Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (153)
  • Open Access

    ARTICLE

    Data Cleaning Based on Stacked Denoising Autoencoders and Multi-Sensor Collaborations

    Xiangmao Chang1, 2, *, Yuan Qiu1, Shangting Su1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 691-703, 2020, DOI:10.32604/cmc.2020.07923

    Abstract Wireless sensor networks are increasingly used in sensitive event monitoring. However, various abnormal data generated by sensors greatly decrease the accuracy of the event detection. Although many methods have been proposed to deal with the abnormal data, they generally detect and/or repair all abnormal data without further differentiate. Actually, besides the abnormal data caused by events, it is well known that sensor nodes prone to generate abnormal data due to factors such as sensor hardware drawbacks and random effects of external sources. Dealing with all abnormal data without differentiate will result in false detection or missed detection of the events.… More >

  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks

    Bing Hu1, Feng Xiang2, Fan Wu3, Jian Liu4, Zhe Sun1, Zhixin Sun1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1323-1344, 2019, DOI:10.32604/cmc.2019.06414

    Abstract To cope with the arbitrariness of the network delays, a novel method, referred to as the composite particle filter approach based on variational Bayesian (VB-CPF), is proposed herein to estimate the clock skew and clock offset in wireless sensor networks. VB-CPF is an improvement of the Gaussian mixture kalman particle filter (GMKPF) algorithm. In GMKPF, Expectation-Maximization (EM) algorithm needs to determine the number of mixture components in advance, and it is easy to generate overfitting and underfitting. Variational Bayesian EM (VB-EM) algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations. Moreover,… More >

  • Open Access

    ARTICLE

    Sensor Fault Detection in Large Sensor Networks using PCA with a Multi-level Search Algorithm

    A. Rama Mohan Rao1, S. Krishna Kumar1, K. Lakshmi1

    Structural Durability & Health Monitoring, Vol.8, No.3, pp. 271-294, 2012, DOI:10.32604/sdhm.2012.008.271

    Abstract Current advancements in structural health monitoring, sensor and sensor network technologies have encouraged using large number of sensor networks in monitoring spatially large civil structures like bridges. Large amount of spatial information obtained from these sensor networks will enhance the reliability in truly assessing the state of the health of the structure. However, if sensors go faulty during operation, the feature extraction techniques embedded into SHM scheme may lead to an erroneous conclusion and often end up with false alarms. Hence it is highly desirable to robustly detect the faulty sensors, isolate and correct the data, if the data at… More >

  • Open Access

    ARTICLE

    CPAC: Energy-Efficient Algorithm for IoT Sensor Networks Based on Enhanced Hybrid Intelligent Swarm

    Qi Wang1,*, Wei Liu1, Hualong Yu1, Shang Zheng1, Shang Gao1, Fabrizio Granelli2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.1, pp. 83-103, 2019, DOI:10.32604/cmes.2019.06897

    Abstract The wireless sensor network (WSN) is widely employed in the application scenarios of the Internet of Things (IoT) in recent years. Extending the lifetime of the entire system had become a significant challenge due to the energy-constrained fundamental limits of sensor nodes on the perceptual layer of IoT. The clustering routing structures are currently the most popular solution, which can effectively reduce the energy consumption of the entire network and improve its reliability. This paper introduces an enhanced hybrid intelligential algorithm based on particle swarm optimization (PSO) and ant colony optimization (ACO) method. The enhanced PSO is deployed to select… More >

  • Open Access

    ABSTRACT

    Bridge Health Mornitoring using Wireless Sensor Networks

    Byung-wan Jo1, Do-keun Kim2, Sung-keun Song3, Suk-un Kim4

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.1, No.4, pp. 167-172, 2007, DOI:10.3970/icces.2007.001.167

    Abstract Wireless sensor networks bring new challenges to Bridge monitoring. To monitor a bridge, behavior, including vibration and displacement, must be measured to analyze the health of the structure based on measured and collected data. The collected data can be used to compute modal properties of the bridge. A bridge is moved by external forces, including wind, seismic activity, and traffic. So it is very hard reliance of safety through a preexistence method which uses Data Logger. Dynamic behavior of a bridge is difficult to measure because of costs and installation methods. In this paper, a new method, using a U-Smart… More >

  • Open Access

    ARTICLE

    A Perceptron Algorithm for Forest Fire Prediction Based on Wireless Sensor Networks

    Haoran Zhu1, Demin Gao1,2,*, Shuo Zhang1

    Journal on Internet of Things, Vol.1, No.1, pp. 25-31, 2019, DOI:10.32604/jiot.2019.05897

    Abstract Forest fire prediction constitutes a significant component of forest management. Timely and accurate forest fire prediction will greatly reduce property and natural losses. A quick method to estimate forest fire hazard levels through known climatic conditions could make an effective improvement in forest fire prediction. This paper presents a description and analysis of a forest fire prediction methods based on machine learning, which adopts WSN (Wireless Sensor Networks) technology and perceptron algorithms to provide a reliable and rapid detection of potential forest fire. Weather data are gathered by sensors, and then forwarded to the server, where a fire hazard index… More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >

  • Open Access

    ARTICLE

    Maximum Data Generation Rate Routing Protocol Based on Data Flow Controlling Technology for Rechargeable Wireless Sensor Networks

    Demin Gao1, 2, *, Shuo Zhang1, Fuquan Zhang1, Xijian Fan1, Jinchi Zhang1,∗

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 649-667, 2019, DOI:10.32604/cmc.2019.05195

    Abstract For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a… More >

  • Open Access

    ARTICLE

    A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks

    Jin Wang1,2, Chunwei Ju2, Yu Gao2, Arun Kumar Sangaiah3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 433-446, 2018, DOI: 10.3970/cmc.2018.04132

    Abstract Wireless Sensor Networks (WSNs) are large-scale and high-density networks that typically have coverage area overlap. In addition, a random deployment of sensor nodes cannot fully guarantee coverage of the sensing area, which leads to coverage holes in WSNs. Thus, coverage control plays an important role in WSNs. To alleviate unnecessary energy wastage and improve network performance, we consider both energy efficiency and coverage rate for WSNs. In this paper, we present a novel coverage control algorithm based on Particle Swarm Optimization (PSO). Firstly, the sensor nodes are randomly deployed in a target area and remain static after deployment. Then, the… More >

Displaying 141-150 on page 15 of 153. Per Page