• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.029 seconds

Fault-Tolerant Event Detection in Wireless Sensor Networks using Evidence Theory

  • Liu, Kezhong;Yang, Tian;Ma, Jie;Cheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3965-3982
    • /
    • 2015
  • Event detection is one of the key issues in many wireless sensor network (WSN) applications. The uncertainties that are derived from the instability of sensor node, measurement noise and incomplete sampling would influence the performance of event detection to a large degree. Many of the present researches described the sensor readings with crisp values, which cannot adequately handle the uncertainties inhered in the imprecise sensor readings. In this paper, a fault-tolerant event detection algorithm is proposed based on Dempster-Shafer (D-S) theory (also called evidence theory). Instead of crisp values, all possible states of the event are represented by the Basic Probability Assignment (BPA) functions, with which the output of each sensor node are characterized as weighted evidences. The combination rule was subsequently applied on each sensor node to fuse the evidences gathered from the neighboring nodes to make the final decision on whether the event occurs. Simulation results show that even 20% nodes are faulty, the accuracy of the proposed algorithm is around 80% for event region detection. Moreover, 97% of the error readings have been corrected, and an improved detection capability at the boundary of the event region is gained by 75%. The proposed algorithm can enhance the detection accuracy of the event region even in high error-rate environment, which reflects good reliability and robustness. The proposed algorithm is also applicable to boundary detection as it performs well at the boundary of the event.

An Efficient and Stable Congestion Control Scheme with Neighbor Feedback for Cluster Wireless Sensor Networks

  • Hu, Xi;Guo, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4342-4366
    • /
    • 2016
  • Congestion control in Cluster Wireless Sensor Networks (CWSNs) has drawn widespread attention and research interests. The increasing number of nodes and scale of networks cause more complex congestion control and management. Active Queue Management (AQM) is one of the major congestion control approaches in CWSNs, and Random Early Detection (RED) algorithm is commonly used to achieve high utilization in AQM. However, traditional RED algorithm depends exclusively on source-side control, which is insufficient to maintain efficiency and state stability. Specifically, when congestion occurs, deficiency of feedback will hinder the instability of the system. In this paper, we adopt the Additive-Increase Multiplicative-Decrease (AIMD) adjustment scheme and propose an improved RED algorithm by using neighbor feedback and scheduling scheme. The congestion control model is presented, which is a linear system with a non-linear feedback, and modeled by Lur'e type system. In the context of delayed Lur'e dynamical network, we adopt the concept of cluster synchronization and show that the congestion controlled system is able to achieve cluster synchronization. Sufficient conditions are derived by applying Lyapunov-Krasovskii functionals. Numerical examples are investigated to validate the effectiveness of the congestion control algorithm and the stability of the network.

Determination of Incident Angle and Position of Optimal Mode Ultrasonic Beam for Flaw Detection in Anisotropic and Inhomogeneous Weldments by Ray Tracing

  • Zhao, Xinyu;Song, Sung-Jin;Kim, Hak-Joon;Gang, Tie;Kang, Suk-Chull;Choi, Yong-Hwan;Kim, Kyung-Cho;Kang, Sung-Sik
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.27 no.3
    • /
    • pp.231-238
    • /
    • 2007
  • Ultrasonic inspection of austenitic steel weldments is a truly difficult task due to complicated wave propagation phenomena such as beam skewing, splitting and distortion. In order to understand these phenomena and design proper inspection procedures, simulation is increasingly paid more attention to. This article addresses a ray tracing based approach to determine incident angle and position of optimal wave mode ultrasonic beam for flaw detection in anisotropic and inhomogeneous austenitic steel weldments. Specially, the optimal mode of ultrasonic wave wave is selected by ray tracing simulation, and an optimization approach based on ray tracing and bi-section search is proposed in order to find the ray path connecting two given points in weldments. With help of this approach, the optimal incident angle and position of ultrasonic beam can be determined for a given flaw position.

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

A novel approach of ship wakes target classification based on the LBP-IBPANN algorithm

  • Bo, Liu;Yan, Lin;Liang, Zhang
    • Ocean Systems Engineering
    • /
    • v.4 no.1
    • /
    • pp.53-62
    • /
    • 2014
  • The detection of ship wakes image can demonstrate substantial information regarding on a ship, such as its tonnage, type, direction, and speed of movement. Consequently, the wake target recognition is a favorable way for ship identification. This paper proposes a Local Binary Pattern (LBP) approach to extract image features (wakes) for training an Improved Back Propagation Artificial Neural Network (IBPANN) to identify ship speed. This method is applied to sort and recognize the ship wakes of five different speeds images, the result shows that the detection accuracy is satisfied as expected, the average correctness rates of wakes target recognition at the five speeds may be achieved over 80%. Specifically, the lower ship's speed, the better accurate rate, sometimes it's accuracy could be close to 100%. In addition, one significant feature of this method is that it can receive a higher recognition rate than the nearest neighbor classification method.

Decomposition of Interference Hyperspectral Images Based on Split Bregman Iteration

  • Wen, Jia;Geng, Lei;Wang, Cailing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3338-3355
    • /
    • 2018
  • Images acquired by Large Aperture Static Imaging Spectrometer (LASIS) exhibit obvious interference stripes, which are vertical and stationary due to the special imaging principle of interference hyperspectral image (IHI) data. As the special characteristics above will seriously affect the intrinsic structure and sparsity of IHI, decomposition of IHI has drawn considerable attentions of many scientists and lots of efforts have been made. Although some decomposition methods for interference hyperspectral data have been proposed to solve the above problem of interference stripes, too many times of iteration are necessary to get an optimal solution, which will severely affect the efficiency of application. A novel algorithm for decomposition of interference hyperspectral images based on split Bregman iteration is proposed in this paper, compared with other decomposition methods, numerical experiments have proved that the proposed method will be much more efficient and can reduce the times of iteration significantly.

Video Browsing Service Using An Efficient Scene Change Detection (효율적인 장면전환 검출을 이용한 비디오 브라우징 서비스)

  • Seong-Yoon Shin;Yang-Won Rhee
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.69-77
    • /
    • 2002
  • Recently, Digital video is one of the important information media delivered on the Internet and playing an increasingly important role in multimedia. This paper proposes a Video Browsing Service(VBS) that provides both the video content retrieval and the video browsing by the real-time user interface on Web, For the scene segmentation and key frame extraction of video sequence, we proposes an efficient scene change detection method that combines the RGB color histogram with the $x^2$(Chi Square) histogram. Resulting key frames are linked by both physical and logical indexing, This system involves the video editing and retrieval function of a VCR's, Three elements that are the date, the field and the subject are used for video browsing. A Video Browsing Service is implemented with MySQL, PHP and JMF under Apache Web Server.

  • PDF

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

Experimental study on acoustic emission characteristics of reinforced concrete components

  • Gu, Aijun;Luo, Ying;Xu, Baiqiang
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.67-79
    • /
    • 2015
  • Acoustic emission analysis is an effective technique for monitoring the evolution of damage in a structure. An experimental analysis on a set of reinforced concrete beams under flexural loading was carried out. A mixed AE analysis method which used both parameter-based and signal-based techniques was presented to characterize and identify different failure mechanisms of damage, where the signal-based analysis was performed by using the Hilbert-Huang transform. The maximum instantaneous energy of typical damage events and the corresponding frequency characteristics were established, which provided a quantitative assessment of reinforced concrete beam using AE technique. In the bending tests, a "pitch-catch" system was mounted on a steel bar to assess bonding state of the steel bar in concrete. To better understand the AE behavior of bond-slip damage between steel bar and concrete, a special bond-slip test called pullout test was also performed. The results provided the basis of quantitative AE to identify both failure mechanisms and level of damages of civil engineering structures.

Anti-Reactive Jamming Technology Based on Jamming Utilization

  • Xin Liu;Mingcong Zeng;Yarong Liu;Mei Wang;Xiyu Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2883-2902
    • /
    • 2023
  • Since the existing anti-jamming methods, including intelligent methods, have difficulty against high-speed reactive jamming, we studied a new methodology for jamming utilization instead of avoiding jamming. Different from the existing jamming utilization techniques that harvest energy from the jamming signal as a power supply, our proposed method can take the jamming signal as a favorable factor for frequency detection. Specifically, we design an intelligent differential frequency hopping communication framework (IDFH), which contains two stages of training and communication. We first adopt supervised learning to get the jamming rule during the training stage when the synchronizing sequence is sent. And then, we utilize the jamming rule to improve the frequency detection during the communication stage when the real payload is sent. Simulation results show that the proposed method successfully combated high-speed reactive jamming with different parameters. And the communication performance increases as the power of the jamming signal increase, hence the jamming signal can help users communicate in a low signal-to-noise ratio (SNR) environment.