scholarly journals Semantic-Based Sports Music Information Fusion and Retrieval in Wireless Sensor Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Qiaolin Yu ◽  
Xiaofei Liu ◽  
Sihui Li ◽  
Lei Hou ◽  
Chengdong Zhu ◽  
...  

The wireless sensor network has developed rapidly in recent years. It is formed by the intersection of multiple disciplines. It integrates embedded technology, sensor technology, distributed technology, wireless communication technology, and modern networks. It is a brand new information acquisition platform. The characteristics of sensor networks determine that information fusion technology is a hot spot in the research of wireless sensor networks. Information fusion can achieve high performance and low cost in terms of energy and communication, which is of great significance to the research of sensor networks. This paper is aimed at studying the semantic-based sports music information fusion and retrieval research in wireless sensor networks. WSNs may face various attacks including eavesdropping attacks, replay attacks, Sybil attacks, and DOS attacks. Therefore, they are designing sensor network solutions. It is necessary to consider the network security issues. This article summarizes and analyzes the existing WSN security data fusion solutions for this issue and compares them by classification. This paper proposes methods and theories such as the spatial correlation detection algorithm, CBA algorithm, FTD algorithm, and DFWD algorithm, which enriches the research of information fusion and retrieval in wireless sensor networks, which is of exploratory significance, and it also establishes this problem. The model was studied, and reliable data was obtained. The experimental results of this paper show that when using these methods to diagnose faults in WSN, the correct rate of model diagnosis is higher than 77%.

2017 ◽  
Vol 13 (03) ◽  
pp. 113
Author(s):  
Wenjin Yu ◽  
Yong Li ◽  
Yuangeng Xu

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">With the wide application of the wireless sensor network, the security of the sensor network is becoming increasingly important. In this paper, based on node ranging, a new intrusion node detection algorithm has been proposed for external pseudo-node detection in wireless sensor networks. The presence of the nodes under copying-attack and the pseudo-nodes in the network can be detected through inter-node ranging with appropriate use of various sensors of nodes themselves and comprehensive analysis of ranging results. Operating in a stand-alone or embedded manner, this method has remedied the defects in the traditional principle of attack detection. The simulation results show that the proposed method has excellent applicability in wireless sensor security detection.</span>


2020 ◽  
Vol 16 (8) ◽  
pp. 155014772093902
Author(s):  
Hang Wan ◽  
Michael David ◽  
William Derigent

Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). This project aims to develop the concept of “communicating concretes,” which are concrete elements embedding wireless sensor networks, for applications dedicated to Structure Health Monitoring in the construction industry. Due to applicative constraints, the topology of the wireless sensor network follows a chain-based structure. Node batteries cannot be replaced or easily recharged, it is crucial to evaluate the energy consumed by each node during the monitoring process. This area has been extensively studied leading to different energy models to evaluate energy consumption for chain-based structures. However, no simple, practical, and analytical network energy models have yet been proposed. Energy evaluation models of periodic data collection for chain-based structures are proposed. These models are compared and evaluated with an Arduino XBee–based platform. Experimental results show the mean prediction error of our models is 5%. Realizing aggregation at nodes significantly reduces energy consumption and avoids hot-spot problem with homogeneous consumptions along the chain. Models give an approximate lifetime of the wireless sensor network and communicating concretes services. They can also be used online by nodes for a self-assessment of their energy consumptions.


2021 ◽  
Vol 2113 (1) ◽  
pp. 012023
Author(s):  
Xinghua Lu ◽  
Jiahao Huang ◽  
Guohua Luo

Abstract By optimizing the data detection performance of distributed wireless sensor networks, the data sensing and collecting ability of wireless sensor networks can be improved. Traditional methods adopt statistical characteristic parameter detection algorithm for distributed wireless sensor network data detection. Distributed wireless sensor network data has strong time-frequency coupling, so it is difficult to realize frequency domain spatial parameter clustering in frequency domain, and the detection performance is not good. A distributed wireless sensor network data detection algorithm based on non-stationary filtering and high-order statistical feature peak retrieval is proposed. The data model of distributed wireless sensor network is constructed under the interference of color noise. The weak vibration signal is subjected to time-frequency analysis and noise separation by non-stationary filtering, and the spectral peak of distributed wireless sensor network data is searched by the fourth-order cumulant slice post-operator to realize the optimal detection of signals. The simulation results show that the algorithm has a high probability of accurate detection, and has a good ability of suppressing noise and noise sidelobe information interference, which improves the probability of accurate detection of distributed wireless sensor network data under low signal-to-noise ratio.


2016 ◽  
Vol 16 (1) ◽  
pp. 73-79 ◽  
Author(s):  
R. Balamurali ◽  
K. Kathiravan

Abstract One of the key issues in Wireless Sensor Networks (WSN) is the hot-spot problem i.e. the nodes closer to the sink tend to drain their energy at a faster rate when compared to other nodes as they have to perform more communication and hence the sensor network may get isolated. In this paper we are using an integrated MAC and routing protocol which divides the network into tiers. We also propose a quantification algorithm, which decides the number of nodes in each tier to mitigate the hot-spot problem.


Author(s):  
Azeem Mohammed Abdul ◽  
Syed Umar

<p>The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial of service (DoS) attacks against the destruction of the efficient use of network resources and the vital functions of the network. DoS attacks can be one of the greatest threats to security threats be considered. In fact, there are many different layers of the OSI-DOS.</p>


Author(s):  
RAJAT BHARDWAJ ◽  
HITESH SHARMA

Nowadays the science and technology has enriched man’s life. In today’s world everything depends upon the technology. One of such technology is sensor technology. Now in every field sensor technology is used. The Wireless Sensor Network has reduced the work of groups of people to one individual person. Wireless sensor network makes the work easy to monitor in the hazardous environments like wild forests, war fields, etc. During that, many of the problems occur. One of such problems is the Hole Formation in Wireless Sensor Networks. The holes are formed in the Wireless Sensor Networks when a group of sensor nodes are enabled to sense the area around it. Here we will discuss what Network Holes are, the different types of holes in the networks and the reasons for hole formation.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


Sign in / Sign up

Export Citation Format

Share Document