413 results
Search Results
2. Hybrid Delay-Minimization Scheduling Algorithm of FT and MPTS in WSN Data Aggregation.
- Author
-
Li, Cheng, Zhang, Guoyin, and Mao, Yan
- Subjects
MULTICASTING (Computer networks) ,WIRELESS sensor networks ,ALGORITHMS ,DATA transmission systems ,SCHEDULING ,INTERNET of things - Abstract
The data acquisition of Internet of Things (IoT) is mostly brought out by wireless sensor networks (WSNs), and the efficiency of IoT is directly affected by the time delay in the process of data acquisition, which is researched mainly by the data aggregation of WSNs. Minimizing the delay in the data aggregation process is one of the most important operations. In order to reduce the data aggregation delay, a hybrid delay-minimization data aggregation scheduling (HDDAS) algorithm is proposed, which optimizes the delay from the two main aspects that affect the delay, namely, the transmission path and the collision rate. Accordingly, the algorithm is divided into two phases: the aggregation tree construction and the data transmission scheduling. In the aggregation tree construction phase, the fat tree (FT) is introduced to generate an optimal aggregation tree with the shortest path; in the data transmission scheduling phase, the maximum parallel transmission set (MPTS) is adopted to increase the amount of the collision-free data transmission. The simulation experiment results demonstrate that the HDDAS algorithm proposed in the paper has performed favorably in terms of the data aggregation delay. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm.
- Author
-
Wu, Hongjiao
- Subjects
INTRUSION detection systems (Computer security) ,WIRELESS sensor networks ,ALGORITHMS ,WIRELESS channels ,COMPUTATIONAL complexity ,ENERGY consumption - Abstract
For the characteristics of channel instability in wireless sensor networks, this paper proposes an intrusion detection algorithm based on FedAvg (federated averaging) and XGBoost (extreme gradient boosting) wireless sensor networks using fog computing architecture. First, the network edge is extended by introducing fog computing nodes to reduce the communication delay. It reduces the transmission bandwidth and privacy leakage risk while improving the accuracy of jointly learned global and local models. Then, the histogram-based approximation calculation method is improved to adapt to the unbalanced data characteristics of wireless sensor networks. Finally, by introducing TOP-K gradient selection, the number of model parameter uploads is minimized, and the efficiency of model parameter interaction is improved. The experimental results show that this algorithm has superior detection performance and low energy consumption. It is also compared with other algorithms to demonstrate the high detection rate and low computational complexity of this algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Security and Privacy Protection of Internet of Vehicles Consensus Algorithm Based on Wireless Sensors.
- Author
-
Zhang, Yao and Ji, Gaoqing
- Subjects
INTERNET privacy ,WIRELESS sensor networks ,SENSOR networks ,DATA encryption ,ALGORITHMS ,DATA privacy ,DETECTORS ,DISTRIBUTED algorithms ,KALMAN filtering - Abstract
Due to its large network scale, open communication environment, unstable wireless network, and other characteristics, it is extremely vulnerable to attacks and causes security problems, resulting in the collapse of the Internet of Vehicles system. The application of the Internet of Vehicles is becoming more and more extensive, but there are still problems such as information security and privacy leakage in the Internet of Vehicles. Through the analysis of the security threats and privacy protection requirements faced by the Internet of Vehicles system, this paper mainly studies information security, vehicle identity privacy, and location privacy in the process of Internet of Vehicles wireless communication. Therefore, it is urgent to conduct research on the information security and privacy protection issues of the Internet of Vehicles. This paper discusses the research on the security and privacy protection of the consensus algorithm for the Internet of Vehicles based on wireless sensors, compares and analyzes the wireless sensor data privacy protection protocols based on sharding technology, Tongtai encryption technology, and perturbation technology, and selects an optimized Kalman consensus filter. The algorithm is applied to the node information exchange of the sensor network, and two filters (low pass and band pass) are used to unify the observations and covariance of the network. Estimation of the sensor network state with and without data packet loss, the effect of system estimation error under different packet loss rates, data privacy protection algorithm performance, vehicle network data communication volume, and confusion factors on algorithm efficiency and the node energy consumption was compared and analyzed. Based on the application of wireless sensors, the estimation error and inconsistency estimation error of the algorithm in this paper finally converge to about 0.5, and both can maintain good stability and have good robustness. In addition, the communication volume of the algorithm in this paper is about 30% of the SCPDA algorithm. The Kalman consensus filtering algorithm reduces the amount of confusing data sent, improves privacy protection, and also achieves lower communication overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. Nonuniform Clustering of Wireless Sensor Network Node Positioning Anomaly Detection and Calibration.
- Author
-
Lu, Biao and Liu, Wansu
- Subjects
WIRELESS sensor networks ,WIRELESS sensor nodes ,ANOMALY detection (Computer security) ,MAXIMUM likelihood statistics ,ALGORITHMS ,HIERARCHICAL clustering (Cluster analysis) - Abstract
In order to detect and correct node localization anomalies in wireless sensor networks, a hierarchical nonuniform clustering algorithm is proposed. This paper designs a centroid iterative maximum likelihood estimation location algorithm based on nonuniformity analysis, selects the nonuniformity analysis algorithm, gives the flowchart of node location algorithm, and simulates the distribution of nodes with MATLAB. Firstly, the algorithm divides the nodes in the network into different network levels according to the number of hops required to reach the sink node. According to the average residual energy of nodes in each layer, the sink node selects the nodes with higher residual energy in each layer of the network as candidate cluster heads and selects a certain number of nodes with lower residual energy as additional candidate cluster heads. Then, at each level, the candidate cluster heads are elected to produce the final cluster heads. Finally, by controlling the communication range between cluster head and cluster members, clusters of different sizes are formed, and clusters at the level closer to the sink node have a smaller scale. By simulating the improved centroid iterative algorithm, the values of the optimal iteration parameters α and η are obtained. Based on the analysis of the positioning errors of the improved centroid iterative algorithm and the maximum likelihood estimation algorithm, the value of the algorithm conversion factor is selected. Aiming at the problem of abnormal nodes that may occur in the process of ranging, a hybrid node location algorithm is further proposed. The algorithm uses the ℓ 2 , 1 norm to smooth the structured anomalies in the ranging information and realizes accurate positioning while detecting node anomalies. Experimental results show that the algorithm can accurately determine the uniformity of distribution, achieve good positioning effect in complex environment, and detect abnormal nodes well. In this paper, the hybrid node location algorithm is extended to the node location problem in large-scale scenes, and a good location effect is achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
6. Taylor-Spotted Cat Optimization (Taylor-SCO): An Energy-Efficient Cluster Head Selection Algorithm with Improved Trust Factor for Data Routing in WSN.
- Author
-
Kalburgi, Shivaraj and Manimozhi, M.
- Subjects
WIRELESS sensor networks ,ROUTING algorithms ,ALGORITHMS ,AGRICULTURE ,ENERGY consumption ,COMPUTER network security ,OWLS - Abstract
Wireless Sensor Network (WSN) has inexpensive, small, and less energy sensor nodes, which are allocated in random ways in particular areas for measuring the phenomenon or events in that field. In recent days, WSN has played a vital role in various applications, like industrial monitoring, medical treatments, agricultural monitoring, and military operations. However, the security challenges and network lifetime are the main issues in the existing methods. In order to overcome these issues, the Taylor-Spotted Cat Optimization (Taylor-SCO) approach is devised in this paper. Here, the Cluster Heads (CHs) are selected based on the developed optimization method, named Taylor CSO. Moreover, the delay, distance, and energy parameters are considered for effective Cluster Head Selection (CHS). Here, route maintenance is also done for increasing network lifetime and reducing complexities. In addition, the Modified K-Vertex Disjoint Paths Routing (KVDPR) model is established for routing. The modification of KVDPR is carried out using several factors, such as link reliability, throughput, and various trust factors. Moreover, the developed Taylor-SCO algorithm is developed by combining the Spotted Hyena Optimizer (SHO), Cat Swarm Optimization (CSO) algorithm, and Taylor series. The Taylor-SCO achieved better performance with energy consumption, trust, and throughput of 0.00037 J, 0.51, and 793160 kbps. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Application of Wireless Sensor Network Technology Using Intelligent Algorithm in Mismatch Detection of Photovoltaic Power Generation.
- Author
-
Xie, Nan, Chen, Yao, and He, Ping
- Subjects
PHOTOVOLTAIC power generation ,WIRELESS sensor networks ,PHOTOVOLTAIC power systems ,ALGORITHMS ,TEMPERATURE sensors - Abstract
The paper was aimed at ensuring the stable operation of the photovoltaic power generation system (PVPGS) and improving the accuracy of automatic mismatch detection. Consequently, this paper presents a PVPGS-oriented mismatch detection system based on wireless sensing technology (WSN). Firstly, the photovoltaic array (PVA) is constructed using a microcontroller, power management chip, nRF24L01, temperature sensor, voltage, and current sensor. Then, a fault detection and localization (FDL) scheme based on the Hampel algorithm is optimized, and Matlab/Simulink implements the PVA simulation model. Finally, several typical mismatch faults are simulated to verify the feasibility of the proposed FDL scheme using the measured voltage and current data. The empirical findings corroborate that the proposed FDL scheme can automatically and regularly collect photovoltaic (PV) electrical characteristic data and quickly and accurately identify and position a mismatch. In the case of a PVA open-circuit fault, the output current loss of the PVA is equal to the sum of the current of the open-circuit fault string in the array during normal operation. When the PVA is short-circuited, the PVA output voltage loss equals the sum of the output voltages of the faulty components in the most serious fault string under normal operation. Overall, the classification accuracy of the proposed FDL scheme is 97.556%. Lastly, the experiment reveals that the classification accuracy of the proposed FDL scheme is 100% for array aging, shadow, and the open circuit. Therefore, the research proposal has a good application prospect. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. On-Chip Embedded Debugging System Based on Leach Algorithm Parameter on Detection of Wireless Sensor Networks.
- Author
-
Song, Wenguang, Chen, Haiyu, Zhang, Qiujuan, Zhang, Bingxin, Wang, Hao, and Xu, Hao
- Subjects
WIRELESS sensor networks ,ALGORITHMS ,DEBUGGING ,WIRELESS sensor nodes ,COMPUTER network protocols ,SENSOR networks ,MULTISENSOR data fusion ,DATA transmission systems - Abstract
Leach (low energy adaptive clustering hierarchy) algorithm is a self-clustering topology algorithm. Its execution process is cyclical. Each cycle is divided into two phases: cluster building phase and stable data communication phase. In the stage of cluster building, the adjacent nodes cluster dynamically and randomly generate cluster heads. In the data communication phase, the nodes in the cluster send the data to the cluster head, and the cluster head performs data fusion and sends the results to the aggregation node. Because the cluster head needs to complete data fusion, communication with the convergence node and other works, the energy consumption is large. Leach algorithm can ensure that each node acts as cluster head with equal probability, so that the nodes in the network consume energy relatively evenly. The basic idea of Leach algorithm is to randomly select cluster head nodes in a circular way. It evenly distributes the energy load of the whole network to each sensor node in the network. It can reduce network energy consumption and improve network life cycle. Leach repeatedly performs cluster refactoring during its operation. This paper studies the parameter detection of wireless sensor network based on Leach algorithm on the on-chip embedded debugging system. Because the classical low-power adaptive clustering layered protocol (Leach) has the problem of energy imbalance and short node life cycle, this paper uses embedded debugging technology based on Leach algorithm and the residual energy and position of nodes in wireless sensor networks were tested for research. This Leach algorithm uses the concept of wheel. Each round consists of two phases: initialization and stabilization. In the initialization stage, each node generates a random number between 0 and 1. If the random number generated by a node is less than the set threshold T (n), the node publishes a message that it is a cluster head. Through the research on the parameter detection, the simulation results show that the research in this paper has good feasibility and rationality. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
9. An Energy-Efficient One-Shot Scheduling Algorithm for Wireless Sensor Networks.
- Author
-
Bo, Zeng, Dong, Yabo, He, Jie, and Dongming, Lu
- Subjects
WIRELESS sensor networks ,TIME division multiple access ,WIRELESS channels ,DATA transmission systems ,ALGORITHMS ,ENERGY consumption - Abstract
In low-load wireless sensor networks, the power consumption of the node consists mainly of two parts: data transmission and node state switching. The lower node workload causes low energy consumption on data transmission, and the state switching energy of the node cannot be ignored. This paper proposes a one-shot time division multiple access (TMDA) scheduling with unlimited channels (SUC) on the assumption that the number of available channels is unlimited. SUC combines the receiver-based consecutive slot allocation with channel allocation, which minimises the number of node state switching and optimizes energy efficiency. Theoretical analysis demonstrates that the number of channels required by SUC does not exceed log 2 N + 1 , where N indicates the number of nodes. Seeing that the number of available wireless channels is limited in practice, the paper proposes the scheduling with limited channels (SLC) and uses a Lookahead Search mechanism to solve slot conflict. For the scalability of the algorithm, a distributed implementation based on the token change is proposed. The algorithm uses the depth-first-search (DFS) to pass the token to all nodes and terminates slot and channel assignment. The simulation results show our algorithm can reduce the energy consumption by minimizing the number of state switching and shorten the data aggregation time by reusing slots among nodes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. Virtual Viewpoint Film and Television Synthesis Based on the Intelligent Algorithm of Wireless Network Communication for Image Repair.
- Author
-
Zhang, Jianfeng
- Subjects
WIRELESS sensor networks ,SWARM intelligence ,WIRELESS communications ,WIRELESS sensor nodes ,IMAGE reconstruction ,ALGORITHMS ,TELEVISION broadcasting of films - Abstract
With the development of the computer vision field, the acquisition of scene depth information is one of the important topics in the three-dimensional reconstruction of the computer vision field, and its significance is particularly important. The purpose of this paper is to study the virtual viewpoint video synthesis for image restoration based on the intelligent algorithm of wireless network communication. Aiming at the hole problem caused by the change of occlusion relationship, this paper proposes a hole-filling method based on background recognition. A threshold segmentation algorithm is used to reduce the filling priority of foreground pixels at the boundary of the hole and fully solve the hole problem. This paper also proposes a wireless sensor network node positioning model with swarm intelligence algorithm, which combines swarm intelligence algorithm with some key issues of wireless sensor network, speeds up the convergence, and improves the traditional intelligence algorithm. According to the experimental data in this paper, the algorithm in this paper is about 20% higher than the traditional algorithm in PSNR. On SSIM, the performance of the algorithm in this paper is 4.6% higher than the traditional algorithm at most, and the lowest is 2.2%. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Design of Sports Training System and Motion Monitoring and Recognition under Wireless Sensor Network.
- Author
-
Jia, Yue
- Subjects
WIRELESS sensor networks ,PHYSICAL training & conditioning ,PROBLEM solving ,ALGORITHMS ,ACQUISITION of data - Abstract
In conventional sports training, coaches record and observe athletes' sports data and judge whether it is reasonable based on their own experience. This qualitative analysis method is highly subjective, has large errors, and is susceptible to interference. To solve the above problems, the design of the sports training system under the wireless sensor network and the research of movement monitoring and recognition become very important. This article aims to study the design of sports training system and the monitoring and recognition of actions under the wireless sensor network technology. This paper simulates the implementation of the proposed data collection protocol and the two basic protocols, the direct transfer algorithm and the flooding algorithm, and compares the protocol proposed in this paper with the other two algorithms in terms of average information transmission success rate and average network overhead. Among them, the average information transmission success rate represents the ratio of the number of messages successfully arriving at the base station to the total amount of information generated by all nodes, and the average network overhead represents the average number of messages sent by each node. Experimental results show that the data collection protocol proposed in this paper can dynamically provide different transmission qualities for information of different importance levels, effectively reducing network overhead, and the reduced overhead is 11% of the original. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
12. Using Wireless Sensor Network to Correct Posture in Sports Training Based on Hidden Markov Matching Algorithm.
- Author
-
Cui, Cui
- Subjects
WIRELESS sensor networks ,PHYSICAL training & conditioning ,ALGORITHMS ,UPLOADING of data ,WIRELESS communications ,WEB development - Abstract
This paper combines the research of wireless sensor networks and sports training and proposes a wireless sensor network-based intelligent sports training system. According to the requirements of the system, this design uses the wireless sensor network system as the platform for development and the ZigBee module for wireless communication. The advantage of this system is to transmit the obtained information to the ZigBee coordinator module, and after the processing of information and the resultant decision, a nonwearable unmonitored motion training model based on visual sensing is proposed. The motion terminal collects video data streams of user motion actions and extracts features to establish HMM motion recognition algorithm to achieve recognition of motion actions, automatic counting, and intelligent scoring functions. The template matching algorithm based on dynamic time regularization and weighted Euclidean distance realizes a universal real-time motion recognition algorithm with high standard and low latency and can guide the user's motion action based on similarity calculation. The intelligent sports training system is designed and developed to maintain a high-quality human-computer interaction experience with a real-time feedback client and uploads sports data to a cloud server via the HTTP protocol, which supports real-time sports proximity query and training plan development on the website. After practical application tests, the intelligent sports training system based on the wireless sensor network proposed in this paper is stable and reliable and adds fun and competitiveness to boring sports. The research of this paper has some reference value for the application of wireless sensor networks and the research of the motion recognition algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Elite Adaptive Simulated Annealing Algorithm for Maximizing the Lifespan in LSWSNs.
- Author
-
Zhou, Jie, Jia, Wenxian, Liu, Menghan, and Xu, Mengying
- Subjects
WIRELESS sensor networks ,ELITE (Social sciences) ,SIMULATED annealing ,ALGORITHMS ,COMPUTER network protocols ,ENVIRONMENTAL monitoring ,GENETIC algorithms - Abstract
Large-scale wireless sensor networks (LSWSNs) are currently one of the most influential technologies and have been widely used in industry, medical, and environmental monitoring fields. The LSWSNs are composed of many tiny sensor nodes. These nodes are arbitrarily distributed in a certain area for data collection, and they have limited energy consumption, storage capabilities, and communication capabilities. Due to limited sensor resources, traditional network protocols cannot be directly applied to LSWSNs. Therefore, the issue of maximizing the LSWSNs' lifetime by working with duty cycle design algorithm has been extensively studied in this paper. Encouraged by annealing algorithm, this work provides a new elite adaptive simulated annealing (EASA) algorithm to prolong LSWSNs' lifetime. We then present a sensor duty cycle models, which can make sure the full coverage of the monitoring targets and prolong the network lifetime as much as possible. Simulation results indicate that the network lifetime of EASA algorithm is 21.95% longer than that of genetic algorithm (GA) and 28.33% longer than that of particle swarm algorithm (PSO). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. Cloud Computing Database and Travel Smart Platform Design Based on LSTM Algorithm.
- Author
-
Chen, Dongfeng
- Subjects
DATA encryption ,ALGORITHMS ,CLOUD computing ,CLOUD storage ,WIRELESS sensor networks ,DATABASES ,INFORMATION services - Abstract
Information technology has played a key role in the development of the tourism planning service industry and has now become an important foundation for the survival and rapid development of the industry. In this context, due to the fast updating and popularization of information technology, it has greatly promoted the development of the tourism industry. In order to meet the current public demand for tourism information, this paper integrates cloud computing, VR technology, and big data analysis technology to build a smart platform for intelligent perception tourism information services. The system can obtain tourism information through mobile Internet terminals. Among them, the database of the smart tourism planning platform is the most important module. Aiming at the many difficulties in adapting data encryption in cloud storage applications, this article designs an adaptive CloudCrypt data encryption system based on cloud computing technology and proposes dynamic JavaScript dynamic analysis and automatic identification of data technology, through adaptive different cloud applications to obtain data encryption protection. CloudCrypt is suitable for typical cloud applications, such as mail and storage. The entry cost of the system is extremely low; it can fully guarantee the security of the tourism information platform database and can integrate wireless sensor networks into the tourism information platform. The network system composed of sensor nodes activates detection, calculation, and communication modules through wireless communication and has the advantages of low cost, low power consumption, and fast networking speed. In this paper, through the construction of integrated wireless sensor technology and cloud computing database, it is applied to the construction of a tourism smart platform, thereby promoting the development of smart travel technology. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. Advanced Sensor Technology and Applications in Industrial Control System 2014.
- Author
-
Tai-hoon Kim, Mohammed, Sabah, Ruay-Shiung Chang, and Ramos, Carlos
- Subjects
WIRELESS sensor networks ,TECHNOLOGICAL innovations ,IMAGE compression ,ALGORITHMS ,ELECTRIC power consumption - Published
- 2014
- Full Text
- View/download PDF
16. A Data Collection Method for Mobile Wireless Sensor Networks Based on Improved Dragonfly Algorithm.
- Author
-
Yue, Yinggao, Lu, Dongwan, Zhang, Yong, Xu, Minghai, Hu, Zhongyi, Li, Bo, Wang, Shuxin, and Ding, Haihua
- Subjects
WIRELESS sensor networks ,AD hoc computer networks ,BEES algorithm ,ACQUISITION of data ,ENERGY consumption ,ALGORITHMS ,DATA transmission systems - Abstract
For the sensing layer of the Internet of Things, the mobile wireless sensor network has problems such as limited energy of the sensor nodes, unbalanced energy consumption, unreliability, and long transmission delay in the data collection process. It is proved by mathematical derivation and theory that this is a typical multiobjective optimization problem. In this paper, the optimization goal is to minimize the energy consumption and improve the reliability under time-delay constraints and propose a path optimization mechanism to optimize the mobile Sink of mobile wireless sensor networks based on the improved dragonfly optimization algorithm. The algorithm takes full advantage of the abundant storage space, sufficient energy, and strong computing power of the mobile Sink to ensure network connectivity and improve network communication efficiency. Through simulation comparison and analysis, compared with random movement method, artificial bee colony algorithm, and basic dragonfly optimization algorithm, the energy consumption of the network is reduced, the lifespan of the network is increased, and the connectivity and transmission delay of the network are improved. The proposed algorithm balances the energy consumption of the sensors nodes to meet the network service quality and improve the reliability of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Coverage Optimization of Sensors under Multiple Constraints Using the Improved PSO Algorithm.
- Author
-
Ling, Haifeng, Zhu, Tao, He, Weixiong, Luo, Hongchuan, Wang, Qing, and Jiang, Yi
- Subjects
ALGORITHMS ,SENSOR placement ,DETECTORS ,SWARM intelligence ,WIRELESS sensor networks ,CONSTRAINT algorithms ,NONLINEAR systems ,PARTICLE swarm optimization - Abstract
Sensor deployment is an important issue in wireless sensor network (WSN), which is a typical nonlinear system. Conditions of both area coverage and point coverage should be considered in research studies on sensor coverage. It is generally necessary to ensure high coverage ratio of area when controlling sensor locations, and covering specific point targets to ensure long lifetime is also important sometimes. In current studies, swarm intelligence algorithms such as particle swarm optimization (PSO) are widely used to solve the sensor deployment problem in WSN. In this paper, coverage rate and network life indicators are analyzed comprehensively with establishment of a more general K-coverage model. In related calculation examples with different coverage requirements including target coverage, area coverage, and boundary coverage, several improved algorithms based on PSO are applied to solve the problem in the paper. Simulation results show that the improved algorithms can achieve a good performance and deployment effect. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
18. Research on Efficient Top-k Query Based on ARIMA Time Series Model.
- Author
-
Gu, Fenfei and Hu, Xiande
- Subjects
WIRELESS sensor networks ,TIME series analysis ,BOX-Jenkins forecasting ,SENSOR networks ,ENERGY consumption ,DATA transmission systems ,ALGORITHMS - Abstract
In wireless sensor networks, Top- k query is often used to query the first k values which can satisfy the user's criteria. In the process of query, in order to reduce the transmission of redundant data, different filtering windows are set for each sensor node. However, the filter windows often update because of the dynamic change of the data which will cause the huge consumption of the node energy. In order to solve this problem, a new algorithm based on ARIMA is proposed called AAFU (ARIMA approach based on the filter updating) in this paper. With this algorithm which is based on the FILA algorithm and ARIMA model, the base node can use time series model to predict the future data according to the collected historical data. This algorithm can reduce energy consumption that can make the sensor network effectively deal with the node window updating through comparison to decide whether update the filtering windows. The simulation results show that AAFU algorithm is superior FAPU algorithm with ensuring the accuracy of query. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Distributed Connectivity Restoration Algorithm with Optimal Repair Path in Wireless Sensor and Actor Networks.
- Author
-
Liu, Shangdong, Liu, Donghui, Feng, Yujian, and Ji, Yimu
- Subjects
WIRELESS sensor networks ,WIRELESS sensor nodes ,DISTRIBUTED algorithms ,GLOBAL production networks ,RECOVERY movement ,ALGORITHMS ,NETWORK performance - Abstract
The actor nodes in wireless sensor and actor network (WSAN) are responsible for receiving the perceived data, processing and collaborating with each other. In most scenarios, maintaining the connectivity of the interactor network is necessary to plan the optimal coordinated response. However, actors are vulnerable to damage due to their limited energy and harsh environment. At worst, such failure can split the interactor network, which is affecting network performance. To restore the network connectivity, the existing methods replace the failed node by selecting a redundant node in the network. Multiple nodes may be involved in moving from the redundant node to the failed node, thus forming a repair path. However, the repair paths generated by such methods are often not optimal. In this paper, we use the gradient generation and diffusion mechanism to restore the connectivity of the interactor network and propose a gradient-based distributed connectivity recovery (GDCR) algorithm. GDCR selects an optimal repair path from the global network based on the generated gradient distribution under fully distributed and localized conditions. GDCR can timely respond to the repair and minimize the recovery range and movement overhead. Simulation results verify the performance of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Human Health Activity Recognition Algorithm in Wireless Sensor Networks Based on Metric Learning.
- Author
-
Sun, Dejie, Zhang, Jie, Zhang, Shuai, Li, Xin, and Wang, Hangong
- Subjects
HUMAN activity recognition ,WIRELESS sensor networks ,ALGORITHMS ,KERNEL functions ,DATA transmission systems - Abstract
Wireless sensor network is an ad hoc network with sensing capability. Usually, a large number of sensor nodes are randomly deployed in an unreachable environment or complex area for data collection and transmission, which can realize the perception and monitoring of the target area or specific objects and transmit the obtained data to the remote end of the system. Human health activity recognition algorithm is a hot topic in the field of computer. Based on the small sample problem and the linear indivisibility of real samples encountered in metric learning, this paper proposes a human activity recognition algorithm for wireless sensor networks. Human activity recognition algorithm for wireless sensor networks uses human activity recognition algorithm to solve the singularity of intraclass divergence matrix, so as to reduce the impact of small sample problem. The algorithm maps two different feature spaces to the high-dimensional linearly separable kernel space through the corresponding kernel function, calculates the distance between samples in the two projected feature subspaces to obtain two distance measurement functions, and finally linearly combines them with weights to obtain the final distance measurement function. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. A Novel Efficient Data Gathering Algorithm for Disconnected Sensor Networks Based on Mobile Edge Computing.
- Author
-
Sun, Zeyu, Lan, Lan, Zeng, Cao, and Liao, Guisheng
- Subjects
WIRELESS sensor networks ,SENSOR networks ,EDGE computing ,MOBILE computing ,ALGORITHMS ,ENERGY consumption ,SPANNING trees - Abstract
Employing mobile elements is an efficient solution to the performance improvement of wireless sensor networks (WSNs). We propose an efficient data gathering mechanism for disconnected WSNs with rendezvous points (DGM-RPs). The mobile sink traverses the entire network and stops only at the rendezvous points (RPs) while gathers the data from sensors in every disconnected segment. In this paper, mobile sinks perform the task of edge computing and alleviate the load of upper cloud. We measure the shape of disconnected segments, layering them by use of the convex hull, and then design the travelling path of the mobile sink to minimize the travel latency to visit all disconnected segments. At least one RPs will be selected in a segment firstly, and then, on this basis, we consider the distribution density of sensor nodes and the location of the RPs already exist to adding new RPs, which make good use of the margin to reducing the energy consumption and prolong the network lifetime. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Congestion and Computer Program Control Algorithm Strategy for Wireless Sensor Networks Based on Cloud Model.
- Author
-
Xiao, Fei
- Subjects
WIRELESS sensor networks ,AUTOMATION ,COMPUTER software ,SENSOR networks ,ALGORITHMS - Abstract
Cloud model and sensor network are the research hotspots in recent years. This paper proposes a congestion and rate control strategy for wireless sensor networks based on cloud model. It adjusts the input rate of nodes based on cloud model through node congestion detection. Aiming at the problem of network congestion control, two congestion adjustment algorithms based on red are improved. Congestion threshold and congestion degree are used as the basis of packet transmission rate adjustment to realize network support plug control. In this paper, the congestion control strategy NP starts to alleviate congestion at about 40 s and controls the packet loss rate at about 116 packets/s, which is 45.3% lower than the multipath congestion control strategy and is more stable. However, when β = 0 , the packet loss rate of the double congestion threshold algorithm is 20% lower than that of the single congestion threshold algorithm. The reason is that the double congestion threshold algorithm allows a stronger source rate control mechanism earlier than the single congestion threshold algorithm a large number of packets are lost in a point, but this also makes the network performance relatively low. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Encryption Management of Accounting Data Based on DES Algorithm of Wireless Sensor Network.
- Author
-
Lu, Zixin
- Subjects
DATABASE management ,WIRELESS sensor networks ,MATHEMATICAL logic ,ENCRYPTION protocols ,DATA encryption ,ALGORITHMS - Abstract
The emergence of wireless sensor networks connects the physical world with the information world and changes the way humans interact with nature. With the rapid development of modern information technology, accounting information systems (AIS) have emerged at the historic moment. Under the information environment, accounting data exists in paper or paperless form. The use of information technology not only brings convenient and efficient services to enterprises but also has a huge impact on the internal control of the enterprise. Because the network is open and unstable, the system is vulnerable to illegal intrusion and viruses. Based on the above background, the research content of this article is to use DES algorithm to encrypt accounting data. DES (Data Encryption Standard) encryption algorithm is a symmetric password encryption method. It has the advantages of fast encryption speed, simple and practical algorithm, and consideration of both security and efficiency requirements. This paper discusses the application of DES encryption technology to accounting data processing. To achieve data security management goals. Therefore, this paper proposes a DES algorithm based on the logistic chaotic system. Through experimental simulation, the results show that the chaotic discrete model has initial value sensitivity and iterative nonrepetition. The resulting key space is independent and random. In the application, you can perform random key input according to the performance of software and hardware, which is flexible; there is only one "1186828" in the initial DES algorithm encryption process, but each set of plain text in the improved DES algorithm corresponds to a corresponding set of keys and independence. The test results show that they are maintained between 5 and 6.6. It is proved that using the initial value sensitivity of the logistic system and using the initial value as the key can realize the secure management of accounting data on the premise of ensuring efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. A Multifilter Location Optimization Algorithm Based on Neural Network in LOS/NLOS Mixed Environment.
- Author
-
Bian, Zhentian, Cheng, Long, and Wang, Yan
- Subjects
MATHEMATICAL optimization ,WIRELESS sensor networks ,ALGORITHMS ,REAL-time computing - Abstract
While the modern communication system, embedded system, and sensor technology have been widely used at the moment, the wireless sensor network (WSN) composed of microdistributed sensors is favored due to its relatively excellent communication interaction, real-time computing, and sensing capabilities. Because GPS positioning technology cannot meet the needs of indoor positioning, positioning based on WSN has become the better option for indoor localization. In the field of WSN indoor positioning, how to cope with the impact of NLOS error on positioning is still a big problem to be solved. In order to mitigate the influence of NLOS errors, a Neural Network Modified Multiple Filter Localization (NNMML) algorithm is proposed in this paper. In this algorithm, LOS and NLOS cases are distinguished firstly. Then, KF and UKF are applied in the LOS case and the NLOS case, respectively, and appropriate grouping processing is carried out for NLOS data. Finally, the positioning results after multiple filtering are corrected by neural network. The simulation results illustrate that the location accuracy of NNMML algorithm is better than that of KF, EKF, UKF, and the version without neural network correction. It also shows that NNMML is suitable for the situation with large NLOS error. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
25. Improved Byzantine Fault-Tolerant Algorithm Based on Alliance Chain.
- Author
-
Gao, Wuqi, Mu, Wubin, Huang, Shanshan, Wang, Man, and Li, Xiaoyan
- Subjects
BLOCKCHAINS ,FAULT tolerance (Engineering) ,ALGORITHMS ,WIRELESS sensor networks ,GOVERNMENT business enterprises - Abstract
Alliance chain is a typical multicenter block chain and is easily implemented, so it is supported by more and more enterprises and governments. This paper analyzes the advantages and disadvantages of the Practical Byzantine Fault Tolerance (PBFT) in the alliance chain application scene. Aiming at the low efficiency of multinode consensus of the PBFT algorithm, the C-Raft-PBFT consensus algorithm is proposed. By integrating the Raft algorithm and the PBFT algorithm with the credit mechanism, designing node credit evaluation and grading protocols, and increasing Byzantine node detection based on feedback mechanism and other methods, the system efficiency is improved. The experiment results show that the improved algorithm has better throughput and lower delay, and the system's fault tolerance is also improved. Among them, the delay is reduced by 1.93 seconds on average; in the case of an increase in system nodes, the number of nodes in the experimental data is between 200 and 225, and the throughput is increased by 6.46% on average. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
26. Motion Attitude Recognition and Behavior Prediction Algorithm Based on Wireless Sensor Network.
- Author
-
Zhang, Tianping, Zhang, Bo, Liu, Lei, and Liu, Yang
- Subjects
WIRELESS sensor networks ,RECOGNITION (Philosophy) ,VIDEO surveillance ,ALGORITHMS ,COST functions ,ATTITUDE (Psychology) ,DATA fusion (Statistics) - Abstract
The wireless sensor network is an integral part of the physical information system. Disperse sensors through a set of special spaces track and record the natural state of the environment and manage the information collected in a central location. The sensors use wireless connections to create their own networks. Wireless sensor network technology has the advantages of flexible deployment and convenient use and has played an important role in the field of user behavior recognition. By deploying wireless sensor network technology, users can collect daily information, capture users' behavior habits, and analyze users' health status. In the deployment and application of this type of technology, it is very important to build an effective model of the logical sequence relationship of the monitored person's behavior. The sensor data can be sent to the target user through wireless transmission. Action recognition is often based on a single feature for learning and judgment, so there are many difficulties in practical applications. This article aims to study motion shake awareness and action prediction algorithms based on wireless sensor networks. Aiming at the research of human pose recognition algorithm, to optimize the overall performance of the model, this article suggests the use of multimodal input, uses a 2D and 3D network structure, and finally, proposes two network weighted fusion strategies. Aiming at the research of pedestrian motion discrimination, this article offers a behavior prediction algorithm based on multifeature joint learning. The algorithm adds the feature vectors output by gesture recognition and mask prediction and uses a cross-entropy cost function to jointly learn and predict classification. The results of the survey show that the pedestrian gesture recognition and motion recognition algorithm based on the wireless sensor network proposed in this paper has good performance and can be widely used in real scenes such as video surveillance. The accuracy of the gesture recognition algorithm in the UCF101 dataset and the HMDB51 dataset was 96% and 72%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Low-Energy Secure Routing Protocol for WSNs Based on Multiobjective Ant Colony Optimization Algorithm.
- Author
-
Wang, Xueli
- Subjects
WIRELESS sensor networks ,ANT algorithms ,ALGORITHMS ,ROUTING algorithms ,ENERGY consumption - Abstract
As one of the three pillars of information technology, wireless sensor networks (WSNs) have been widely used in environmental detection, healthcare, military surveillance, industrial data sampling, and many other fields due to their unparalleled advantages in deployment cost, network power consumption, and versatility. The advent of the 5G standard and the era of Industry 4.0 have brought new opportunities for the development of wireless sensor networks. However, due to the limited power capacity of the sensor nodes themselves, the harsh deployment environment will bring a great difficulty to the energy replenishment of the sensor nodes, so the energy limitation problem has become a major factor limiting its further development; how to improve the energy utilization efficiency of WSNs has become an urgent problem in the scientific and industrial communities. Based on this, this paper researches the routing technology of wireless sensor networks, from the perspective of improving network security, and reducing network energy consumption, based on the study of ant colony optimization algorithm, further studies the node trust evaluation mechanism, and carries out the following research work: (1) study the energy consumption model of wireless sensor networks; (2) basic ant colony algorithm improvement; (3) multiobjective ant colony algorithm based on wireless sensor routing algorithm optimization. In this study, the NS2 network simulator is used as a simulation tool to verify the performance of the research algorithm. Compared with existing routing algorithms, the simulation results show that the multiobjective ant colony optimization algorithm has better performance in evaluation indexes such as life cycle, node energy consumption, node survival time, and stability compared with the traditional algorithm and the dual cluster head ant colony optimization algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Rotated Black Hole: A New Heuristic Optimization for Reducing Localization Error of WSN in 3D Terrain.
- Author
-
Chai, Qing-Wei and Zheng, Jerry Wangtao
- Subjects
BLACK holes ,PROBLEM solving ,WIRELESS sensor networks ,ALGORITHMS ,EXTRATERRESTRIAL beings - Abstract
Wireless sensor network (WSN) attracts the attention of more and more researchers, and it is applied in more and more environment. The localization information is one of the most important information in WSN. This paper proposed a novel algorithm called the rotated black hole (RBH) algorithm, which introduces a rotated optimal path and greatly improves the global search ability of the original black hole (BH) algorithm. Then, the novel algorithm is applied in reducing the localization error of WSN in 3D terrain. CEC 2013 test suit is used to verify the performance of the novel algorithm, and the simulation results show that the novel algorithm has better search performance than other famous intelligence computing algorithms. The localization simulation experiment results reveal that the novel algorithm also has an excellent performance in solving practical problems. WSN localization 3D terrain intelligence computing rotated the black hole algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. Intelligent Channel Allocation for Age of Information Optimization in Internet of Medical Things.
- Author
-
Wei, Kefeng, Zhang, Lincong, and Wang, Shupeng
- Subjects
INTERNET of things ,INFORMATION society ,GREEDY algorithms ,ALGORITHMS ,ENERGY consumption ,WIRELESS sensor networks - Abstract
Along with the development of realtime applications, the freshness of information becomes significant because the overdue information is worthless and useless and even harmful to the right judgement of system. Therefore, The Age of Information (AoI) used for marking the freshness of information is proposed. In Internet of Medical Things (IoMT), which is derived from the requirement of Internet of Thins (IoT) in medicine, high freshness of medical information should be guaranteed. In this paper, we introduce the AoI of medical information when allocating channels for users in IoMT. Due to the advantages of Deep Q-learning Network (DQN) applied in resource management in wireless network, we propose a novel DQN-based Channel Allocation (DQCA) algorithm to provide the strategy for channel allocation under the optimization of the system cost considering the AoI and energy consumption of coordinator nodes. Unlike the traditional centralized channel allocation methods, the DQCA algorithm is distributed as each user performs the DQN process separately. The simulation results show that our proposed DQCA algorithm is superior to Greedy algorithm and Q-learning algorithm in terms of the average AoI, average energy consumption and system cost. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. Hybrid Strategy of Multiple Optimization Algorithms Applied to 3-D Terrain Node Coverage of Wireless Sensor Network.
- Author
-
Zhang, Li-Gang, Fan, Fang, Chu, Shu-Chuan, Garg, Akhil, and Pan, Jeng-Shyang
- Subjects
WIRELESS sensor nodes ,MATHEMATICAL optimization ,EVOLUTIONARY algorithms ,WIRELESS sensor networks ,ALGORITHMS ,DIFFERENTIAL evolution - Abstract
The key to the problem of node coverage in wireless sensor networks (WSN) is to deploy a limited number of sensors to achieve maximum coverage. This paper studies the hybrid strategies of multiple evolutionary algorithms, and applies them to the problem of WSN node coverage. We first proposed the hybrid algorithm SFLA-WOA (SWOA) based on Shuffled Frog Leaping Algorithm (SFLA) and Whale Optimization Algorithm (WOA). The SWOA algorithm combines the advantages of SFLA and WOA; that is, it retains the unique evolution model of WOA and also has the excellent co-evolution capability of SFLA. Secondly, using the mutation, crossover and selection operations of the differential evolution (DE) algorithm to further optimize this hybrid algorithm, the SWOA-based SFLA-WOA-DE (SWOAD) algorithm is proposed. In addition, the performance of SWOA and SWOAD has been tested by 30 benchmark functions in the CEC 2017 test set. Experimental results show that the optimization effects of these two algorithms are very outstanding. Finally, the simulation results show that the optimization algorithm proposed in this paper has a good effect on improving the signal coverage of WSN under the actual three-dimensional terrain. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. WSNs Compressed Sensing Signal Reconstruction Based on Improved Kernel Fuzzy Clustering and Discrete Differential Evolution Algorithm.
- Author
-
Liu, Zhou-zhou and Li, Shi-ning
- Subjects
IMAGE reconstruction algorithms ,DIFFERENTIAL evolution ,FUZZY algorithms ,SIGNAL reconstruction ,WIRELESS sensor networks ,COMPRESSED sensing ,ALGORITHMS - Abstract
To reconstruct compressed sensing (CS) signal fast and accurately, this paper proposes an improved discrete differential evolution (IDDE) algorithm based on fuzzy clustering for CS reconstruction. Aiming to overcome the shortcomings of traditional CS reconstruction algorithm, such as heavy dependence on sparsity and low precision of reconstruction, a discrete differential evolution (DDE) algorithm based on improved kernel fuzzy clustering is designed. In this algorithm, fuzzy clustering algorithm is used to analyze the evolutionary population, which improves the pertinence and scientificity of population learning evolution while realizing effective clustering. The differential evolutionary particle coding method and evolutionary mechanism are redefined. And the improved fuzzy clustering discrete differential evolution algorithm is applied to CS reconstruction algorithm, in which signal with unknown sparsity is considered as particle coding. Then the wireless sensor networks (WSNs) sparse signal is accurately reconstructed through the iterative evolution of population. Finally, simulations are carried out in the WSNs data acquisition environment. Results show that compared with traditional reconstruction algorithms such as StOMP, the reconstruction accuracy of the algorithm proposed in this paper is improved by 36.4-51.9%, and the reconstruction time is reduced by 15.1-31.3%. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
32. An Improved Algorithm Based on Fast Search and Find of Density Peak Clustering for High-Dimensional Data.
- Author
-
Du, Hui, Ni, Yiyang, and Wang, Zhihe
- Subjects
K-means clustering ,WIRELESS sensor networks ,FEATURE selection ,SENSOR networks ,RANDOM forest algorithms ,ALGORITHMS ,DENSITY - Abstract
The find of density peak clustering algorithm (FDP) has poor performance on high-dimensional data. This problem occurs because the clustering algorithm ignores the feature selection. All features are evaluated and calculated under the same weight, without distinguishing. This will lead to the final clustering effect which cannot achieve the expected. Aiming at this problem, we propose a new method to solve it. We calculate the importance value of all features of high-dimensional data and calculate the mean value by constructing random forest. The features whose importance value is less than 10% of the mean value are removed. At this time, we extract the important features to form a new dataset. At this time, improved t-SNE is used for dimension reduction, and better performance will be obtained. This method uses t-SNE that is improved by the idea of random forest to reduce the dimension of the original data and combines with improved FDP to compose the new clustering method. Through experiments, we find that the evaluation index NMI of the improved algorithm proposed in this paper is 23% higher than that of the original FDP algorithm, and 9.1% higher than that of other clustering algorithms (K -means, DBSCAN, and spectral clustering). It has good performance in high-dimensional datasets that are verified by experiments on UCI datasets and wireless sensor networks. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. Multiagent Minimum Risk Path Intrusion Strategy with Computational Geometry.
- Author
-
Sun, Jianguo, Yan, Zining, and Li, Sizhao
- Subjects
COMPUTATIONAL geometry ,WIRELESS sensor networks ,SMART devices ,ALGORITHMS ,VORONOI polygons - Abstract
In wireless sensor networks (WSNs), inefficient coverage does affect the quality of service (QoS), which the minimum exposure path (MEP) is traditionally used to handle. But intelligent mobile devices are generally of limited computation capability, local storage, and energy. Present methods cannot meet the demand of multiple target intrusion, lacking the consideration of energy consumption. Based on the Voronoi diagram in computational geometry, this paper proposed an invasion strategy of minimum risk path (MRP) to such a question. MRP is the path considered both the exposure of the moving target and energy consumption. Federated learning is introduced to figure out how to find the MRP, expressed as C t i , t j = f E , e . The value of C t i , t j can measure the success of an invasion. At the time when a single smart mobile device invades, horizontal federated learning is taken to partition the path feature, and a single target feature federated (SPF) algorithm is for calculating the MRP. Moreover, for multi smart mobile device invasion, it has imported the time variable. Vertical federated learning can partition the feature of multipath data, and the multi-target feature federated (MFF) algorithm is for solving the multipath MRP dynamically. The experimental results show that the SPF and MFF have the dominant advantage over traditional computational performance and time. It primarily applies the complex conditions of a massive amount of sensor nodes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. Adaptive Chaotic Ant Colony Optimization for Energy Optimization in Smart Sensor Networks.
- Author
-
Jia, Wenxian, Liu, Menghan, and Zhou, Jie
- Subjects
ANT algorithms ,WIRELESS sensor networks ,INTELLIGENT sensors ,SENSOR networks ,PARTICLE swarm optimization ,INTELLIGENT networks ,ALGORITHMS - Abstract
Smart sensor network has the characteristics of low cost, low power consumption, real time, strong adaptability, etc., and it has a wide range of application prospects in the agricultural field. However, the smart sensor node is limited by its own energy; it also faces many bottlenecks in agricultural applications. Therefore, balancing the energy consumption of nodes and extending the life of the network are important considerations in the design of efficient routing for smart sensor networks. Aiming at the problem of energy constraints, this paper proposes an intelligent sensor network clustering algorithm based on adaptive chaotic ant colony optimization (ACACO). ACACO introduces logical chaotic mapping to interfere with the pheromone on the initial path and uses the adaptive strategy to improve the transition probability formula. After selecting the best next hop node, the advancing ants are released to update the local pheromone, and the current pheromone content is adjusted by the chaos factor. When the ants determine the path, they release subsequent ants to update the global pheromone. The simulation results show that ACACO has obvious advantages over genetic algorithm (GA) and particle swarm optimization (PSO). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
35. Throughput optimization of multi-hop and multi-path cooperation in WPSNs with hardware noises.
- Author
-
Yuan, Lina, Chen, Huajun, and Gong, Jing
- Subjects
WIRELESS sensor networks ,SENSOR networks ,DISTRIBUTED sensors ,TIME management ,HARDWARE ,ALGORITHMS ,COOPERATION - Abstract
This paper proposes a novel multi-path and multi-hop wireless powered sensor network in case of hardware impairment, constituting an energy node, one source node, single sink node, and a series of distributed relay sensor nodes, where the energy node transmits wireless energy to all terminals in the first stage, and the relay sensor nodes relay the information of the source node to the sink node in the second stage. There exists M available paths between the source node and sink node, one of which is chosen for serving source-sink communication. To enhance the minimum achievable data rate, we propose a multi-hop communication protocol based on time-division-multiple-access and an optimal throughput path algorithm. We formulate the time allocation optimization problem about energy and information transmission of the proposed multi-hop cooperation, and confirm through abundant simulation experiments that the proposed scheme can availably improve user unfairness and spectral efficiency, and thus enhance its throughput performance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Multistrategy Integrated Marine Predator Algorithm Applied to 3D Surface WSN Coverage Optimization.
- Author
-
Wang, Zhendong, Xiao, Hang, Yang, Shuxin, Wang, Junling, and Mahmoodi, Soroosh
- Subjects
DIFFERENTIAL evolution ,WIRELESS sensor nodes ,WIRELESS sensor networks ,SENSOR placement ,ALGORITHMS ,DIFFERENTIAL operators ,LOTKA-Volterra equations ,PARTICLE swarm optimization - Abstract
Achieving maximum network coverage with a limited number of sensor nodes is key to node deployment of wireless sensor network (WSN). This paper proposes an improved marine predator algorithm (IMPA) for 3D surface wireless sensor network deployment. A population evolution strategy based on random opposition-based learning and differential evolution operator is proposed to enrich the population diversity and improve the global search capability of the algorithm. The grouping idea of the Shuffled Frog Leaping Algorithm (SFLA) is then introduced. A local search strategy based on the SFLA is proposed to replace the FADs effect of MPA and enhance the ability of the algorithm to escape from the local optimum. A quasireflected opposition-based learning strategy is also presented to improve the optimization accuracy, accelerate the convergence speed of the algorithm, and improve the quality of the solution. Fifteen benchmark functions are selected for testing. The results are compared with seven different algorithms. The results show that the improved algorithm has excellent optimization performances. Finally, the IMPA is applied to optimize WSN coverage on 3D surfaces. The experimental results show that the proposed IMPA has good terrain adaptation and optimal deployment capabilities. It can improve the coverage of the network, reduce the deployment cost, and extend the network life cycle. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. A Novel Cluster-Based Wireless Sensor Network Reliability Model Using the Expectation Maximization Algorithm.
- Author
-
Yang, Jianfeng, Chen, Jing, Huo, Yujia, and Liu, Yanyu
- Subjects
WIRELESS sensor networks ,RELIABILITY in engineering ,MAXIMUM likelihood statistics ,PROBLEM solving ,ALGORITHMS ,MISSING data (Statistics) - Abstract
Wireless sensor networks (WSNs) have been used widely across various industries and business fields that require the coverage of large geographical regions that are difficult for humans to reach. It is therefore important to be able to model, assess, and predict the reliability of WSNs. Masked data is a type of missing data used to represent system failure when the exact cause of the failure is unknown. This paper proposed a novel additive reliability model for a cluster-based WSN system using general masked data and uses the expectation maximization (EM) algorithm to solve the problem of the maximum likelihood estimation (MLE). Moreover, the proposed model assumes that a WSN comprises several clusters, and the failure processes of these clusters are independent. The probability characteristics of the system are determined according to the topology of the WSN system to evaluate the system reliability. Finally, the proposed model is demonstrated to be powerful for estimating WSN system reliability using a simulated dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Robust and Secure Data Fusion Algorithm Based on Intelligent Sensing in Wireless Sensor Networks.
- Author
-
Cheng, Yong, Wang, Jun, Ji, Shuqiang, and Yang, Ling
- Subjects
MULTISENSOR data fusion ,ALGORITHMS ,DATA compression ,WIRELESS sensor networks ,ACQUISITION of data - Abstract
Presently, the wireless sensor network (WSN) plays an important role in smart farming. However, due to the limitation of wireless sensor network resources, the time and space correlation of data acquisition is strong. In order to reduce the number of nodes participating in data compression, the robust and secure data fusion algorithm based on intelligent sensing is proposed. The algorithm can divide the whole network into many clusters. In order to maintain energy balance of nodes in the cluster, the probability of each node in each cluster participating in each round of data collection is computed according to the residual energy of the node. On the sink node, the number of sampling rounds of joint reconstruction of collected data is designated according to the application requirements and reconstruction accuracy requirements, and the number of nodes participating in is further reduced. The simulation results show that the number of nodes participating in the data collection of the proposed scheme in this paper is lower than that of the ordinary intelligent sensing LEACH data acquisition scheme. Meanwhile, the proposed scheme can dramatically extend the network lifetime. This paper provides an insight into various needs of WSN used in agriculture and challenges involved in the deployment of WSN. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
39. A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks.
- Author
-
Qu, Hongchun, Lei, Libiao, Tang, Xiaoming, and Wang, Ping
- Subjects
ALGORITHMS ,INTRUSION detection systems (Computer security) ,WIRELESS sensor networks ,SUPPORT vector machines ,ENERGY consumption - Abstract
For resource-constrained wireless sensor networks (WSNs), designing a lightweight intrusion detection technology has been a hot and difficult issue. In this paper, we proposed a lightweight intrusion detection method that was able to directly map the network status into sensor monitoring data received by base station, so that base station can sense the abnormal changes in the network. Our method is highlighted by the fusion of fuzzy c-means algorithm, one-class SVM, and sliding window procedure to effectively differentiate network attacks from abnormal data. Finally, the proposed method was tested on the wireless sensor network simulation software EXata and in real applications. The results showed that the intrusion detection method in this paper could effectively identify whether the abnormal data came from a network attack or just a noise. In addition, extra energy consumption can be avoided in all sensor monitoring nodes of the sensor network where our method has been deployed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
40. A Node Location Method in Wireless Sensor Networks Based on a Hybrid Optimization Algorithm.
- Author
-
Pan, Jeng-Shyang, Fan, Fang, Chu, Shu-Chuan, Du, Zhigang, and Zhao, Huiqi
- Subjects
WIRELESS sensor networks ,PROCESS optimization ,EVOLUTIONARY algorithms ,ALGORITHMS ,INTERNET of things - Abstract
Wireless sensor networks (WSN) have gradually integrated into the concept of the Internet of Things (IoT) and become one of the key technologies. This paper studies the optimization algorithm in the field of artificial intelligence (AI) and effectively solves the problem of node location in WSN. Specifically, we propose a hybrid algorithm WOA-QT based on the whale optimization (WOA) and the quasi-affine transformation evolutionary (QUATRE) algorithm. It skillfully combines the strengths of the two algorithms, not only retaining the WOA's distinctive framework advantages but also having QUATRE's excellent coevolution ability. In order to further save optimization time, an auxiliary strategy for dynamically shrinking the search space (DSS) is introduced in the algorithm. To ensure the fairness of the evaluation, this paper selects 30 different types of benchmark functions and conducts experiments from multiple angles. The experiment results demonstrate that the optimization quality and efficiency of WOA-QT are very prominent. We use the proposed algorithm to optimize the weighted centroid location (WCL) algorithm based on received signal strength indication (RSSI) and obtain satisfactory positioning accuracy. This reflects the high value of the algorithm in practical applications. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. Human Detection through RSSI Processing with Packet Dropout in Wireless Sensor Network.
- Author
-
Wang, Haijing, Zhang, Fangfang, and Zhang, Wenli
- Subjects
WIRELESS sensor networks ,DATA packeting ,STATISTICAL smoothing ,ALGORITHMS ,ZIGBEE - Abstract
This paper presents a device-free human detection method for using Received Signal Strength Indicator (RSSI) measurement of Wireless Sensor Network (WSN) with packet dropout based on ZigBee. Packet loss is observed to be a familiar phenomenon with transmissions of WSNs. The packet reception rate (PRR) based on a large number of data packets cannot reflect the real-time link quality accurately. So this paper firstly raises a real-time RSSI link quality evaluation method based on the exponential smoothing method. Then, a device-free human detection method is proposed. Compared to conventional solutions which utilize a complex set of sensors for detection, the proposed approach achieves the same only by RSSI volatility. The intermittent Karman algorithm is used to filter RSSI fluctuation caused by environment and other factors in data packets loss situation, and online learning is adopted to set algorithm parameters considering environmental changes. The experimental measurements are conducted in laboratory. A high-quality network based on ZigBee is obtained, and then, RSSI can be calculated from the receive sensor modules. Experimental results show the uncertainty of RSSI change at the moment of human through the network area and confirm the validity of the detection method. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. A Robust Indoor Mobile Localization Algorithm for Wireless Sensor Network in Mixed LOS/NLOS Environments.
- Author
-
Yong Kang, Ou and Long, Cheng
- Subjects
WIRELESS sensor networks ,WIRELESS localization ,ALGORITHMS ,KALMAN filtering ,WIRELESS communications ,STANDARD deviations - Abstract
Wireless sensor network (WSN) is a self-organizing network which is composed of a large number of cheap microsensor nodes deployed in the monitoring area and formed by wireless communication. Since it has the characteristics of rapid deployment and strong resistance to destruction, the WSN positioning technology has a wide application prospect. In WSN positioning, the nonline of sight (NLOS) is a very common phenomenon affecting accuracy. In this paper, we propose a NLOS correction method algorithm base on the time of arrival (TOA) to solve the NLOS problem. We firstly propose a tendency amendment algorithm in order to correct the NLOS error in geometry. Secondly, this paper propose a particle selection strategy to select the standard deviation of the particle swarm as the basis of evolution and combine the genetic evolution algorithm, the particle filter algorithm, and the unscented Kalman filter (UKF) algorithm. At the same time, we apply orthogon theory to the UKF to make it have the ability to deal with the target trajectory mutation. Finally we use maximum likelihood localization (ML) to determine the position of the mobile node (MN). The simulation and experimental results show that the proposed algorithm can perform better than the extend Kalman filter (EKF), Kalman filter (KF), and robust interactive multiple model (RIMM). [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. MMW-NOMA: An Uplink NOMA Communication System Based on the Node Pairing Algorithm of Maximum and Minimum Weight in Underwater Acoustic Networks.
- Author
-
Gao, Guohong, Wang, Jianping, Chen, Xuejun, Liu, Quan, Zhai, Ruizhi, and Ma, Jianwei
- Subjects
TELECOMMUNICATION systems ,ORTHOGONAL frequency division multiplexing ,BASE pairs ,DECODING algorithms ,ALGORITHMS ,SENSOR networks ,WIRELESS sensor networks ,SUBMERGED structures - Abstract
In orthogonal multiple access (OMA) communication systems, resources are allocated to numerous users based on time, frequency, or code domains. The low bandwidth of the underwater acoustic network limits the number of nodes that can be supported by the OMA system, due to limited resources. The innovative concept of nonorthogonal multiple access (NOMA) provides a solution that offers more nodes and increases spectral efficiency. As a promising technique, it optimizes power allocation through channel characteristics and adopts serial interference cancellation algorithms to decode the signal at the receiver. This paper introduces an underwater communication system based on the node pairing algorithm of maximum and minimum weight (MMW-NOMA). First, we build the system model in a UAN scenario. Second, we present the node pairing strategy. Third, we design a node replacement mechanism. Furthermore, we offer a power allocation algorithm. Finally, we compare the performance of MMW-NOMA with randomly paired NOMA (RP-NOMA) and orthogonal frequency division multiplexing (OFDM). Numerical results show that MMW-NOMA outperforms RP-NOMA and OFDM in throughput, mean square error, and energy efficiency. However, the complexity of MMW-NOMA is slightly higher than that of RP-NOMA but significantly lower than OFDM. These results show that MMW-NOMA achieves a reasonable trade-off between performance and complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Manta Ray Foraging Optimization (MRFO)-Based Energy-Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks.
- Author
-
Khodeir, Mahmoud A., Ababneh, Jehad I., and Alamoush, Bara'ah S.
- Subjects
WIRELESS sensor networks ,MOBULIDAE ,DISTRIBUTED sensors ,ENERGY consumption ,ALGORITHMS ,NETWORK performance - Abstract
Wireless sensor network (WSN) has become a very popular technology with a wide range of applications. It consists of several spatially distributed sensors that work collaboratively to monitor a given region of interest (ROI). The limited energy available for each sensor node is a crucial restriction that affects the overall performance of the network. Therefore, energy efficiency is a major concern in WSNs. Over the years, many techniques have been developed and used to reduce energy consumption in WSNs. Clustering is one of the most effective energy-saving techniques that significantly can improve the efficiency of WSNs in terms of the network lifetime, energy consumption, and the number of received packets. In this paper, an energy-efficient algorithm for cluster head (CH) selection based on a newly formulated fitness function and using the manta ray foraging optimization (MRFO) is proposed. The objective function for the proposed formulation takes into account different network parameters such as the average distance between the CH and the sensors in its cluster, the distance between CHs and the base station (BS), residual energy, and CH balancing. The proposed algorithm is tested by running many simulations under a variety of conditions. The simulation results showed that the proposed algorithm has a better performance than that of some other algorithms reported in the literature in terms of energy consumption, networks lifetime, and the number of received packets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. A Neighborhood Grid Clustering Algorithm for Solving Localization Problem in WSN Using Genetic Algorithm.
- Author
-
Chen, Junfeng, Sackey, Samson H., Ansere, James Adu, Zhang, Xuewu, and Ayush, Altangerel
- Subjects
FUZZY algorithms ,PROBLEM solving ,LOCALIZATION (Mathematics) ,ALGORITHMS ,NEIGHBORHOODS ,WIRELESS sensor networks ,ENERGY consumption ,GENETIC algorithms - Abstract
Finding the location of sensors in wireless sensor networks (WSNs) is a major test, particularly in a wide region. A salient clustering approach is laid out to achieve better performance in such a network using an evolutional algorithm. This paper developed a clustered network called neighborhood grid cluster which has a node assuming the part of a cluster center focused in every grid. Grid-based clustering is less difficult and possesses a lot of benefits compared to other clustering techniques. Besides, we proposed a localization algorithm that centers around assessing the target area by considering the least estimated distance embedded with the genetic algorithm. Performance standards incorporate the energy representation, connectivity stratagem, and distance measure as fitness functions that assess our localization problem to demonstrate its viability. Simulation results confirm that our approach further improves localization accuracy, energy utilization, node lifetime, and localization coverage. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. A Reinforcement Learning-Based Dynamic Clustering Algorithm for Compressive Data Gathering in Wireless Sensor Networks.
- Author
-
Wang, Xun and Chen, Hongbin
- Subjects
WIRELESS sensor networks ,REINFORCEMENT learning ,DATA transmission systems ,ALGORITHMS ,ENERGY consumption - Abstract
Compressive data gathering (CDG) is an effective technique to handle large amounts of data transmissions in resource-constrained wireless sensor networks (WSNs). However, CDG with static clustering cannot adapt to time-varying environments in WSNs. In this paper, a reinforcement learning-based dynamic clustering algorithm (RLDCA) for CDG in WSNs is proposed. It is a dynamic and adaptive clustering method aiming to further reduce data transmissions and energy consumption in WSNs. Sensor nodes act as reinforcement learning (RL) agents which can observe the environment and dynamically select a cluster to join in. These RL agents are instructed by a well-designed reward scheme to join a cluster with strong data correlation and proper distance. It is also a distributed and lightweight learning method. All agents are independent and operate in parallel. Additional overheads introduced by RL are lightweight. Computations of a linear reward function and a few comparison operations are needed. It is implementable in WSNs. Simulations performed in MATLAB validate the effectiveness of the proposed method and simulation results show that the proposed algorithm achieves the desired effect as well as fine convergence. It decreases data transmissions by 16.6% and 54.4% and energy consumption by 6% and 29%, respectively, compared to the two contrastive schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Modified Floyd–Warshall's Algorithm for Maximum Connectivity in Wireless Sensor Networks under Uncertainty.
- Author
-
Sahoo, Laxminarayan, Sen, Supriyan, Tiwary, Kalishankar, Samanta, Sovan, and Senapati, Tapan
- Subjects
WIRELESS sensor networks ,FUZZY numbers ,ALGORITHMS ,REGULAR graphs ,ROUTING algorithms - Abstract
The main objective of this paper is to find the duration of maximum time connectivity of sensor nodes under uncertainty utilizing the prespecified voltage/power of each sensor node. Wireless sensor networks (WSNs) are composed of nodes that transmit data between each other over routing. A variety of routing protocols and algorithms exist, each related to a particular set of conditions. There are a variety of routing algorithms available, some of which can be used in WSNs for routing. The goal of the fastest distance routing algorithms in a WSN is to use the least amount of energy possible. In a WSN, Dijkstra's algorithm is typically used for shortest path routing. The Floyd–Warshall's algorithm is used to compute the shortest paths between distinct nodes in a regular graph, but due to the absence of a communication mode, this algorithm is not ideal for routing in wireless networks. In this research work, we have considered a WSN to find out the maximum connectivity time utilizing optimum voltage. On the other hand, duration of connectivity and energy/voltage are two vital parameters that are difficult to manage. Because of limited resources and safety concerns, safety implementation is limited. Also, due to the irregular/hazardous environmental situations, the distance between sensor nodes and its voltage to link up the nodes are totally unpredictable. In this work, we employ triangular fuzzy numbers to express unpredictability. Then, utilizing defuzzification of fuzzy numbers, the associated WSN problem was transformed into a crisp one. The widely used signed distance approach has been applied for the defuzzification of fuzzy numbers in this case. To determine the best outcome and to illustrate the usefulness of the suggested technique, a numerical example has been solved using the modified Floyd–Warshall's algorithm. Finally, concluding remarks on the proposed approach as well as future studies have been provided. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Reliability and Life Prediction Algorithms of Insulated Cables Based on Wireless Network Communication.
- Author
-
Sun, Jianyu, Ni, Zhonghua, and Liu, Yanxin
- Subjects
POWER transmission ,ELECTRIC power distribution grids ,CABLES ,ENERGY consumption ,WIRELESS sensor networks ,ALGORITHMS ,FORECASTING ,WIRELESS communications - Abstract
Since the size of the power system is getting larger, the power of the transmission and electrical power generation also increase, and the safety operation of the transmission and electrical power is becoming more and more important. This article is intended to study algorithm for reliability and life prediction based on wireless network communication. This paper first studies the energy consumption of wireless network communication, analyzes the maximization of network life, and then evaluates the thermal aging characteristics and life of XLPE cable insulation based on wireless communication. Through model establishment and analysis, when the reliability is below 50%, the reliability of the cable is basically not guaranteed. It is necessary to formulate an update and replacement plan to ensure the safe and stable operation of the power grid. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Throughput-Guaranteed Distributed Channel Assignment and Scheduling Algorithms with Low Complexity for Multichannel Wireless Sensor Networks.
- Author
-
Xu, Xinyan, Zhang, Fan, Yang, Gangqiang, Xie, Liguo, Liu, Qing, and Li, Baozhu
- Subjects
WIRELESS sensor networks ,ASSIGNMENT problems (Programming) ,SENSOR networks ,TRAFFIC flow ,ALGORITHMS ,COMPUTER scheduling ,DISTRIBUTED algorithms - Abstract
In wireless sensor networks, an improved throughput capacity region can be achieved by equipping multiple channels. However, such approach inevitably brings the issue of solving the coupled channel assignment and scheduling problem. This paper put forward a low-complexity distributed channel assignment and scheduling policy for multichannel wireless sensor networks with single-hop traffic flows, named LDCS, as well as its multihop multipath extension. Under the proposed algorithms, random access and backoff time techniques are introduced to keep the complexity low and independent of the number of links and channels. Through theoretical analysis and simulation experiments, it is proved that the proposed algorithms are throughput guaranteed, and in some network scenarios, the achieved capacity region can be larger than that of other comparable distributed algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
50. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks.
- Author
-
Wang, Jin, Gao, Yu, Yin, Xiang, Li, Feng, and Kim, Hye-Jin
- Subjects
WIRELESS sensor networks ,ALGORITHMS ,SENSOR networks ,ENERGY consumption ,DATA - Abstract
Energy efficiency has been a hot research topic for many years and many routing algorithms have been proposed to improve energy efficiency and to prolong lifetime for wireless sensor networks (WSNs). Since nodes close to the sink usually need to consume more energy to forward data of its neighbours to sink, they will exhaust energy more quickly. These nodes are called hot spot nodes and we call this phenomenon hot spot problem. In this paper, an Enhanced Power Efficient Gathering in Sensor Information Systems (EPEGASIS) algorithm is proposed to alleviate the hot spots problem from four aspects. Firstly, optimal communication distance is determined to reduce the energy consumption during transmission. Then threshold value is set to protect the dying nodes and mobile sink technology is used to balance the energy consumption among nodes. Next, the node can adjust its communication range according to its distance to the sink node. Finally, extensive experiments have been performed to show that our proposed EPEGASIS performs better in terms of lifetime, energy consumption, and network latency. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.