
显示样式: 排序: IF: - GO 导出
-
Identification of crack development in granite under triaxial compression based on the acoustic emission signal Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2021-01-09 Tianzuo Wang; Linxiang Wang; Fei Xue; Mengya Xue
To explore the development mechanism of cracks in the process of rock failure, triaxial compression tests with simultaneous acoustic emission monitoring were performed on granite specimens using the MTS rock mechanics test system. The frequency-domain information of the acoustic emission signal was obtained by the fast Fourier transform. The Gutenberg–Richter law was used to calculate the acoustic
-
Toward connectivity of a disconnected cluster in partitioned wireless sensor network for time-critical data collection Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-28 Kashif Nasr; Noor Muhammad Khan
Reliable network connectivity is one of the major design issues in the context of wireless sensor networks. These networks have diverse communication patterns due to non-uniform sensing activities at various locations in the environment being monitored. In such scenarios, some nodes lying in high-traffic zones may consume more energy and eventually die out resulting in network partitioning. This gives
-
A novel superframe structure and optimal time slot allocation algorithm for IEEE 802.15.4–based Internet of things Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-27 Sangrez Khan; Ahmad Naseem Alvi; Mohammad Zubair Khan; Muhammad Awais Javed; Omar H Alhazmi; Safdar Hussain Bouk
IEEE 802.15.4 standard is specifically designed for a low-rate and low-processing Internet of things (IoT) applications and offers guaranteed time slots. A beacon-enabled IEEE 802.15.4 consists of a superframe structure that comprises of the contention access period and contention-free period. During contention-free period, nodes transfer their data using guaranteed time slots without any collision
-
Caching deployment based on energy efficiency in device-to-device cooperative networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-27 Weiguang Wang; Hui Li; Yang Liu; Wei Cheng; Haoyang Qin
The rapid growth of mobile data traffic demand will cause congestion to the future communication network. The cache-enabled device-to-device communication has been proven to effectively enhance the performance of wireless communication networks. This article investigates the caching deployment problem from the energy efficiency in the cache-enabled device-to-device networks. According to the random
-
Occupancy-balancing downlink transmission for enhancing scalability of LoRa networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-11 Cheonyong Kim; Joobum Kim; Jaiseung Kwak; Kiwook Kim; Woojin Seok
LoRa/LoRaWAN is growing rapidly as an underlying technology for the Internet of Things because of its long-range connectivity and low power. However, its limited scalability, owing to spread spectrum–based modulation and contention-based medium access control, impedes its use in emerging massive applications. In this study, we propose a downlink transmission scheme for enhancing the scalability of
-
A novel signal detection algorithm of multiple-input multiple-output Vertical-Bell Laboratories Layered Space-Time for underwater acoustic networks based on the improved minimum mean square error Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-11 Gaoli Zhao; Jianping Wang; Junping Song; Wei Chen
Multiple-input multiple-output is a commonly used technology supporting for high-rate transmission over frequency-selective fading channels with multiple antennas. Vertical-Bell Laboratories Layered Space-Time is a detection method of a multiple-input multiple-output system, which establishes a direct correspondence between antennas and layers. Studies demonstrate that multiple-input multiple-output
-
Sensor placement optimization for critical-grid coverage problem of indoor positioning Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-10 Hui Wu; Zhe Liu; Jin Hu; Weifeng Yin
It is more practical and efficient to deploy sensors in critical areas rather than common areas to ensure indoor positioning accuracy and reduce deployment cost. This study focused on the sensor placement optimization for critical-grid coverage problem with two objectives: accuracy and cost. After reviewing some related works, this article proposed a multi-objective optimization model for critical-grid
-
Modeling and parameter analysis of IEEE 802.15.4-based networks and the metering application Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-09 Yipeng Wang; Wei Yang; Ruisong Han; Tao Wu; Haojiang Zhao
As the support of wireless sensor networks expands to various application scenarios, the communication environments and the performance requirements of different application scenarios vary a lot. To cope with different communication environments and performance requirements, both data transmission ability and medium access ability are equivalently important. In this article, a joint analytical model
-
Unsupervised learning trajectory anomaly detection algorithm based on deep representation Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-12-04 Zhongqiu Wang; Guan Yuan; Haoran Pei; Yanmei Zhang; Xiao Liu
Without ground-truth data, trajectory anomaly detection is a hard work and the result lacks of interpretability. Moreover, in most current methods, trajectories are represented by geometric features or their low-dimensional linear combination, and some hidden features and high-dimensional combined features cannot be found efficiently. Meanwhile, traditional methods still cannot get rid of the limitation
-
Research on information security of users’ electricity data including electric vehicle based on elliptic curve encryption Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-26 Renwu Yan; Chuan Lin; Wen-feng Zhang; Li-wen Chen; Kang-ning Peng
In the smart grid and big data environment, accurate and large amount of power load data for users can be obtained with the wide application of non-intrusive load monitoring technology. In the research process of customers’ information, information security protection of users’ electricity data has become a research hotspot urgently. This article proposes a new type of load decomposition method for
-
Mahalanobis distance–based kernel supervised machine learning in spectral dimensionality reduction for hyperspectral imaging remote sensing Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-26 Jing Liu; Yulong Qiao
Spectral dimensionality reduction is a crucial step for hyperspectral image classification in practical applications. Dimensionality reduction has a strong influence on image classification performance with the problems of strong coupling features and high band correlation. To solve these issues, we propose the Mahalanobis distance–based kernel supervised machine learning framework for spectral dimensionality
-
Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sorting Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-25 Vijayalakshmi S; John A; Sunder R; Senthilkumar Mohan; Sweta Bhattacharya; Rajesh Kaluri; Guang Feng; Usman Tariq
Cancer is enlisted as the second leading reason for death across the world wherein almost one person out of six dies of cancer. Breast cancer is one of the most common forms of cancer predominant in women having the second highest mortality rate in the world. Various scientific studies have been conducted to combat this disease, and machine learning approaches have been an extremely popular choice
-
Genetic algorithm–optimized support vector machine for real-time activity recognition in health smart home Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-25 Yan Hu; Bingce Wang; Yuyan Sun; Jing An; Zhiliang Wang
Health smart home, as a typical application of Internet of things, provides a new solution for remote medical treatment. It can effectively relieve pressure from shortage of medical resources caused by aging population and help elderly people live at home more independently and safely. Activity recognition is the core of health smart home. This technology aims to recognize the activity patterns of
-
The impacts of weak links on topology discovery process in large-scale wireless multi-hop networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-20 Liao Wenxing; Shi Xiaofei; Chen Xinying
In wireless multi-hop networks, especially large-scale wireless multi-hop networks, obtaining the network topology is of vital significance. In fact, in both proactive and reactive routing protocols, before establishing an appropriate end-to-end route, the source node needs to obtain the global or local topology. Our previous research has studied the impacts of weak links on reactive routing protocols
-
Build with intrinsic security: Trusted autonomy security system Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-20 Shen He; Jing Huang; Penglin Yang
Security of Internet of things network is difficult to manage because Internet of things devices are heterogeneous and always deployed in remote places. Based on these features, attacks against Internet of things network like distributed denial-of-service and system intrusion are easier than traditional network. In order to enhance Internet of things network’s security, in this article we propose the
-
Numerical research on impact performance of bridge columns with aluminum foam protection devices Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-20 Yuye Zhang; Ruiyang Pan; Feng Xiao
This article presents a new protection device using aluminum foam to enhance the impact resistance of bridge columns. First, the protection device is designed according to the characteristics of aluminum foam material. The geometric configuration and structure of the device are described. Second, the impact performance of bridge column is analyzed, including impact force analysis, damage analysis,
-
Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-11 Hong Zhang; Shigen Shen; Qiying Cao; Xiaojun Wu; Shaofeng Liu
Wireless sensor networks, as a multi-hop self-organized network system formed by wireless communication, are vulnerable to malware diffusion by breaking the data confidentiality and service availability, owing to their low configuration and weak defense mechanism. To reveal the rules of malware diffusion in the really deployed wireless sensor networks, we propose a model called Malware Diffusion Based
-
An efficient method for network security situation assessment Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-11-10 Xiaoling Tao; Kaichuan Kong; Feng Zhao; Siyan Cheng; Sufang Wang
Network security situational assessment, the core task of network security situational awareness, can obtain security situation by comprehensively analyzing various factors that affect network status. Thus, network security situational assessment can provide accurate security state evaluation and security trend prediction for users. Although plenty of network security situational assessment methods
-
Traffic travel pattern recognition based on sparse Global Positioning System trajectory data Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-30 Juan Chen; Kepei Qi; Shiyu Zhu
This article mainly uses sparse Global Positioning System trajectory data to identify traffic travel pattern. In this article, the data are preprocessed and the eigenvalues are calculated. Then, the Global Positioning System track points are identified and extracted by walking and non-walking segments. Finally, the three machine learning models of support-vector machine, decision tree, and convolutional
-
A tags’ arrival rate estimation method using weighted grey model(1,1) and sliding window in mobile radio frequency identification systems Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-22 Liqian Zhang; Xueliang Fu; Honghui Li
In order to guarantee the tag identification accuracy and efficiency in mobile radio frequency identification system, it is necessary to estimate the tags’ arrival rate before performing identification. This research aims to develop a novel estimation method based on improved grey model(1,1) and sliding window mechanism. By establishing tags’ dynamic arrival model, this article emphasizes the importance
-
E2-MACH: Energy efficient multi-attribute based clustering scheme for energy harvesting wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-22 Inam Ul Haq; Qaisar Javaid; Zahid Ullah; Zafar Zaheer; Mohsin Raza; Muhammad Khalid; Ghufran Ahmed; Saleem Khan
Internet of things have emerged enough due to its applications in a wide range of fields such as governance, industry, healthcare, and smart environments (home, smart, cities, and so on). Internet of things–based networks connect smart devices ubiquitously. In such scenario, the role of wireless sensor networks becomes vital in order to enhance the ubiquity of the Internet of things devices with lower
-
A quality of system routing based on neighborhood interference detection and mitigation in wireless sensor network Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-22 Ling Zhang; Ziyun Ni
The current quality of system routing available in wireless sensor network mainly provides assurance for traffic flow, with little consideration on full use of network resource, like bandwidth. Aiming at solving these problems, this article proposes a quality of system routing method based on neighborhood interference detection and mitigation. First, the algorithm uses a sink node as root node to establish
-
DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-20 Márcio Alencar; Raimundo Barreto; Horácio Fernandes; Eduardo Souto; Richard Pazzi
In the context of smart home, it is very important to identify usage patterns of Internet of things (IoT) devices. Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints
-
A multiple pattern complex event detection scheme based on decomposition and merge sharing for massive event streams Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-17 Jianhua Wang; Bang Ji; Feng Lin; Shilei Lu; Yubin Lan; Lianglun Cheng
Quickly detecting related primitive events for multiple complex events from massive event stream usually faces with a great challenge due to their single pattern characteristic of the existing complex event detection methods. Aiming to solve the problem, a multiple pattern complex event detection scheme based on decomposition and merge sharing is proposed in this article. The achievement of this article
-
Improvement of table tennis technology based on data mining in the environment of wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-17 Hongjian Ma
With the development of Internet of things technology, the combination of Internet of things technology and sports competition parameter collection technology, so as to carry out rapid and accurate retrieval and positioning of technology and tactics, has innovation in the current research field. In the high-level table tennis competition, the use of technology and tactics is closely related to the
-
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-16 Walter Tiberti; Federica Caruso; Luigi Pomante; Marco Pugliese; Marco Santic; Fortunato Santucci
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones
-
Analysis of temperature-induced deformation and stress distribution of long-span concrete truss combination arch bridge based on bridge health monitoring data and finite element simulation Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-08 Yanwei Niu; Yong’e Wang; Yingying Tang
Through decades of operation, deformation fluctuation becomes a central problem affecting the normal operating of concrete truss combination arch bridge. In order to clarify the mechanism of temperature-induced deformation and its impact on structural stress distribution, this article reports on the temperature distribution and its effect on the deformation of concrete truss combination arch bridge
-
Trust-based energy-efficient routing protocol for Internet of things–based sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-08 Muhammad Ilyas; Zahid Ullah; Fakhri Alam Khan; Muhammad Hasanain Chaudary; Muhammad Sheraz Arshed Malik; Zafar Zaheer; Hamood Ur Rehman Durrani
Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols were developed and still in progress with full swing. Internet of things enabling physically existing things to see, hear, think and perform a notable task by allowing them to talk to each other and share useful information while making decision and caring-on/out their important tasks
-
An architectural framework for information integration using machine learning approaches for smart city security profiling Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-08 Adnan Abid; Ansar Abbas; Adel Khelifi; Muhammad Shoaib Farooq; Razi Iqbal; Uzma Farooq
In the past few decades, the whole world has been badly affected by terrorism and other law-and-order situations. The newspapers have been covering terrorism and other law-and-order issues with relevant details. However, to the best of our knowledge, there is no existing information system that is capable of accumulating and analyzing these events to help in devising strategies to avoid and minimize
-
SDFMUCR: Software-defined and fuzzy-based multi-hop unequal cluster routing Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-07 Lu Sixu; Wu Muqing; Zhao Min
Recently, wireless sensor networks play an important role in our life. Researchers give more and more attention to the design of the routing algorithm. Cluster routing is the most popular routing protocol in wireless sensor networks. However, hotspot problem always exists. Unequal cluster routing is an effective method to solve this problem. In these protocols, nodes closer to base station have the
-
Fast outlier detection for high-dimensional data of wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-07 Yan Qiao; Xinhong Cui; Peng Jin; Wu Zhang
This article addresses the problem of outlier detection for wireless sensor networks. As increasing amounts of observational data are tending to be high-dimensional and large scale, it is becoming increasingly difficult for existing techniques to perform outlier detection accurately and efficiently. Although dimensionality reduction tools (such as deep belief network) have been utilized to compress
-
Prediction of the thermal bow of rotor based on the measured displacement and temperature Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-05 He Peng; Zhaohua Zhou; Jigang Feng; Xiangyu Yu; Zhansheng Liu
The thermal bow of the rotor occurs in the cooling process after the shutdown of the aeroengine. The deflection of the bowed rotor is the primary concern of the research on this problem. The objective of this work is to propose a method to predict the bow shape of the rotor with the measured temperature and displacement in a rotor thermal bow experiment. The experiment was introduced and the variations
-
ITSMEI: An intelligent transport system for monitoring traffic and event information Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-10-05 Matheus S Quessada; Rickson S Pereira; William Revejes; Bruno Sartori; Euclydes N Gottsfritz; Douglas D Lieira; Marco AC da Silva; Geraldo P Rocha Filho; Rodolfo I Meneguette
The disorderly growth of urban centers can lead to serious socioeconomic disadvantages, such as health problems, due to long-term exposure to toxic gases and also monetary losses due to time stopped in congestion. Thus, there is a need for systems that help in the management and control of the flow of vehicles on the roads, seeking to reduce the damage resulting from a faulty transportation system
-
Editorial Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-29 Francesc Pozo; Diego A Tibaduiza; Miguel Ángel Torres-Arredondo; Margarita Varón; Hernán Dario Ceron-Muñoz
Structural health monitoring (SHM) is a wide area of engineering that focuses on the verification of the state or health of structures in order to ensure proper performance using nondestructive tests, involving sensors permanently attached to the structure, how these sensors are distributed and computational algorithms. When a structure needs to be inspected, a SHM system is able to improve the quality
-
Novel method for detection of void defects under track slabs using air-coupled ultrasonic sensors Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-28 Xingjie Chen; Wenfa Zhu; Guopeng Fan; Zaiwei Li; Wei Shao; Xiangzhen Meng; Liming Li; Haiyan Zhang
Void defects under track slabs are the main danger affecting the safe operation of high-speed railways. In the short high-speed railway maintenance periods, China’s high-speed railway line maintenance operations must quickly and dynamically determine void defects under track slabs that are in service without contact. However, the detection of void defects under track slabs still mainly relies on the
-
A mobile localization method based on a robust extend Kalman filter and improved M-estimation in Internet of things Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-26 Nan Hu; Chuan Lin; Fangjun Luan; Chengdong Wu; Qi Song; Li Chen
As the key technology for Internet of things, wireless sensor networks have received more attentions in recent years. Mobile localization is one of the significant topics in wireless sensor networks. In wireless sensor network, non-line-of-sight propagation is a common phenomenon leading to the growing non-line-of-sight error. It is a fatal impact for the localization accuracy of the mobile target
-
Swarm intelligence–based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-24 Mohamed Elhoseny; R Sundar Rajan; Mohammad Hammoudeh; K Shankar; Omar Aldabbas
Wireless sensor network is a hot research topic with massive applications in different domains. Generally, wireless sensor network comprises hundreds to thousands of sensor nodes, which communicate with one another by the use of radio signals. Some of the challenges exist in the design of wireless sensor network are restricted computation power, storage, battery and transmission bandwidth. To resolve
-
A three-dimensional pattern recognition localization system based on a Bayesian graphical model Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-20 Abdulraqeb Alhammadi; Fazirulhisyam Hashim; Mohd. Fadlee A Rasid; Saddam Alraih
Access points in wireless local area networks are deployed in many indoor environments. Device-free wireless localization systems based on available received signal strength indicators have gained considerable attention recently because they can localize the people using commercial off-the-shelf equipment. Majority of localization algorithms consider two-dimensional models that cause low positioning
-
Adaptive hop-by-hop cone vector-based forwarding protocol for underwater wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-18 Imran Ullah Khan; Mazhar Islam; Muhammad Ismail; Abdul Baseer Qazi; Sadeeq Jan; Ihsan Ullah; Zahid Farid; Zahid Wadud
In the recent past, a significant increase has been observed in the use of underwater wireless sensor networks for aquatic applications. However, underwater wireless sensor networks face several challenges including large propagation delays, high mobility, limited bandwidth, three-dimensional deployments, expensive manufacturing, and energy constraints. It is crucial for underwater wireless sensor
-
Assure deletion supporting dynamic insertion for outsourced data in cloud computing Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-15 Changsong Yang; Yueling Liu; Xiaoling Tao
With the rapid development of cloud computing, an increasing number of data owners are willing to employ cloud storage service. In cloud storage, the resource-constraint data owners can outsource their large-scale data to the remote cloud server, by which they can greatly reduce local storage overhead and computation cost. Despite plenty of attractive advantages, cloud storage inevitably suffers from
-
Throughput and delay analysis for IEEE 802.11 multi-hop networks considering data rate Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-15 Takeshi Kanematsu; Kosuke Sanada; Zhetao Li; Tingrui Pei; Young-June Choi; Kien Nguyen; Hiroo Sekiya
In an IEEE 802.11 Distributed Coordination Function–based wireless network with multiple hops, a node operates on its own with several predefined data rates (i.e. following modulation and coding schemes). Moreover, the IEEE 802.11 Distributed Coordination Function node’s communication is characterized by transmission and carrier-sensing distances. The transmission one is, in general, reverse proportional
-
Educational modules and research surveys on critical cybersecurity topics Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-09-03 Lixin Wang; Jianhua Yang; Peng-Jun Wan
Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity courses in which these topics are covered. Our goal for developing these course modules with the hands-on labs is to increase students’ understanding and
-
Energy-efficient chain-based data gathering applied to communicating concrete Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-28 Hang Wan; Michael David; William Derigent
Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). This project aims to develop the concept of “communicating concretes,” which are concrete elements embedding wireless sensor networks, for applications dedicated to Structure Health Monitoring in the construction industry. Due to
-
Discrete event simulation–based energy efficient path determination scheme for probabilistic voting–based filtering scheme in sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-25 Su Man Nam; Tae Ho Cho
In wireless sensor networks, sensors are extremely vulnerable to false positive and false negative attacks due to their stringent energy and computational constraints. Several en-route filtering schemes mainly focus on saving energy through early detection of false data within a short distance against these attacks; however, they cannot immediately block the false data injected by compromised nodes
-
Hypergraph-based resource allocation for Device-to-Device underlay H-CRAN network Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-25 Pan Zhao; Wenlei Guo; Datong Xu; Zhiliang Jiang; Jie Chai; Lijun Sun; He Li; Weiliang Han
In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. In this article, a novel resource management method, consisting of power and channel allocation, is proposed to solve this problem. An optimization model to maximum the system throughput
-
Method for rapid deployment of low-cost sensors for a nationwide project in the Internet of things era: Air quality monitoring in Taiwan Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-24 Fan-Lun Chen; Kun-Hsing Liu
When the air quality problem of PM2.5 first raised public attention and an emerging low-cost sensor technology appeared suitable as a monitoring measure for said problem, Taiwan’s Environmental Protection Administration devised a nationwide project involving large-scale sensor deployment for effective pollution monitoring and management. However, the conventional siting optimization methods were inadequate
-
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-21 Muhammad Shuaib Qureshi; Muhammad Bilal Qureshi; Muhammad Fayaz; Wali Khan Mashwani; Samir Brahim Belhaouari; Saima Hassan; Asadullah Shah
An efficient resource allocation scheme plays a vital role in scheduling applications on high-performance computing resources in order to achieve desired level of service. The major part of the existing literature on resource allocation is covered by the real-time services having timing constraints as primary parameter. Resource allocation schemes for the real-time services have been designed with
-
Evolution of wireless sensor network design from technology centric to user centric: An architectural perspective Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-10 Akhilendra Pratap Singh; Ashish Kr Luhach; Xiao-Zhi Gao; Sandeep Kumar; Diptendu Sinha Roy
Wireless sensor networks form the crux of a wide range of automated applications that are gaining popularity with every passing day. The journey of wireless sensor networks has seen simple sensory monitoring to sensing-processing-actuation based end-to-end applications to the design and deployment of highly sophisticated service-oriented use cases. This highly disruptive field has seen rapid transformations
-
Dynamic superframe adaptation using group-based media access control for handling traffic heterogeneity in wireless body area networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-10 Yousaf Zia; Fasial Bashir; Kashif Naseer Qureshi
Wireless body area network is a promising technology that brings healthcare to a new level of personalization. The applications of wireless body area network are not limited to healthcare monitoring applications but vastly used in entertainment applications. The applications are emerging at a fast pace and attract the attention of researchers. IEEE 802.15.6 provides a communication standard which specifies
-
A parallel multi-objective genetic algorithm for scheduling scientific workflows in cloud computing Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-08-10 Muhammad Sardaraz; Muhammad Tahir
Recent developments in cloud computing have made it a powerful solution for executing large-scale scientific problems. The complexity of scientific workflows demands efficient utilization of cloud resources to satisfy user requirements. Scheduling of scientific workflows in a cloud environment is a challenge for researchers. The problem is considered as NP-hard. Some constraints such as a heterogeneous
-
Development of real-time Internet of Things motion detection platform applying non-contact sensor based on open source hardware Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-28 Jung Woo Kim; Sang Hun Sul; Jae Boong Choi
Recently, Internet-based devices have evolved into platforms for new networks, with Internet of Things technology being applied in various areas. The expansion of scope of this technology and exchange of real-time information enables users to check their content whenever. The real-time Internet of Things motion detection platform has been developed to detect and monitor users in installed spaces. In
-
High-density data transmission and scheduling method in wireless sensor networks based on Wi-Fi Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-25 Yajun Zhang; Gang Qiu; Meng Liu; Hongjun Wang
In wireless sensor network, the storage amount of information is high, and the transmission and scheduling of control information is reasonable. The node communication model, network structure model, and energy consumption model are constructed. On this basis, the high-density data in wireless sensor network are scheduled to optimize the time for nodes to perform tasks. The nodes in the network are
-
Intelligent energy optimization for advanced IoT analytics edge computing on wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-23 Israel Edem Agbehadji; Samuel Ofori Frimpong; Richard C Millham; Simon James Fong; Jason J Jung
The current dispensation of big data analytics requires innovative ways of data capturing and transmission. One of the innovative approaches is the use of a sensor device. However, the challenge with a sensor network is how to balance the energy load of wireless sensor networks, which can be achieved by selecting sensor nodes with an adequate amount of energy from a cluster. The clustering technique
-
Security, usability, and biometric authentication scheme for electronic voting using multiple keys Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-22 Masood Ahmad; Ateeq Ur Rehman; Nighat Ayub; MD Alshehri; Muazzam A Khan; Abdul Hameed; Halil Yetgin
We propose electronic voting authentication scheme, which is a key management mechanism for electronic voting system intended to limit the number of attacks on a polling station and strengthen the security control. The motivation is to diversify security requirements of messages exchanged between polling stations. There are different types of messages exchanged between polling stations and each type
-
Reversible data hiding scheme based on pixel-value differencing in dual images Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-21 Pyung-Han Kim; Kwan-Woo Ryu; Ki-Hyun Jung
In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender
-
Experimental investigation of concrete strength curve based on pull-out post-insert method Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-21 Yuanxun Zheng; Weixing Kong; Mengen Ji; Chao Wan; Ehsan Moshtagh
As concrete is a building material that is widely used in the field of infrastructure construction, and its quality is related to the quality and service life in infrastructure engineering, concrete strength is an important reference index that reflects the concrete quality. Based on this, two commercial concretes A and B are selected in Henan Province, China, to perform the concrete strength test
-
On-farm welfare monitoring system for goats based on Internet of Things and machine learning Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-18 Yuan Rao; Min Jiang; Wen Wang; Wu Zhang; Ruchuan Wang
Intensive animal husbandry is becoming more and more popular with the adoption of modern livestock farming technologies. In such circumstances, it is required that the welfare of animals be continuously monitored in a real-time way. To this end, this study describes one on-farm welfare monitoring system for goats, with a combination of Internet of Things and machine learning. First, the system was
-
Jointly designed quasi-cyclic LDPC-coded cooperation with diversity combining at receiver Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-09 Muhammad Asif; Wuyang Zhou; Qingping Yu; Saifullah Adnan; Md Sadek Ali; Muhammad Shahid Iqbal
This correspondence proposes a jointly-designed quasi-cyclic (QC) low-density parity-check (LDPC)-coded multi-relay cooperation with a destination node realized by multiple receive antennas. First, a deterministic approach is utilized to construct different classes of binary QC-LDPC codes with no length-4 cycles. Existing methods put some limitations in terms of code length and rate in order to provide
-
A hybrid dual-mode trust management scheme for vehicular networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-08 Ibrahim Abdo Rai; Riaz Ahmed Shaikh; Syed Raheel Hassan
Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers
-
Mobile target localization based on iterative tracing for underwater wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 1.151) Pub Date : 2020-07-08 Ruolin Guo; Danyang Qin; Min Zhao; Guangchao Xu
In underwater wireless sensor networks, sensor position information has important value in network protocols and collaborative detection. However, many challenges were introduced in positioning sensor nodes due to the complexity of the underwater environment. Aiming at the problem of the stratification effect of underwater acoustic waves, the long propagation delay of messages, as well as the mobility