首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks 移动水下无线传感器网络能量覆盖问题的混合多目标节点部署
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221123533
Salmah Fattah, I. Ahmedy, Moh Yamani Idna Idris, Abdullah Gani
Underwater wireless sensor networks have grown considerably in recent years and now contribute substantially to ocean surveillance applications, marine monitoring and target detection. However, the existing deployment solutions struggle to address the deployment of mobile underwater sensor nodes as a stochastic system. The system faces internal and external environment problems that must be addressed for maximum coverage in the deployment region while minimizing energy consumption. In addition, the existing traditional approaches have limitations of improving simultaneously the objective function of network coverage and the dissipated energy in mobility, sensing and redundant coverage. The proposed solution introduced a hybrid adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition approach by adapting the original non-dominated sorting genetic algorithm II. This study evaluated the solution to substantiate its efficacy, particularly regarding the nodes’ coverage rate, energy consumption and the system’s Pareto optimal metrics and execution time. The results and comparative analysis indicate that the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy) is a better solution to the multi-objective sensor node deployment problem, outperforming the non-dominated sorting genetic algorithm II, SPEA2 and MOEA/D algorithms. Moreover, MOGA-AMPazy ensures maximum global convergence and has less computational complexity. Ultimately, the proposed solution enables the decision-maker or mission planners to monitor effectively the region of interest.
近年来,水下无线传感器网络发展迅速,目前对海洋监测应用、海洋监测和目标探测做出了重大贡献。然而,现有的部署解决方案很难将移动水下传感器节点的部署作为一个随机系统来解决。该系统面临内部和外部环境问题,必须解决这些问题,以最大限度地覆盖部署区域,同时最大限度地减少能源消耗。此外,现有的传统方法在同时提高网络覆盖的目标函数和移动性、感知和冗余覆盖中的耗散能量方面存在局限性。该解决方案在原有的非支配排序遗传算法II的基础上,引入了一种混合自适应多亲本交叉遗传算法和基于模糊优势的分解方法。本研究评估了该解决方案,以证实其有效性,特别是关于节点的覆盖率、能耗以及系统的Pareto最优指标和执行时间。结果和比较分析表明,基于自适应多父交叉和模糊优势的多目标优化遗传算法(MOGA-AMPazy)是解决多目标传感器节点部署问题的较好方法,优于非优势排序遗传算法II、SPEA2和MOEA/D算法。此外,MOGA-AMPazy确保了最大的全局收敛性,并且具有较小的计算复杂度。最终,所提出的解决方案使决策者或任务规划者能够有效地监控感兴趣的区域。
{"title":"Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks","authors":"Salmah Fattah, I. Ahmedy, Moh Yamani Idna Idris, Abdullah Gani","doi":"10.1177/15501329221123533","DOIUrl":"https://doi.org/10.1177/15501329221123533","url":null,"abstract":"Underwater wireless sensor networks have grown considerably in recent years and now contribute substantially to ocean surveillance applications, marine monitoring and target detection. However, the existing deployment solutions struggle to address the deployment of mobile underwater sensor nodes as a stochastic system. The system faces internal and external environment problems that must be addressed for maximum coverage in the deployment region while minimizing energy consumption. In addition, the existing traditional approaches have limitations of improving simultaneously the objective function of network coverage and the dissipated energy in mobility, sensing and redundant coverage. The proposed solution introduced a hybrid adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition approach by adapting the original non-dominated sorting genetic algorithm II. This study evaluated the solution to substantiate its efficacy, particularly regarding the nodes’ coverage rate, energy consumption and the system’s Pareto optimal metrics and execution time. The results and comparative analysis indicate that the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy) is a better solution to the multi-objective sensor node deployment problem, outperforming the non-dominated sorting genetic algorithm II, SPEA2 and MOEA/D algorithms. Moreover, MOGA-AMPazy ensures maximum global convergence and has less computational complexity. Ultimately, the proposed solution enables the decision-maker or mission planners to monitor effectively the region of interest.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46982522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks 认知无线电网络中的节能智能协同频谱感知算法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221125119
Tangsen Huang, Xiangdong Yin, Xiaowu Li
Green communication is the demand of current and future wireless communication. As the next-generation communication network, cognitive radio network also needs to meet the requirements of green communication. Therefore, improving energy efficiency is an inevitable requirement for the development of cognitive radio networks. However, there is a need to compromise sensing performance while improving energy efficiency. To take into account the two important indicators of sensing performance and energy efficiency, a grouping algorithm is proposed in this article, which can effectively improve the energy efficiency while improving the spectrum sensing performance. The algorithm obtains the initial value of the reliability of the nodes through training, and sorts them according to the highest reliability value, then selects an even number of nodes with the highest reliability value, and divides the selected nodes into two groups, and the two groups of nodes take turns in Alternate work. At this time, other nodes not participating in cooperative spectrum sensing are in a silent state, waiting for the instruction of the fusion center. The experimental results show that compared with the traditional algorithm, the proposed algorithm has a great improvement in the two indicators of sensing performance and energy efficiency.
绿色通信是当前和未来无线通信的需求。认知无线电网络作为下一代通信网络,也需要满足绿色通信的要求。因此,提高能量效率是认知无线电网络发展的必然要求。然而,需要在提高能源效率的同时折衷传感性能。考虑到传感性能和能源效率这两个重要指标,本文提出了一种分组算法,该算法可以在提高频谱传感性能的同时有效地提高能源效率。该算法通过训练获得节点可靠性的初始值,并根据最高可靠性值对其进行排序,然后选择偶数个可靠性值最高的节点,并将所选节点分为两组,两组节点轮流进行交替工作。此时,未参与协同频谱感知的其他节点处于静默状态,等待融合中心的指令。实验结果表明,与传统算法相比,该算法在传感性能和能效两个指标上都有很大的提高。
{"title":"Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks","authors":"Tangsen Huang, Xiangdong Yin, Xiaowu Li","doi":"10.1177/15501329221125119","DOIUrl":"https://doi.org/10.1177/15501329221125119","url":null,"abstract":"Green communication is the demand of current and future wireless communication. As the next-generation communication network, cognitive radio network also needs to meet the requirements of green communication. Therefore, improving energy efficiency is an inevitable requirement for the development of cognitive radio networks. However, there is a need to compromise sensing performance while improving energy efficiency. To take into account the two important indicators of sensing performance and energy efficiency, a grouping algorithm is proposed in this article, which can effectively improve the energy efficiency while improving the spectrum sensing performance. The algorithm obtains the initial value of the reliability of the nodes through training, and sorts them according to the highest reliability value, then selects an even number of nodes with the highest reliability value, and divides the selected nodes into two groups, and the two groups of nodes take turns in Alternate work. At this time, other nodes not participating in cooperative spectrum sensing are in a silent state, waiting for the instruction of the fusion center. The experimental results show that compared with the traditional algorithm, the proposed algorithm has a great improvement in the two indicators of sensing performance and energy efficiency.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47217543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher 全轮ANU-II超轻量级分组密码的差分密码分析
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221119398
Ting Fan, Lingchen Li, Yongzhuang Wei, E. Pasalic
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental methods applicable primarily to block ciphers, and the resistance against this type of cryptanalysis is a necessary design criterion. ANU-II is an ultra-lightweight block cipher proposed in 2017, whose design offers many advantages such as the use of fewer hardware resources (logic gates), low power consumption and fast encryption for Internet of Things devices. The designers of ANU-II claimed its resistance against differential cryptanalysis and postulated that the design is safe enough for Internet of Things devices. However, as addressed in this article, the security claims made by designers appear not to be well grounded. Using mixed-integer linear programming–like techniques, we identify one-round differential characteristic that holds with probability 1, which is then efficiently employed in mounting the key recovery attack on full-round ANU-II with only 22 chosen plaintexts and 262.4 full-round encryptions. The result shows that the designers’ security evaluation of ANU-II against differential cryptanalysis is incorrect and the design rationale is flawed. To remedy this weakness, we provide an improved variant of ANU-II, which has much better resistance to differential cryptanalysis without affecting the hardware and/or software implementation cost.
轻量级密码经常被用作资源受限设备中的底层加密算法。它们的密码安全性是确保数据传输安全的强制性目标。差分密码分析是主要适用于分组密码的最基本方法之一,抵抗这种类型的密码分析是必要的设计标准。ANU-II是2017年提出的一种超轻量级分组密码,其设计具有使用较少硬件资源(逻辑门)、低功耗和物联网设备快速加密等优点。ANU-II的设计者声称其对差分密码分析具有抵抗力,并假设该设计对于物联网设备来说足够安全。然而,正如本文所述,设计者提出的安全声明似乎没有很好的依据。使用类似混合整数线性规划的技术,我们确定了概率为1的一轮差分特征,然后将其有效地用于对只有22个选定明文和262.4个全轮加密的全轮ANU-II发起密钥恢复攻击。结果表明,设计者针对差分密码分析对ANU-II的安全性评估是不正确的,并且设计原理存在缺陷。为了弥补这一弱点,我们提供了一种改进的ANU-II变体,它在不影响硬件和/或软件实现成本的情况下对差分密码分析具有更好的抵抗力。
{"title":"Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher","authors":"Ting Fan, Lingchen Li, Yongzhuang Wei, E. Pasalic","doi":"10.1177/15501329221119398","DOIUrl":"https://doi.org/10.1177/15501329221119398","url":null,"abstract":"Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental methods applicable primarily to block ciphers, and the resistance against this type of cryptanalysis is a necessary design criterion. ANU-II is an ultra-lightweight block cipher proposed in 2017, whose design offers many advantages such as the use of fewer hardware resources (logic gates), low power consumption and fast encryption for Internet of Things devices. The designers of ANU-II claimed its resistance against differential cryptanalysis and postulated that the design is safe enough for Internet of Things devices. However, as addressed in this article, the security claims made by designers appear not to be well grounded. Using mixed-integer linear programming–like techniques, we identify one-round differential characteristic that holds with probability 1, which is then efficiently employed in mounting the key recovery attack on full-round ANU-II with only 22 chosen plaintexts and 262.4 full-round encryptions. The result shows that the designers’ security evaluation of ANU-II against differential cryptanalysis is incorrect and the design rationale is flawed. To remedy this weakness, we provide an improved variant of ANU-II, which has much better resistance to differential cryptanalysis without affecting the hardware and/or software implementation cost.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43677687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations 无人机:作为空中基站的应用、技术和挑战
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1177/15501329221123933
Rinju Mariam Rolly, Pandy Malarvezhi, T. Lagkas
Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability, and their ability to access unreachable locations. Extensive research is now widely performed on the deployment, performance analysis, resource management, trajectory optimization, and channel modeling in such networks. This survey article focuses on the different applications and the related algorithms for realizing aerial base stations by thoroughly reviewing each related research area. In a nutshell, this article provides key applications, challenges, and the technology used for the design and analysis of unmanned aerial vehicles as base stations.
下一代无线网络有望得到无人机的大力支持,无人机可以作为空中基站,为用户需求的急剧增长提供了一个有前途的解决方案。这是可能的,因为无人机具有机动性、灵活性、增加的视线概率以及进入无法到达的位置的能力。目前,对此类网络中的部署、性能分析、资源管理、轨迹优化和信道建模进行了广泛的研究。本文通过深入回顾各个相关研究领域,重点介绍了实现空中基站的不同应用和相关算法。简而言之,本文提供了作为基站的无人机的关键应用、挑战以及设计和分析所使用的技术。
{"title":"Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations","authors":"Rinju Mariam Rolly, Pandy Malarvezhi, T. Lagkas","doi":"10.1177/15501329221123933","DOIUrl":"https://doi.org/10.1177/15501329221123933","url":null,"abstract":"Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability, and their ability to access unreachable locations. Extensive research is now widely performed on the deployment, performance analysis, resource management, trajectory optimization, and channel modeling in such networks. This survey article focuses on the different applications and the related algorithms for realizing aerial base stations by thoroughly reviewing each related research area. In a nutshell, this article provides key applications, challenges, and the technology used for the design and analysis of unmanned aerial vehicles as base stations.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49304100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping 有源窃听条件下部署多天线接入点的无小区大规模多输入多输出系统的安全性能分析
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-01 DOI: 10.1177/15501329221114535
Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu
This article investigates the influence of multiple-antenna deployment at access points on physical layer security under cell-free massive multiple-input multiple-output systems. To embody the concept of network multiple-input multiple-output, cell-free massive multiple-input multiple-output employs a great deal of geographically distributed access points, which jointly serve multiple users in the same frequency-time resource. Assuming a malicious active eavesdropper having knowledge of instantaneous channel state information, we derive the asymptotic closed-form expression of the achievable secrecy rate, which is used to evaluate network security performance. A distributed power allocation scheme is developed based on channel fading degrees of different users. All of access points distribute a larger proportion of local transmission power to the users with better channel conditions. We verified that the security performance of the multi-antenna access points outperforms that of the single one. Compared to equal power allocation, the proposed power control algorithm can further boost the network security performance.
本文研究了在无小区大规模多输入多输出系统下,接入点多天线部署对物理层安全的影响。为了体现网络多输入多输出的概念,无小区大规模多输入多输采用了大量地理分布的接入点,在同一频率-时间资源中联合服务于多个用户。假设恶意主动窃听者知道瞬时信道状态信息,我们导出了可实现保密率的渐近闭式表达式,用于评估网络安全性能。提出了一种基于不同用户信道衰落程度的分布式功率分配方案。所有接入点都将较大比例的本地传输功率分配给信道条件较好的用户。我们验证了多天线接入点的安全性能优于单天线接入点。与等功率分配相比,所提出的功率控制算法可以进一步提高网络安全性能。
{"title":"Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping","authors":"Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu","doi":"10.1177/15501329221114535","DOIUrl":"https://doi.org/10.1177/15501329221114535","url":null,"abstract":"This article investigates the influence of multiple-antenna deployment at access points on physical layer security under cell-free massive multiple-input multiple-output systems. To embody the concept of network multiple-input multiple-output, cell-free massive multiple-input multiple-output employs a great deal of geographically distributed access points, which jointly serve multiple users in the same frequency-time resource. Assuming a malicious active eavesdropper having knowledge of instantaneous channel state information, we derive the asymptotic closed-form expression of the achievable secrecy rate, which is used to evaluate network security performance. A distributed power allocation scheme is developed based on channel fading degrees of different users. All of access points distribute a larger proportion of local transmission power to the users with better channel conditions. We verified that the security performance of the multi-antenna access points outperforms that of the single one. Compared to equal power allocation, the proposed power control algorithm can further boost the network security performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45375542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A structural health monitoring method proposal based on optical scanning and computational models 提出了一种基于光学扫描和计算模型的结构健康监测方法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-01 DOI: 10.1177/15501329221112606
W. Flores-Fuentes, I. Y. Alba-Corpus, O. Sergiyenko, J. Rodríguez-Quiñonez
This article proposes a method for continuous bridge displacement monitoring combining the dynamic triangulation scanning and load estimation by vehicle image recognition. The vehicle–bridge interaction is a non-stationary dynamic process parameter of high relevance to understanding the static instability behavior of bridges. The knowledge of the load on a bridge in the specific time when its structural spatial coordinates are measured allows correlating the bridge displacement with the effect of vehicle–bridge interaction. The evaluation of such correlation is mandatory in order to verify if the observed bridge displacement is due to the nature of its operation or due to it is presenting structural damage. The proposed method is continuous structural health monitoring method, based on the combination of three approaches evaluated at laboratory environment: (1) a three-dimensional optical scanning system for displacement measurement, (2) a load measurement system for vehicle–bridge interaction assessment, and (3) a two-measurement systems data correlation; to be implemented in bridges at a real environment to collect their historical behavior. Overall, for each approach, the measurement systems’ principles, the laboratory experimental methodology followed, and results obtained are presented.
本文提出了一种将动态三角扫描和车辆图像识别载荷估计相结合的桥梁位移连续监测方法。车辆-桥梁相互作用是一个非平稳动态过程参数,与理解桥梁的静态失稳行为具有高度相关性。当测量桥梁的结构空间坐标时,了解特定时间内桥梁上的荷载,可以将桥梁位移与车辆-桥梁相互作用的影响联系起来。为了验证观测到的桥梁位移是由于其运行性质还是由于其存在结构损伤,必须对这种相关性进行评估。所提出的方法是连续结构健康监测方法,基于在实验室环境中评估的三种方法的组合:(1)用于位移测量的三维光学扫描系统,(2)用于车辆-桥梁相互作用评估的载荷测量系统,以及(3)两个测量系统的数据相关性;在真实环境中的桥梁中实现,以收集它们的历史行为。总的来说,对于每种方法,都介绍了测量系统的原理、遵循的实验室实验方法和获得的结果。
{"title":"A structural health monitoring method proposal based on optical scanning and computational models","authors":"W. Flores-Fuentes, I. Y. Alba-Corpus, O. Sergiyenko, J. Rodríguez-Quiñonez","doi":"10.1177/15501329221112606","DOIUrl":"https://doi.org/10.1177/15501329221112606","url":null,"abstract":"This article proposes a method for continuous bridge displacement monitoring combining the dynamic triangulation scanning and load estimation by vehicle image recognition. The vehicle–bridge interaction is a non-stationary dynamic process parameter of high relevance to understanding the static instability behavior of bridges. The knowledge of the load on a bridge in the specific time when its structural spatial coordinates are measured allows correlating the bridge displacement with the effect of vehicle–bridge interaction. The evaluation of such correlation is mandatory in order to verify if the observed bridge displacement is due to the nature of its operation or due to it is presenting structural damage. The proposed method is continuous structural health monitoring method, based on the combination of three approaches evaluated at laboratory environment: (1) a three-dimensional optical scanning system for displacement measurement, (2) a load measurement system for vehicle–bridge interaction assessment, and (3) a two-measurement systems data correlation; to be implemented in bridges at a real environment to collect their historical behavior. Overall, for each approach, the measurement systems’ principles, the laboratory experimental methodology followed, and results obtained are presented.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42766509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine vision-based testing action recognition method for robotic testing of mobile application 基于机器视觉的机器人移动测试动作识别方法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-01 DOI: 10.1177/15501329221115375
Tao Zhang, Zhengqi Su, Jing Cheng, Feng Xue, Shengyu Liu
The explosive growth and rapid version iteration of various mobile applications have brought enormous workloads to mobile application testing. Robotic testing methods can efficiently handle repetitive testing tasks, which can compensate for the accuracy of manual testing and improve the efficiency of testing work. Vision-based robotic testing identifies the types of test actions by analyzing expert test videos and generates expert imitation test cases. The mobile application expert imitation testing method uses machine learning algorithms to analyze the behavior of experts imitating test videos, generates test cases with high reliability and reusability, and drives robots to execute test cases. However, the difficulty of estimating multi-dimensional gestures in 2D images leads to complex algorithm steps, including tracking, detection, and recognition of dynamic gestures. Hence, this article focuses on the analysis and recognition of test actions in mobile application robot testing. Combined with the improved YOLOv5 algorithm and the ResNet-152 algorithm, a visual modeling method of mobile application test action based on machine vision is proposed. The precise localization of the hand is accomplished by injecting dynamic anchors, attention mechanism, and the weighted boxes fusion in the YOLOv5 algorithm. The improved algorithm recognition accuracy increased from 82.6% to 94.8%. By introducing the pyramid context awareness mechanism into the ResNet-152 algorithm, the accuracy of test action classification is improved. The accuracy of the test action classification was improved from 72.57% to 76.84%. Experiments show that this method can reduce the probability of multiple detections and missed detection of test actions, and improve the accuracy of test action recognition.
各种移动应用程序的爆炸式增长和快速版本迭代给移动应用程序测试带来了巨大的工作量。机器人测试方法可以有效地处理重复性测试任务,弥补人工测试的准确性,提高测试工作的效率。基于视觉的机器人测试通过分析专家测试视频来识别测试动作的类型,并生成专家模拟测试用例。移动应用专家模仿测试方法利用机器学习算法分析专家模仿测试视频的行为,生成高可靠性和可重用性的测试用例,驱动机器人执行测试用例。然而,在二维图像中估计多维手势的难度导致了复杂的算法步骤,包括动态手势的跟踪、检测和识别。因此,本文主要研究移动应用机器人测试中测试动作的分析与识别。结合改进的YOLOv5算法和ResNet-152算法,提出了一种基于机器视觉的移动应用测试动作可视化建模方法。YOLOv5算法通过注入动态锚点、注意机制和加权盒融合实现手部的精确定位。改进后的算法识别准确率由82.6%提高到94.8%。通过在ResNet-152算法中引入金字塔上下文感知机制,提高了测试动作分类的准确率。测试动作分类准确率由72.57%提高到76.84%。实验表明,该方法可以降低测试动作的多次检测和漏检概率,提高测试动作识别的准确率。
{"title":"Machine vision-based testing action recognition method for robotic testing of mobile application","authors":"Tao Zhang, Zhengqi Su, Jing Cheng, Feng Xue, Shengyu Liu","doi":"10.1177/15501329221115375","DOIUrl":"https://doi.org/10.1177/15501329221115375","url":null,"abstract":"The explosive growth and rapid version iteration of various mobile applications have brought enormous workloads to mobile application testing. Robotic testing methods can efficiently handle repetitive testing tasks, which can compensate for the accuracy of manual testing and improve the efficiency of testing work. Vision-based robotic testing identifies the types of test actions by analyzing expert test videos and generates expert imitation test cases. The mobile application expert imitation testing method uses machine learning algorithms to analyze the behavior of experts imitating test videos, generates test cases with high reliability and reusability, and drives robots to execute test cases. However, the difficulty of estimating multi-dimensional gestures in 2D images leads to complex algorithm steps, including tracking, detection, and recognition of dynamic gestures. Hence, this article focuses on the analysis and recognition of test actions in mobile application robot testing. Combined with the improved YOLOv5 algorithm and the ResNet-152 algorithm, a visual modeling method of mobile application test action based on machine vision is proposed. The precise localization of the hand is accomplished by injecting dynamic anchors, attention mechanism, and the weighted boxes fusion in the YOLOv5 algorithm. The improved algorithm recognition accuracy increased from 82.6% to 94.8%. By introducing the pyramid context awareness mechanism into the ResNet-152 algorithm, the accuracy of test action classification is improved. The accuracy of the test action classification was improved from 72.57% to 76.84%. Experiments show that this method can reduce the probability of multiple detections and missed detection of test actions, and improve the accuracy of test action recognition.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45003836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Crack fault diagnosis of vibration exciter rolling bearing based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition 基于遗传算法优化Morlet小波滤波和经验模态分解的激振器滚动轴承裂纹故障诊断
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-01 DOI: 10.1177/15501329221114566
Xiaoming Han, Jin Xu, Songnan Song, Jiawei Zhou
The fault diagnosis of vibration exciter rolling bearing is of great significance to maintain the stability of vibration equipment. When the crack fault of the bearing occurs, the effective fault feature information cannot be extracted because the fault feature information of vibration signal is interfered by the noise around the vibrator. To solve this problem, a fault feature recognition method based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition is proposed. The Morlet wavelet filter optimized by genetic algorithm was used to filter the vibration signal, and then the empirical mode decomposition was applied to the filtered signal. In the envelope spectrum of the reconstructed signal, the characteristic frequency of the rolling bearing crack fault of the vibration exciter could be found accurately. Through simulation and experiment, it is proved that this method can provide theoretical and technical support for the crack fault diagnosis of vibration exciter rolling bearing.
激振器滚动轴承的故障诊断对维护振动设备的稳定具有重要意义。当轴承发生裂纹故障时,由于振动信号的故障特征信息受到振动器周围噪声的干扰,无法提取有效的故障特征信息。针对这一问题,提出了一种基于遗传算法优化的Morlet小波滤波和经验模态分解的故障特征识别方法。采用遗传算法优化的Morlet小波滤波器对振动信号进行滤波,然后对滤波后的信号进行经验模态分解。在重构信号的包络谱中,可以准确地找到激振器滚动轴承裂纹故障的特征频率。通过仿真和实验证明,该方法可为激振器滚动轴承裂纹故障诊断提供理论和技术支持。
{"title":"Crack fault diagnosis of vibration exciter rolling bearing based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition","authors":"Xiaoming Han, Jin Xu, Songnan Song, Jiawei Zhou","doi":"10.1177/15501329221114566","DOIUrl":"https://doi.org/10.1177/15501329221114566","url":null,"abstract":"The fault diagnosis of vibration exciter rolling bearing is of great significance to maintain the stability of vibration equipment. When the crack fault of the bearing occurs, the effective fault feature information cannot be extracted because the fault feature information of vibration signal is interfered by the noise around the vibrator. To solve this problem, a fault feature recognition method based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition is proposed. The Morlet wavelet filter optimized by genetic algorithm was used to filter the vibration signal, and then the empirical mode decomposition was applied to the filtered signal. In the envelope spectrum of the reconstructed signal, the characteristic frequency of the rolling bearing crack fault of the vibration exciter could be found accurately. Through simulation and experiment, it is proved that this method can provide theoretical and technical support for the crack fault diagnosis of vibration exciter rolling bearing.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41902765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A dynamic decentralized strategy of replica placement on edge computing 一种基于边缘计算的动态分散副本放置策略
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-01 DOI: 10.1177/15501329221115064
Yingying Yin, Leilei Deng
Smart phone and its applications are used more and more extensively in our daily life. Short delay of arriving data is important to these applications, especially to some time-sensitive ones. To reduce transmission latency and improve user experience, a dynamic decentralized data replica placement and management strategy which works in edge nodes is proposed in this article. It studies the location, access frequency, latency improvement, and cost spent on placing replicas on edge nodes to seek a balance between cost spent for storage and reduced latency. Specifically, dynamic and decentralized replica placement strategy algorithm has load guarantee for edge nodes to avoid overload; it dynamically create or delete data replicas on edge nodes according to the request frequency. Dynamic and decentralized replica placement strategy is decentralized to relieve transmission cost. Experiment results show that dynamic and decentralized replica placement strategy algorithm in edge computing environments can greatly reduce transmission latency, balance edge nodes load, and improve system performance. Dynamic and decentralized replica placement strategy also considers the cost spent for storage, and it pursues a balance between many factors.
智能手机及其应用程序在我们的日常生活中使用越来越广泛。数据到达的短延迟对这些应用程序非常重要,特别是对一些时间敏感的应用程序。为了减少传输延迟,提高用户体验,本文提出了一种适用于边缘节点的动态分散数据副本放置和管理策略。它研究位置、访问频率、延迟改进和在边缘节点上放置副本的成本,以在存储成本和减少延迟之间寻求平衡。其中,动态分散副本放置策略算法对边缘节点有负载保证,避免过载;它根据请求频率动态地创建或删除边缘节点上的数据副本。动态分散的副本放置策略是分散的,以减轻传输成本。实验结果表明,边缘计算环境下的动态分散副本放置策略算法可以大大降低传输延迟,平衡边缘节点负载,提高系统性能。动态和分散的副本放置策略还考虑了存储成本,并在许多因素之间寻求平衡。
{"title":"A dynamic decentralized strategy of replica placement on edge computing","authors":"Yingying Yin, Leilei Deng","doi":"10.1177/15501329221115064","DOIUrl":"https://doi.org/10.1177/15501329221115064","url":null,"abstract":"Smart phone and its applications are used more and more extensively in our daily life. Short delay of arriving data is important to these applications, especially to some time-sensitive ones. To reduce transmission latency and improve user experience, a dynamic decentralized data replica placement and management strategy which works in edge nodes is proposed in this article. It studies the location, access frequency, latency improvement, and cost spent on placing replicas on edge nodes to seek a balance between cost spent for storage and reduced latency. Specifically, dynamic and decentralized replica placement strategy algorithm has load guarantee for edge nodes to avoid overload; it dynamically create or delete data replicas on edge nodes according to the request frequency. Dynamic and decentralized replica placement strategy is decentralized to relieve transmission cost. Experiment results show that dynamic and decentralized replica placement strategy algorithm in edge computing environments can greatly reduce transmission latency, balance edge nodes load, and improve system performance. Dynamic and decentralized replica placement strategy also considers the cost spent for storage, and it pursues a balance between many factors.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47863988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review 模糊逻辑、遗传算法和人工神经网络在认知无线电网络中的应用综述
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-01 DOI: 10.1177/15501329221113508
A. Alkhayyat, Firas Abedi, A. Bagwari, Pooja Joshi, H. Jawad, S. Mahmood, Y. K. Yousif
Cognitive radios are expected to play an important role in capturing the constantly growing traffic interest on remote networks. To improve the usage of the radio range, a cognitive radio hub detects the weather, evaluates the open-air qualities, and then makes certain decisions and distributes the executives’ space assets. The cognitive radio works in tandem with artificial intelligence and artificial intelligence methodologies to provide a flexible and intelligent allocation for continuous production cycles. The purpose is to provide a single source of information in the form of a survey research to enable academics better understand how artificial intelligence methodologies, such as fuzzy logics, genetic algorithms, and artificial neural networks, are used to various cognitive radio systems. The various artificial intelligence approaches used in cognitive radio engines to improve cognition capabilities in cognitive radio networks are examined in this study. Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. This topic also covers cognitive radio network implementation and the typical learning challenges that arise in cognitive radio systems.
认知无线电有望在捕捉远程网络上不断增长的流量兴趣方面发挥重要作用。为了提高无线电范围的使用率,认知无线电中心检测天气,评估露天质量,然后做出某些决定并分配高管的空间资产。认知无线电与人工智能和人工智能方法协同工作,为连续的生产周期提供灵活和智能的分配。其目的是以调查研究的形式提供单一的信息来源,使学者能够更好地了解模糊逻辑、遗传算法和人工神经网络等人工智能方法如何用于各种认知无线电系统。本研究考察了认知无线电引擎中用于提高认知无线电网络认知能力的各种人工智能方法。在书面审计中使用了计算机推理方法,如模糊逻辑、进化算法和人工神经网络。本主题还涵盖认知无线电网络的实现以及认知无线电系统中出现的典型学习挑战。
{"title":"Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review","authors":"A. Alkhayyat, Firas Abedi, A. Bagwari, Pooja Joshi, H. Jawad, S. Mahmood, Y. K. Yousif","doi":"10.1177/15501329221113508","DOIUrl":"https://doi.org/10.1177/15501329221113508","url":null,"abstract":"Cognitive radios are expected to play an important role in capturing the constantly growing traffic interest on remote networks. To improve the usage of the radio range, a cognitive radio hub detects the weather, evaluates the open-air qualities, and then makes certain decisions and distributes the executives’ space assets. The cognitive radio works in tandem with artificial intelligence and artificial intelligence methodologies to provide a flexible and intelligent allocation for continuous production cycles. The purpose is to provide a single source of information in the form of a survey research to enable academics better understand how artificial intelligence methodologies, such as fuzzy logics, genetic algorithms, and artificial neural networks, are used to various cognitive radio systems. The various artificial intelligence approaches used in cognitive radio engines to improve cognition capabilities in cognitive radio networks are examined in this study. Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. This topic also covers cognitive radio network implementation and the typical learning challenges that arise in cognitive radio systems.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43859146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1