Salmah Fattah, I. Ahmedy, Moh Yamani Idna Idris, Abdullah Gani
{"title":"Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks","authors":"Salmah Fattah, I. Ahmedy, Moh Yamani Idna Idris, Abdullah Gani","doi":"10.1177/15501329221123533","DOIUrl":"https://doi.org/10.1177/15501329221123533","url":null,"abstract":"Underwater wireless sensor networks have grown considerably in recent years and now contribute substantially to ocean surveillance applications, marine monitoring and target detection. However, the existing deployment solutions struggle to address the deployment of mobile underwater sensor nodes as a stochastic system. The system faces internal and external environment problems that must be addressed for maximum coverage in the deployment region while minimizing energy consumption. In addition, the existing traditional approaches have limitations of improving simultaneously the objective function of network coverage and the dissipated energy in mobility, sensing and redundant coverage. The proposed solution introduced a hybrid adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition approach by adapting the original non-dominated sorting genetic algorithm II. This study evaluated the solution to substantiate its efficacy, particularly regarding the nodes’ coverage rate, energy consumption and the system’s Pareto optimal metrics and execution time. The results and comparative analysis indicate that the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy) is a better solution to the multi-objective sensor node deployment problem, outperforming the non-dominated sorting genetic algorithm II, SPEA2 and MOEA/D algorithms. Moreover, MOGA-AMPazy ensures maximum global convergence and has less computational complexity. Ultimately, the proposed solution enables the decision-maker or mission planners to monitor effectively the region of interest.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46982522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks","authors":"Tangsen Huang, Xiangdong Yin, Xiaowu Li","doi":"10.1177/15501329221125119","DOIUrl":"https://doi.org/10.1177/15501329221125119","url":null,"abstract":"Green communication is the demand of current and future wireless communication. As the next-generation communication network, cognitive radio network also needs to meet the requirements of green communication. Therefore, improving energy efficiency is an inevitable requirement for the development of cognitive radio networks. However, there is a need to compromise sensing performance while improving energy efficiency. To take into account the two important indicators of sensing performance and energy efficiency, a grouping algorithm is proposed in this article, which can effectively improve the energy efficiency while improving the spectrum sensing performance. The algorithm obtains the initial value of the reliability of the nodes through training, and sorts them according to the highest reliability value, then selects an even number of nodes with the highest reliability value, and divides the selected nodes into two groups, and the two groups of nodes take turns in Alternate work. At this time, other nodes not participating in cooperative spectrum sensing are in a silent state, waiting for the instruction of the fusion center. The experimental results show that compared with the traditional algorithm, the proposed algorithm has a great improvement in the two indicators of sensing performance and energy efficiency.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47217543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher","authors":"Ting Fan, Lingchen Li, Yongzhuang Wei, E. Pasalic","doi":"10.1177/15501329221119398","DOIUrl":"https://doi.org/10.1177/15501329221119398","url":null,"abstract":"Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental methods applicable primarily to block ciphers, and the resistance against this type of cryptanalysis is a necessary design criterion. ANU-II is an ultra-lightweight block cipher proposed in 2017, whose design offers many advantages such as the use of fewer hardware resources (logic gates), low power consumption and fast encryption for Internet of Things devices. The designers of ANU-II claimed its resistance against differential cryptanalysis and postulated that the design is safe enough for Internet of Things devices. However, as addressed in this article, the security claims made by designers appear not to be well grounded. Using mixed-integer linear programming–like techniques, we identify one-round differential characteristic that holds with probability 1, which is then efficiently employed in mounting the key recovery attack on full-round ANU-II with only 22 chosen plaintexts and 262.4 full-round encryptions. The result shows that the designers’ security evaluation of ANU-II against differential cryptanalysis is incorrect and the design rationale is flawed. To remedy this weakness, we provide an improved variant of ANU-II, which has much better resistance to differential cryptanalysis without affecting the hardware and/or software implementation cost.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43677687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations","authors":"Rinju Mariam Rolly, Pandy Malarvezhi, T. Lagkas","doi":"10.1177/15501329221123933","DOIUrl":"https://doi.org/10.1177/15501329221123933","url":null,"abstract":"Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability, and their ability to access unreachable locations. Extensive research is now widely performed on the deployment, performance analysis, resource management, trajectory optimization, and channel modeling in such networks. This survey article focuses on the different applications and the related algorithms for realizing aerial base stations by thoroughly reviewing each related research area. In a nutshell, this article provides key applications, challenges, and the technology used for the design and analysis of unmanned aerial vehicles as base stations.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49304100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu
{"title":"Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping","authors":"Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu","doi":"10.1177/15501329221114535","DOIUrl":"https://doi.org/10.1177/15501329221114535","url":null,"abstract":"This article investigates the influence of multiple-antenna deployment at access points on physical layer security under cell-free massive multiple-input multiple-output systems. To embody the concept of network multiple-input multiple-output, cell-free massive multiple-input multiple-output employs a great deal of geographically distributed access points, which jointly serve multiple users in the same frequency-time resource. Assuming a malicious active eavesdropper having knowledge of instantaneous channel state information, we derive the asymptotic closed-form expression of the achievable secrecy rate, which is used to evaluate network security performance. A distributed power allocation scheme is developed based on channel fading degrees of different users. All of access points distribute a larger proportion of local transmission power to the users with better channel conditions. We verified that the security performance of the multi-antenna access points outperforms that of the single one. Compared to equal power allocation, the proposed power control algorithm can further boost the network security performance.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45375542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Flores-Fuentes, I. Y. Alba-Corpus, O. Sergiyenko, J. Rodríguez-Quiñonez
{"title":"A structural health monitoring method proposal based on optical scanning and computational models","authors":"W. Flores-Fuentes, I. Y. Alba-Corpus, O. Sergiyenko, J. Rodríguez-Quiñonez","doi":"10.1177/15501329221112606","DOIUrl":"https://doi.org/10.1177/15501329221112606","url":null,"abstract":"This article proposes a method for continuous bridge displacement monitoring combining the dynamic triangulation scanning and load estimation by vehicle image recognition. The vehicle–bridge interaction is a non-stationary dynamic process parameter of high relevance to understanding the static instability behavior of bridges. The knowledge of the load on a bridge in the specific time when its structural spatial coordinates are measured allows correlating the bridge displacement with the effect of vehicle–bridge interaction. The evaluation of such correlation is mandatory in order to verify if the observed bridge displacement is due to the nature of its operation or due to it is presenting structural damage. The proposed method is continuous structural health monitoring method, based on the combination of three approaches evaluated at laboratory environment: (1) a three-dimensional optical scanning system for displacement measurement, (2) a load measurement system for vehicle–bridge interaction assessment, and (3) a two-measurement systems data correlation; to be implemented in bridges at a real environment to collect their historical behavior. Overall, for each approach, the measurement systems’ principles, the laboratory experimental methodology followed, and results obtained are presented.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42766509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tao Zhang, Zhengqi Su, Jing Cheng, Feng Xue, Shengyu Liu
{"title":"Machine vision-based testing action recognition method for robotic testing of mobile application","authors":"Tao Zhang, Zhengqi Su, Jing Cheng, Feng Xue, Shengyu Liu","doi":"10.1177/15501329221115375","DOIUrl":"https://doi.org/10.1177/15501329221115375","url":null,"abstract":"The explosive growth and rapid version iteration of various mobile applications have brought enormous workloads to mobile application testing. Robotic testing methods can efficiently handle repetitive testing tasks, which can compensate for the accuracy of manual testing and improve the efficiency of testing work. Vision-based robotic testing identifies the types of test actions by analyzing expert test videos and generates expert imitation test cases. The mobile application expert imitation testing method uses machine learning algorithms to analyze the behavior of experts imitating test videos, generates test cases with high reliability and reusability, and drives robots to execute test cases. However, the difficulty of estimating multi-dimensional gestures in 2D images leads to complex algorithm steps, including tracking, detection, and recognition of dynamic gestures. Hence, this article focuses on the analysis and recognition of test actions in mobile application robot testing. Combined with the improved YOLOv5 algorithm and the ResNet-152 algorithm, a visual modeling method of mobile application test action based on machine vision is proposed. The precise localization of the hand is accomplished by injecting dynamic anchors, attention mechanism, and the weighted boxes fusion in the YOLOv5 algorithm. The improved algorithm recognition accuracy increased from 82.6% to 94.8%. By introducing the pyramid context awareness mechanism into the ResNet-152 algorithm, the accuracy of test action classification is improved. The accuracy of the test action classification was improved from 72.57% to 76.84%. Experiments show that this method can reduce the probability of multiple detections and missed detection of test actions, and improve the accuracy of test action recognition.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45003836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crack fault diagnosis of vibration exciter rolling bearing based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition","authors":"Xiaoming Han, Jin Xu, Songnan Song, Jiawei Zhou","doi":"10.1177/15501329221114566","DOIUrl":"https://doi.org/10.1177/15501329221114566","url":null,"abstract":"The fault diagnosis of vibration exciter rolling bearing is of great significance to maintain the stability of vibration equipment. When the crack fault of the bearing occurs, the effective fault feature information cannot be extracted because the fault feature information of vibration signal is interfered by the noise around the vibrator. To solve this problem, a fault feature recognition method based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition is proposed. The Morlet wavelet filter optimized by genetic algorithm was used to filter the vibration signal, and then the empirical mode decomposition was applied to the filtered signal. In the envelope spectrum of the reconstructed signal, the characteristic frequency of the rolling bearing crack fault of the vibration exciter could be found accurately. Through simulation and experiment, it is proved that this method can provide theoretical and technical support for the crack fault diagnosis of vibration exciter rolling bearing.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41902765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic decentralized strategy of replica placement on edge computing","authors":"Yingying Yin, Leilei Deng","doi":"10.1177/15501329221115064","DOIUrl":"https://doi.org/10.1177/15501329221115064","url":null,"abstract":"Smart phone and its applications are used more and more extensively in our daily life. Short delay of arriving data is important to these applications, especially to some time-sensitive ones. To reduce transmission latency and improve user experience, a dynamic decentralized data replica placement and management strategy which works in edge nodes is proposed in this article. It studies the location, access frequency, latency improvement, and cost spent on placing replicas on edge nodes to seek a balance between cost spent for storage and reduced latency. Specifically, dynamic and decentralized replica placement strategy algorithm has load guarantee for edge nodes to avoid overload; it dynamically create or delete data replicas on edge nodes according to the request frequency. Dynamic and decentralized replica placement strategy is decentralized to relieve transmission cost. Experiment results show that dynamic and decentralized replica placement strategy algorithm in edge computing environments can greatly reduce transmission latency, balance edge nodes load, and improve system performance. Dynamic and decentralized replica placement strategy also considers the cost spent for storage, and it pursues a balance between many factors.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47863988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alkhayyat, Firas Abedi, A. Bagwari, Pooja Joshi, H. Jawad, S. Mahmood, Y. K. Yousif
{"title":"Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review","authors":"A. Alkhayyat, Firas Abedi, A. Bagwari, Pooja Joshi, H. Jawad, S. Mahmood, Y. K. Yousif","doi":"10.1177/15501329221113508","DOIUrl":"https://doi.org/10.1177/15501329221113508","url":null,"abstract":"Cognitive radios are expected to play an important role in capturing the constantly growing traffic interest on remote networks. To improve the usage of the radio range, a cognitive radio hub detects the weather, evaluates the open-air qualities, and then makes certain decisions and distributes the executives’ space assets. The cognitive radio works in tandem with artificial intelligence and artificial intelligence methodologies to provide a flexible and intelligent allocation for continuous production cycles. The purpose is to provide a single source of information in the form of a survey research to enable academics better understand how artificial intelligence methodologies, such as fuzzy logics, genetic algorithms, and artificial neural networks, are used to various cognitive radio systems. The various artificial intelligence approaches used in cognitive radio engines to improve cognition capabilities in cognitive radio networks are examined in this study. Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. This topic also covers cognitive radio network implementation and the typical learning challenges that arise in cognitive radio systems.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43859146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}