicles (UAVs) connected in ad hoc mode to facilitate vertical communication in 5G and beyond networks. UAVs operating in an ad hoc mode of operation mostly use reactive routing protocols to establish routes in the network to reduce the energy consumption of the nodes. In this article, a route discovery method is presented to reduce the overhead faced by reactive routing protocols during the route discovery phase. The expanding ring search (ERS) method is mostly used by reactive routing protocols in the destination discovery phase of the routing algorithm. Although the performance of the ERS method is better than simple flooding, the presented method further reduces energy consumption and routing overhead as compared to the conventional ERS method. To achieve the task, the time to live (TTL) is modified to accommodate a large number of nodes in a search attempt. We proposed variants of the proposed techniques for diverse application requirements and compared the performance with the state-of-the-art ERS technique. It has been demonstrated with the help of simulations that the presented algorithm outperforms the ERS method in terms of reduced routing overhead and reduced energy consumption.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47458426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Krishnamoorthy, Usha Nandini Duraisamy, Amruta S. Jondhale, Jaime Lloret, Balaji Venkatesalu Ramasamy
The indoor object tracking by utilizing received signal strength indicator (RSSI) measurements with the help of wireless sensor network (WSN) is an interesting and important topic in the domain of location-based applications. Without the knowledge of location, the measurements obtained with WSN are of no use. The trilateration is a widely used technique to get location updates of target based on RSSI measurements from WSN. However, it suffers with high location estimation errors arising due to random variations in RSSI measurements. This paper presents a range-free radial basis function neural network (RBFN) and Kalman filtering- (KF-) based algorithm named RBFN+KF. The performance of the RBFN+KF algorithm is evaluated using simulated RSSIs and is compared against trilateration, multilayer perceptron (MLP), and RBFN-based estimations. The simulation results reveal that the proposed RBFN+KF algorithm shows very low location estimation errors compared to the rest of the three approaches. Additionally, it is also seen that RBFN-based approach is more energy efficient than trilateration and MLP-based localization approaches.
{"title":"Energy-Constrained Target Localization Scheme for Wireless Sensor Networks Using Radial Basis Function Neural Network","authors":"V. Krishnamoorthy, Usha Nandini Duraisamy, Amruta S. Jondhale, Jaime Lloret, Balaji Venkatesalu Ramasamy","doi":"10.1155/2023/1426430","DOIUrl":"https://doi.org/10.1155/2023/1426430","url":null,"abstract":"The indoor object tracking by utilizing received signal strength indicator (RSSI) measurements with the help of wireless sensor network (WSN) is an interesting and important topic in the domain of location-based applications. Without the knowledge of location, the measurements obtained with WSN are of no use. The trilateration is a widely used technique to get location updates of target based on RSSI measurements from WSN. However, it suffers with high location estimation errors arising due to random variations in RSSI measurements. This paper presents a range-free radial basis function neural network (RBFN) and Kalman filtering- (KF-) based algorithm named RBFN+KF. The performance of the RBFN+KF algorithm is evaluated using simulated RSSIs and is compared against trilateration, multilayer perceptron (MLP), and RBFN-based estimations. The simulation results reveal that the proposed RBFN+KF algorithm shows very low location estimation errors compared to the rest of the three approaches. Additionally, it is also seen that RBFN-based approach is more energy efficient than trilateration and MLP-based localization approaches.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42866489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianpei Wang, L. Gong, Haocheng Zhao, Bowen Li, Meng Tian
The box packing problem can be generalized as placing a batch of cargos with a specified number of different physical characteristics into a specified box. Suppose that a batch of cuboid cargos of different sizes are to be loaded into a batch of boxes of the same type, the cargos have constraints such as orientation and stability. Taking the mean value of the reciprocal of space utilization as the objective function, this paper designs a hybrid genetic algorithm that combines genetic algorithm and tabu search algorithm. Aiming at the information of the packing sequence and the rotating state of the box in the packing scheme, a two-stage real number encoding method and decoding method based on random keys are designed, and a crossover operation based on partial random keys and uniform crossover is designed. In order to convert the solution searched by the optimization algorithm into the actual packing scheme, a heuristic loading algorithm is designed while using the positioning rule of the lower left corner, the space selection rule of the minimum space, and the division and merging rules of the remaining space. In the early stage, the roulette method was used to strengthen the global search ability, and in the later stage, the optimal preservation strategy was used to speed up the algorithm convergence. To make up for the shortcomings of the genetic algorithm’s weak local search ability and slow convergence speed, the tabu search algorithm was used as a mutation operation in the genetic algorithm. The solution in the generation is used as the initial solution of the tabu search algorithm, and the search process is carried out. Finally, this paper tests the proposed hybrid algorithm on 6 groups of weakly heterogeneous and strongly heterogeneous data in the BR dataset. The results prove that the proposed algorithm can reduce the usage of boxes.
{"title":"A 3D Offline Packing Algorithm considering Cargo Orientation and Stability","authors":"Xianpei Wang, L. Gong, Haocheng Zhao, Bowen Li, Meng Tian","doi":"10.1155/2023/5299891","DOIUrl":"https://doi.org/10.1155/2023/5299891","url":null,"abstract":"The box packing problem can be generalized as placing a batch of cargos with a specified number of different physical characteristics into a specified box. Suppose that a batch of cuboid cargos of different sizes are to be loaded into a batch of boxes of the same type, the cargos have constraints such as orientation and stability. Taking the mean value of the reciprocal of space utilization as the objective function, this paper designs a hybrid genetic algorithm that combines genetic algorithm and tabu search algorithm. Aiming at the information of the packing sequence and the rotating state of the box in the packing scheme, a two-stage real number encoding method and decoding method based on random keys are designed, and a crossover operation based on partial random keys and uniform crossover is designed. In order to convert the solution searched by the optimization algorithm into the actual packing scheme, a heuristic loading algorithm is designed while using the positioning rule of the lower left corner, the space selection rule of the minimum space, and the division and merging rules of the remaining space. In the early stage, the roulette method was used to strengthen the global search ability, and in the later stage, the optimal preservation strategy was used to speed up the algorithm convergence. To make up for the shortcomings of the genetic algorithm’s weak local search ability and slow convergence speed, the tabu search algorithm was used as a mutation operation in the genetic algorithm. The solution in the generation is used as the initial solution of the tabu search algorithm, and the search process is carried out. Finally, this paper tests the proposed hybrid algorithm on 6 groups of weakly heterogeneous and strongly heterogeneous data in the BR dataset. The results prove that the proposed algorithm can reduce the usage of boxes.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43120381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. First, the adaptive adjustment of the two parameters with the increase of iterations is achieved by improving the inertia weights and learning factors in the particle swarm optimization (PSO) algorithm so that the PSO has a large search range and high speed at the initial stage and a strong and stable convergence capability at the later stage. Secondly, to address the problem that PSO is prone to fall into a local optimum, the genetic operator is embedded into the operation process of the particle swarm algorithm, and the excellent global optimization performance of the genetic algorithm is used to open up the spatial vision of the particle population, revive the stagnant particles, accelerate the update amplitude of the algorithm, and achieve the purpose of improving the premature problem. Finally, the improved algorithm is combined with the BP neural network to optimize the BP neural network and applied to the network security posture assessment. The experimental comparison of different optimization algorithms is applied, and the results show that the network security posture prediction method of this model has the smallest error, the highest accuracy, and the fastest convergence, and can effectively predict future changes in network security posture.
{"title":"Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction","authors":"Yueying Li, Feng Wu","doi":"10.1155/2023/9970205","DOIUrl":"https://doi.org/10.1155/2023/9970205","url":null,"abstract":"To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. First, the adaptive adjustment of the two parameters with the increase of iterations is achieved by improving the inertia weights and learning factors in the particle swarm optimization (PSO) algorithm so that the PSO has a large search range and high speed at the initial stage and a strong and stable convergence capability at the later stage. Secondly, to address the problem that PSO is prone to fall into a local optimum, the genetic operator is embedded into the operation process of the particle swarm algorithm, and the excellent global optimization performance of the genetic algorithm is used to open up the spatial vision of the particle population, revive the stagnant particles, accelerate the update amplitude of the algorithm, and achieve the purpose of improving the premature problem. Finally, the improved algorithm is combined with the BP neural network to optimize the BP neural network and applied to the network security posture assessment. The experimental comparison of different optimization algorithms is applied, and the results show that the network security posture prediction method of this model has the smallest error, the highest accuracy, and the fastest convergence, and can effectively predict future changes in network security posture.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42818674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research on popular themes today is mainly concentrated on cutting-edge home applications made up of Internet of Things gadgets. As its principal means of sensing, wireless sensor networks are a component of the Internet of Things. Tracking and monitoring applications benefit from the use of sensor nodes. Every step in the data collection, processing, and transmission processes carried out by wireless sensor nodes takes energy. Small capacity batteries on the sensor nodes in the networks make charging them frequently impractical. Energy optimization is required for sensor nodes since there is no other option but to replace the nodes. Clustering is a well-known and effective solution to increase the energy efficiency of the sensor nodes among the various routing techniques. The closest route between the cluster head node and the base station is thus determined using routing techniques in order to manage energy.
{"title":"International Journal of Distributed Sensor Networks Energy Optimization-Based Clustering Protocols in Wireless Sensor Networks and Internet of Things-Survey","authors":"Vijayendra K. H. Prasad, S. Periyasamy","doi":"10.1155/2023/1362417","DOIUrl":"https://doi.org/10.1155/2023/1362417","url":null,"abstract":"Research on popular themes today is mainly concentrated on cutting-edge home applications made up of Internet of Things gadgets. As its principal means of sensing, wireless sensor networks are a component of the Internet of Things. Tracking and monitoring applications benefit from the use of sensor nodes. Every step in the data collection, processing, and transmission processes carried out by wireless sensor nodes takes energy. Small capacity batteries on the sensor nodes in the networks make charging them frequently impractical. Energy optimization is required for sensor nodes since there is no other option but to replace the nodes. Clustering is a well-known and effective solution to increase the energy efficiency of the sensor nodes among the various routing techniques. The closest route between the cluster head node and the base station is thus determined using routing techniques in order to manage energy.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42713998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A complex and changeable underwater archaeological environment leads to the lack of target features in the collected images, affecting the accuracy of target detection. Meanwhile, the difficulty in obtaining underwater archaeological images leads to less training data, resulting in poor generalization performance of the recognition algorithm. For these practical issues, we propose an underwater incomplete target recognition network via generating feature module (UITRNet). Specifically, for targets that lack features, features are generated by dual discriminators and generators to improve target detection accuracy. Then, multilayer features are fused to extract regions of interest. Finally, supervised contrastive learning is introduced into few-shot learning to improve the intraclass similarity and interclass distance of the target and enhance the generalization of the algorithm. The UIFI dataset is produced to verify the effectiveness of the algorithm in this paper. The experimental results show that the mean average precision (mAP) of our algorithm was improved by 0.86% and 1.29% under insufficient light and semiburied interference, respectively. The mAP for ship identification reached the highest level under all four sets of experiments.
{"title":"Underwater Incomplete Target Recognition Network via Generating Feature Module","authors":"Qi Shen, Jishen Jia, Lei Cai","doi":"10.1155/2023/5337454","DOIUrl":"https://doi.org/10.1155/2023/5337454","url":null,"abstract":"A complex and changeable underwater archaeological environment leads to the lack of target features in the collected images, affecting the accuracy of target detection. Meanwhile, the difficulty in obtaining underwater archaeological images leads to less training data, resulting in poor generalization performance of the recognition algorithm. For these practical issues, we propose an underwater incomplete target recognition network via generating feature module (UITRNet). Specifically, for targets that lack features, features are generated by dual discriminators and generators to improve target detection accuracy. Then, multilayer features are fused to extract regions of interest. Finally, supervised contrastive learning is introduced into few-shot learning to improve the intraclass similarity and interclass distance of the target and enhance the generalization of the algorithm. The UIFI dataset is produced to verify the effectiveness of the algorithm in this paper. The experimental results show that the mean average precision (mAP) of our algorithm was improved by 0.86% and 1.29% under insufficient light and semiburied interference, respectively. The mAP for ship identification reached the highest level under all four sets of experiments.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43092526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1177/15501329221135516
Yourui Huang, Gang Zhang, Min Kong, Fugui He
Aimed at the demands of wireless sensor networks for high energy-efficient time synchronization, the reduction of synchronization energy consumption is studied from the aspects of both accurate timestamps marking and synchronous information transmission mechanism. First, the network is divided into several parent–child groups periodically. The group-wise pair selection algorithm is used to select the network’s pairwise synchronization nodes, and chain-type network topology is thus generated. Second, the sequential multi-hop synchronization algorithm is introduced to realize the synchronization information exchange among pairwise synchronization nodes. The overhearing synchronization (OS) nodes obtain the synchronization information packet based on a one-way overhearing mechanism. Moreover, the accurate acquisition of the synchronization ack packet’s timestamp is carried out through the use of receiving-time-plus-fixed-delay mode. Third, the joint maximum likelihood method and the minimum variance unbiased estimation method are used to estimate the clock offsets of pairwise synchronization nodes and overhearing nodes to the parent nodes, respectively, based on which the child nodes adjust their local virtual clocks. Periodically, the pairwise synchronization nodes initiate the network’s time synchronization, estimate, and broadcast the relative offset to the gateway node, assisting the upper layer child nodes in synchronizing to the gateway node. Simulation results show that the proposed method not only achieves the millisecond level synchronization accuracy but also reduces the synchronization energy consumption and thus improves the network lifetime.
{"title":"New timestamp mark–based energy efficient time synchronization method for wireless sensor networks","authors":"Yourui Huang, Gang Zhang, Min Kong, Fugui He","doi":"10.1177/15501329221135516","DOIUrl":"https://doi.org/10.1177/15501329221135516","url":null,"abstract":"Aimed at the demands of wireless sensor networks for high energy-efficient time synchronization, the reduction of synchronization energy consumption is studied from the aspects of both accurate timestamps marking and synchronous information transmission mechanism. First, the network is divided into several parent–child groups periodically. The group-wise pair selection algorithm is used to select the network’s pairwise synchronization nodes, and chain-type network topology is thus generated. Second, the sequential multi-hop synchronization algorithm is introduced to realize the synchronization information exchange among pairwise synchronization nodes. The overhearing synchronization (OS) nodes obtain the synchronization information packet based on a one-way overhearing mechanism. Moreover, the accurate acquisition of the synchronization ack packet’s timestamp is carried out through the use of receiving-time-plus-fixed-delay mode. Third, the joint maximum likelihood method and the minimum variance unbiased estimation method are used to estimate the clock offsets of pairwise synchronization nodes and overhearing nodes to the parent nodes, respectively, based on which the child nodes adjust their local virtual clocks. Periodically, the pairwise synchronization nodes initiate the network’s time synchronization, estimate, and broadcast the relative offset to the gateway node, assisting the upper layer child nodes in synchronizing to the gateway node. Simulation results show that the proposed method not only achieves the millisecond level synchronization accuracy but also reduces the synchronization energy consumption and thus improves the network lifetime.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46249001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1177/15501329221136978
Yong Shen, Xiaokang Tang, X. Zhang, Yong-zhuang Zhou, H. Zou
As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establishment method with physics base is demanding, especially for Internet of Things devices, where energy and computational power is quite limited. In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. In this configuration, the IoT controller contains a narrow linewidth laser as a real local oscillator. Thus, it is capable of working as either a host or a client in quantum key distribution with remote servers, and efficiently generating quantum random numbers for quantum key distribution, as well as one time pad communication with deployed sensors. The security of the scheme is analyzed under the assumption of collective attacks in the asymptotic regime, and feasibility is theoretically verified with typical channel and commercial device parameters.
{"title":"A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things","authors":"Yong Shen, Xiaokang Tang, X. Zhang, Yong-zhuang Zhou, H. Zou","doi":"10.1177/15501329221136978","DOIUrl":"https://doi.org/10.1177/15501329221136978","url":null,"abstract":"As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establishment method with physics base is demanding, especially for Internet of Things devices, where energy and computational power is quite limited. In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. In this configuration, the IoT controller contains a narrow linewidth laser as a real local oscillator. Thus, it is capable of working as either a host or a client in quantum key distribution with remote servers, and efficiently generating quantum random numbers for quantum key distribution, as well as one time pad communication with deployed sensors. The security of the scheme is analyzed under the assumption of collective attacks in the asymptotic regime, and feasibility is theoretically verified with typical channel and commercial device parameters.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46839446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1177/15501329221133291
David Miguel-Santiago, M. E. Rivero-Angeles, L. Garay-Jimenéz, I. Orea-Flores, B. Tovar-Corona
Crowdsensing systems are developed in order to use the computational and communication capabilities of registered users to monitor specific variables and phenomena in an opportunistic manner. As such, the Quality of Experience is not easily attained since these systems heavily rely on the user’s behavior and willingness to cooperate whenever an event with certain interest needs to be monitored. In this work, we analyze the data acquisition phase, where pedestrians opportunistically transmit to vehicles to further disseminate it in the city according to their trajectory. This highly dynamic environment (sensors and data sinks are mobile, and the number of users varies according to the region and time) poses many challenges for properly operating a crowdsensing system. We first study the statistical properties of vehicular traffic in different regions of Luxembourg City where pedestrians share their computational resources and send data to passing cars. Then we propose an Erlang distribution to model the vehicles’ dwelling times and develop a Markov chain accordingly. We model the system using two different queues: we use a single server queue to model the vehicle traffic, while we use an infinite server queue system to model the pedestrian traffic.
{"title":"Teletraffic analysis of a mobile crowdsensing system: The pedestrian-to-vehicle scenario","authors":"David Miguel-Santiago, M. E. Rivero-Angeles, L. Garay-Jimenéz, I. Orea-Flores, B. Tovar-Corona","doi":"10.1177/15501329221133291","DOIUrl":"https://doi.org/10.1177/15501329221133291","url":null,"abstract":"Crowdsensing systems are developed in order to use the computational and communication capabilities of registered users to monitor specific variables and phenomena in an opportunistic manner. As such, the Quality of Experience is not easily attained since these systems heavily rely on the user’s behavior and willingness to cooperate whenever an event with certain interest needs to be monitored. In this work, we analyze the data acquisition phase, where pedestrians opportunistically transmit to vehicles to further disseminate it in the city according to their trajectory. This highly dynamic environment (sensors and data sinks are mobile, and the number of users varies according to the region and time) poses many challenges for properly operating a crowdsensing system. We first study the statistical properties of vehicular traffic in different regions of Luxembourg City where pedestrians share their computational resources and send data to passing cars. Then we propose an Erlang distribution to model the vehicles’ dwelling times and develop a Markov chain accordingly. We model the system using two different queues: we use a single server queue to model the vehicle traffic, while we use an infinite server queue system to model the pedestrian traffic.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46173777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1177/15501329221134479
Xin Xia, Yunlong Ma, Ye Luo, Jianwei Lu
Traditional electronic medical record systems in hospitals rely on healthcare workers to manually enter patient information, resulting in healthcare workers having to spend a significant amount of time each day filling out electronic medical records. This inefficient interaction seriously affects the communication between doctors and patients and reduces the speed at which doctors can diagnose patients’ conditions. The rapid development of deep learning–based speech recognition technology promises to improve this situation. In this work, we build an online electronic medical record system based on speech interaction. The system integrates a medical linguistic knowledge base, a specialized language model, a personalized acoustic model, and a fault-tolerance mechanism. Hence, we propose and develop an advanced electronic medical record system approach with multi-accent adaptive technology for avoiding the mistakes caused by accents, and it improves the accuracy of speech recognition obviously. For testing the proposed speech recognition electronic medical record system, we construct medical speech recognition data sets using audio and electronic medical records from real medical environments. On the data sets from real clinical scenarios, our proposed algorithm significantly outperforms other machine learning algorithms. Furthermore, compared to traditional electronic medical record systems that rely on keyboard inputs, our system is much more efficient, and its accuracy rate increases with the increasing online time of the proposed system. Our results show that the proposed electronic medical record system is expected to revolutionize the traditional working approach of clinical departments, and it serves more efficient in clinics with low time consumption compared with traditional electronic medical record systems depending on keyboard inputs, which has less recording mistakes and lows down the time consumption in modification of medical recordings; due to the proposed speech recognition electronic medical record system is built on knowledge database of medical terms, so it has a good generalized application and adaption in the clinical scenarios for hospitals.
{"title":"An online intelligent electronic medical record system via speech recognition","authors":"Xin Xia, Yunlong Ma, Ye Luo, Jianwei Lu","doi":"10.1177/15501329221134479","DOIUrl":"https://doi.org/10.1177/15501329221134479","url":null,"abstract":"Traditional electronic medical record systems in hospitals rely on healthcare workers to manually enter patient information, resulting in healthcare workers having to spend a significant amount of time each day filling out electronic medical records. This inefficient interaction seriously affects the communication between doctors and patients and reduces the speed at which doctors can diagnose patients’ conditions. The rapid development of deep learning–based speech recognition technology promises to improve this situation. In this work, we build an online electronic medical record system based on speech interaction. The system integrates a medical linguistic knowledge base, a specialized language model, a personalized acoustic model, and a fault-tolerance mechanism. Hence, we propose and develop an advanced electronic medical record system approach with multi-accent adaptive technology for avoiding the mistakes caused by accents, and it improves the accuracy of speech recognition obviously. For testing the proposed speech recognition electronic medical record system, we construct medical speech recognition data sets using audio and electronic medical records from real medical environments. On the data sets from real clinical scenarios, our proposed algorithm significantly outperforms other machine learning algorithms. Furthermore, compared to traditional electronic medical record systems that rely on keyboard inputs, our system is much more efficient, and its accuracy rate increases with the increasing online time of the proposed system. Our results show that the proposed electronic medical record system is expected to revolutionize the traditional working approach of clinical departments, and it serves more efficient in clinics with low time consumption compared with traditional electronic medical record systems depending on keyboard inputs, which has less recording mistakes and lows down the time consumption in modification of medical recordings; due to the proposed speech recognition electronic medical record system is built on knowledge database of medical terms, so it has a good generalized application and adaption in the clinical scenarios for hospitals.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41599382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}