{"title":"Interoperability Structure of Smart Water Conservancy Based on Internet of Things","authors":"SongSong Wang, Ouguan Xu","doi":"10.1155/2024/7724783","DOIUrl":"https://doi.org/10.1155/2024/7724783","url":null,"abstract":"Massive smart water conservancy object (WCO) need to be connected for real-time monitoring and control, which produces massive data. Unfortunately, heterogeneous data structures and semantics lead to low interoperability between WCO and management systems. To address this challenge, we propose a novel interoperability structure for a smart water conservancy system based on the Internet of Things (IoT), and the key design includes a smart WCO terminal, interoperability network, special interoperability protocol, WCO information model, and cloud platform. Universal terminal and network are the base of interoperability hardware, and special interoperability protocol and information model for interconnection of WCO are designed for smart water conservancy management system. WCO can be connected to a water conservancy Big Data processing cloud platform for interoperability applications. The application results demonstrate that our proposed WCO’s interoperability structure has obvious advantages than the general IoT at WCO interoperability. The interoperability protocol is reliable, the information model can ease interoperability and security, and the semantic dictionary is very rich and covers all semantic services of WCO.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan
{"title":"Smart Predictor for Spontaneous Combustion in Cotton Storages Using Wireless Sensor Network and Machine Learning","authors":"U. Shafi, Waheed Anwar, Imran Sarwar Bajwa, H. Sattar, Iqra Yaqoob, Aqsa Mahmood, Shabana Ramzan","doi":"10.1155/2024/5551759","DOIUrl":"https://doi.org/10.1155/2024/5551759","url":null,"abstract":"The splendid technological inventions supersede many traditional agricultural monitoring systems. In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. One such hazard to cotton storage is spontaneous combustion, a process by which an element having comparatively low ignition temperature (hay, straw, peat, etc.) starts to relieve heat. In the presence of spontaneous combustion and lack of oxygen, if cotton catches any sparks from bales or physicochemical heat to ignite, the combustion can convert in to smoldering, and it can last up to several days without being discovered. Consequently, the actual fire occurs, cotton silently smoldering which not only affects cotton quality but also became the reason of big fire event. Many researchers propose valuable tools and techniques based on laboratory methods and modern techniques as well for detection and prevention of security hazards in storages. However, there is no standalone efficient tool/technique to monitor the storage area for spontaneous combustion. In current research, we propose an efficient wireless sensor network (WSN) and machine learning- (ML-) based storage area monitoring system for early prediction of spontaneous combustion in the cotton storage area. The WSN is used to collect real-time values from storage field by different combinations of sensors and send this over the network, where data is processed to identify spontaneous combustion and distribute the prediction results to the end user. The real-time data collection and ML-based analysis make the system efficient and reliable. The efficiency of the current system is verified by presenting two groups of cotton stored with different conditions. The results showed that the proposed system is able to detect spontaneous combustion well in time with a 95% accuracy rate.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140085223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139807711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Sharing of Electronic Medical Records Based on Blockchain","authors":"Song Luo, N. Han, Tan Hu, Yuhua Qian","doi":"10.1155/2024/5569121","DOIUrl":"https://doi.org/10.1155/2024/5569121","url":null,"abstract":"As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center. This centralized storage method has many security risks, and once the central server is attacked, it will lead to the loss of medical data, which will lead to the leakage of patients’ private data. At the same time, electronic medical records are the most critical data in the current medical field. In the traditional centralized healthcare service system (HSS), there are data leakage problems and tampering with electronic medical records due to human factors. At the same time, each hospital is built independently, resulting in the current centralized healthcare service system having a data silo problem, making it difficult to share medical data between institutions securely. With the increase in the number of users in the system, the electronic medical record data in the system also increases gradually, resulting in the increasing overhead of decryption calculation. Therefore, this paper proposes a blockchain-based access control scheme with multiparty authorization to ensure the security of electronic medical records. The scheme uses an SM encryption algorithm to encrypt the medical data in the system. It adds the patient’s signature to ensure the confidentiality and security of the data, and the encrypted electronic medical records (EMRs) are stored in the InterPlanetary File System (IPFS) to realize the distributed storage of EMR. In addition, role-based multiauthorization access control is implemented through smart contract-based to ensure the security of EMR. We have analyzed the security of this paper’s solution and compared its performance with the existing schemes based on other cryptographic algorithms. The experimental results show that the proposed solution significantly improves the secure sharing of EMR and provides system performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139867644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PHS: A Pulse Sequence Method Based on Hyperbolic Frequency Modulation for Speed Measurement","authors":"Tao Ping, Caixia Song, Zhiguo Qi, Pengmin Xu","doi":"10.1155/2024/6670576","DOIUrl":"https://doi.org/10.1155/2024/6670576","url":null,"abstract":"The channel in the marine environment is a time-varying and space-varying channel. Pulse-truncated continuous wave (PCW) speed measurement is often used in sonar, but the instability effect of PCW signal in the channel limits the effectiveness of speed measurement. Hyperbolic frequency modulation (HFM) signal is insensitive to Doppler; therefore, HFM signals are widely used in ranging and velocity measurement of sonar and radar. However, due to the filtering effect of the marine environment, the HFM signal of a single frequency band may cause excessive transmission loss, and the echo energy may be too weak to detect the target. Based on the analysis of the influence of speed on the distance measurement of HFM signal, a pulse sequence method based on HFM for speed measurement (PHS) is proposed, which uses HFM signals of different frequency bands and pulse widths in the pulse sequence to perform speed measurement. Extensive simulation results show that PHS method not only guarantees the speed measurement but also makes full use of the energy of the HFM sequence to improve the accuracy of the distance measurement. And PHS method is valuable to the practical application of engineering.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139623912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network","authors":"Qingfeng Li, Bo Li, Linzhi Wen","doi":"10.1155/2023/1982173","DOIUrl":"https://doi.org/10.1155/2023/1982173","url":null,"abstract":"The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. Traditional machine learning techniques to intrusion detection rely on expert experience to choose features, and deep learning approaches have a low detection efficiency. In this paper, an intrusion detection model based on feature selection and improved one-dimensional convolutional neural network was proposed. This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. Then, the extracted features were fed into the improved one-dimensional convolutional neural network (I1DCNN), and this network training was used to complete the final classification task. The feature selection and improved one-dimensional convolutional neural network (FS-I1DCNN) intrusion detection model not only solved the traditional machine learning method of relying on expert experience to extract features but also improved the detection efficiency of the model, reduced the training time while reducing the dimension, and increased the overall accuracy. In comparison to the I1DCNN model without feature extraction and the conventional one-dimensional convolutional neural network (1DCNN) model, the experimental results demonstrate that the FS-I1DCNN model’s overall accuracy increases by 0.67% and 2.94%, respectively. Its accuracy, precision, recall, and F1-score were significantly better than those of the other intrusion detection models, including SVM and DBN.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convex Combination for Wireless Localization Using Biased RSS Measurements","authors":"Qi Wang, Fei Li, Teng Shao, Chao Xu","doi":"10.1155/2023/8931636","DOIUrl":"https://doi.org/10.1155/2023/8931636","url":null,"abstract":"Received signal strength- (RSS-) based localization in wireless sensor networks (WSNs) has attracted significant attention due to its advantages of low cost and simple implementation. In practice, RSS measurements may suffer from sensor biases, which deteriorates the localization accuracy. However, most of the existing localization methods are designed for bias-free measurements. In this paper, we propose a convex combination method for RSS localization in the presence of sensor biases. The parameter vector composed of unknown location and sensor biases is estimated simultaneously by using a convex combination of some virtual points. These virtual points form a convex hull, into which the parameter vector falls with large probability. By this, the original nonconvex estimation problem is converted to be convex. Numerical examples demonstrate the superiority of the proposed method in terms of localization accuracy, compared to the existing semidefinite programming (SDP) methods.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Visual SLAM Navigation Techniques for Dynamic Environments","authors":"Tongjun Wang, Peijun Zhao","doi":"10.1155/2023/2025844","DOIUrl":"https://doi.org/10.1155/2023/2025844","url":null,"abstract":"Synchronous positioning and mapping mainly realize the functions of self-positioning and environment map construction for intelligent navigation technology. In order to solve the problems of low positioning accuracy and poor mapping effect of existing SLAM (simultaneous localization and mapping) systems in indoor dynamic environments and to improve the positioning accuracy, timeliness, and robustness of visual SLAM systems in dynamic environments, an improved visual SLAM method is proposed. Aiming at the inconsistency between the direction of dynamic objects and static background optical flow, this method adopts a high-real-time dynamic region mask detection algorithm to eliminate the feature points in the dynamic region mask, remove the camera motion optical flow according to the original feature information, and then cluster the optical flow amplitude of dynamic objects so as to realize the dynamic region mask detection and eliminate the dynamic signpost points combined with the polar geometric constraints. In order to verify the effectiveness of the improved algorithm, the three evaluation indexes of system accuracy, real-time performance, and the amount of drift are analyzed and verified, respectively, on the TUM dataset. The results show that the proposed algorithm not only has good real-time performance but also improves the accuracy of the system and reduces the amount of drift.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44570704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Private Data Protection Scheme for Blockchain Smart Contracts","authors":"Sheng Hu","doi":"10.1155/2023/5963039","DOIUrl":"https://doi.org/10.1155/2023/5963039","url":null,"abstract":"Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. Firstly, we propose a master-slave multichain architecture based on the traditional single chain and integrate it with a three-layer edge computing structure to address security issues on the edge side. We also design a signature authentication scheme utilizing ECC integrated with blockchain encryption technology. Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. Finally, experimental results demonstrate that our proposed scheme can effectively resist various attacks, significantly improve algorithm efficiency, and maintain a system overhead of less than 160 p, with a maximum transaction throughput of nearly 310 tx/s.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48241240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameter Identification of Frame Structures by considering Shear Deformation","authors":"F. Xiao, Weiwei Zhu, Xiangwei Meng, Gang S. Chen","doi":"10.1155/2023/6631716","DOIUrl":"https://doi.org/10.1155/2023/6631716","url":null,"abstract":"This paper presents a method to identify the damages in frame structures with slender beams. This method adjusts the parameters of the structure to match the analytical and the measured displacements. The effect of transverse shear deformation on the nodal analytical displacement is analyzed, and the parameter identification of frame structures with slender beams is performed. The results demonstrate that parameter-identification accuracy can be considerably improved by considering the transverse shear deformation in the frame structure with slender beams. The proposed method can accurately identify the damages in frame structures with slender beams using displacement measurements.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45531819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}