Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (468)
  • Open Access

    ARTICLE

    A Mathematical Task Dispatching Model in Wireless Sensor Actor Networks

    Morteza Okhovvat, Mohammad Reza Kangavari*

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 5-12, 2019, DOI:10.32604/csse.2019.34.005

    Abstract In this paper, we propose a mathematical task dispatching model to reduce the total tasks completion time, i.e. make-span, in Wireless Sensor Actor Networks (WSANs). The proposed approach minimizes the completion time of tasks that have been allocated to actors but have not yet been dispatched to actors for execution in the networks. We calculate the best rate of dispatching of tasks by the network sink to allocated actors through a steady state analysis of our proposed model to solve equations and inequalities. It is shown that this dispatching rate improves the network lifetime too. Experimental results with a prototyped… More >

  • Open Access

    ARTICLE

    Wind Turbine Drivetrain Expert Fault Detection System: Multivariate Empirical Mode Decomposition based Multi-sensor Fusion with Bayesian Learning Classification

    R. Uma Maheswari1,*, R. Umamaheswari2

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 479-488, 2020, DOI:10.32604/iasc.2020.013924

    Abstract To enhance the predictive condition-based maintenance (CBMS), a reliable automatic Drivetrain fault detection technique based on vibration monitoring is proposed. Accelerometer sensors are mounted on a wind turbine drivetrain at different spatial locations to measure the vibration from multiple vibration sources. In this work, multi-channel signals are fused and monocomponent modes of oscillation are reconstructed by the Multivariate Empirical Mode Decomposition (MEMD) Technique. Noise assisted methodology is adapted to palliate the mixing of modes with common frequency scales. The instantaneous amplitude envelope and instantaneous frequency are estimated with the Hilbert transform. Low order and high order statistical moments, signal feature… More >

  • Open Access

    ARTICLE

    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317

    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication technology in greenhouse is quite… More >

  • Open Access

    ARTICLE

    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme Reliability-Bounded Transmission Power Control (RTPC)… More >

  • Open Access

    ARTICLE

    Global Levy Flight of Cuckoo Search with Particle Swarm Optimization for Effective Cluster Head Selection in Wireless Sensor Network

    Vijayalakshmi. K1,*, Anandan. P2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 303-311, 2020, DOI:10.31209/2020.100000165

    Abstract The advent of sensors that are light in weight, small-sized, low power and are enabled by wireless network has led to growth of Wireless Sensor Networks (WSNs) in multiple areas of applications. The key problems faced in WSNs are decreased network lifetime and time delay in transmission of data. Several key issues in the WSN design can be addressed using the Multi-Objective Optimization (MOO) Algorithms. The selection of the Cluster Head is a NP Hard optimization problem in nature. The CH selection is also challenging as the sensor nodes are organized in clusters. Through partitioning of network, the consumption of… More >

  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive experiments reveal that the proposed… More >

  • Open Access

    ARTICLE

    Success Rate Queue-Based Relocation Algorithm of Sensory Network to Overcome Non-Uniformly Distributed Obstacles

    Sooyeon Park1, Moonseong Kim2, Woochan Lee1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1181-1201, 2020, DOI:10.32604/cmc.2020.011245

    Abstract With the recent development of big data technology that collects and analyzes various data, the technology that continuously collects and analyzes the observed data is also drawing attention. Moreover, its importance is growing in data collection in areas where people cannot access. In general, it is not easy to properly deploy IoT wireless devices for data collection in these areas, and it is also inappropriate to use general wheelbased mobile devices for relocation. Recently, researches have been actively carried out on hopping moving models in place of wheel-based movement for the inaccessible regions. The majority of studies, however, so far… More >

  • Open Access

    ARTICLE

    Weighted or Non-Weighted Negative Tree Pattern Discovery from SensorRich Environments

    Juryon Paik*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 193-204, 2020, DOI:10.31209/2019.100000140

    Abstract It seems to be sure that the IoT is one of promising potential topics today. Sensors are the one that lead the current IoT revolution. The advances of sensor-rich environments produce the massive volume of raw data that is enlarging faster than the rate at which it is being handled. JSON is a lightweight data-interchange format and preferred for IoT applications. Before JSON, XML was de factor standard format for interchanging data. The common point is that their structure scheme is the tree. Tree structure provides data exchangeability and heterogeneity, which encourages user-flexibilities. Therefore, JSON sensor format is an easy… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance. More >

  • Open Access

    ARTICLE

    A Multi-Objective Metaheuristics Study on Solving Constrained Relay Node Deployment Problem in WSNS

    Wenjie Yu, Xunbo Li, Hang Yang, Bo Huang

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 367-376, 2018, DOI:10.1080/10798587.2017.1294873

    Abstract This paper studies how to deploy relay nodes into traditional wireless sensor networks with constraint aiming to simultaneously optimize two important factors; average energy consumption and average network reliability. We consider tackling this multi-objective (MO) optimization problem with three metaheuristics, which employ greatly different evolutional strategies, and aim at an in-depth analysis of different performances of these metaheuristics to our problem. For this purpose, a statistical procedure is employed to analyse the results for confidence, in consideration of two MO quality metrics; hypervolume and coverage of two sets. After comprehensive analysis of the results, it is concluded that NSGA-II provides… More >

Displaying 391-400 on page 40 of 468. Per Page