International Journal of Online Engineering (iJOE)
Latest Publications


TOTAL DOCUMENTS

1063
(FIVE YEARS 0)

H-INDEX

13
(FIVE YEARS 0)

Published By International Association Of Online Engineering

1861-2121, 1868-1646

2018 ◽  
Vol 14 (11) ◽  
pp. 16
Author(s):  
Qing Wan ◽  
Ying Wang

To realize the exploration of wireless sensor network (WSN) based on cloud computing, the application service of WSN is taken as the starting point, the resource advantage of the cloud platform is used, and a WSN service framework based on cloud environment is proposed. Based on this framework, the problems of data management and reconstruction, network coverage optimization and monitoring, and edge recognition of holes are solved. In view of the node deployment of WSN and coverage problem of operation and maintenance optimization, the genetic algorithm is used to adjust the dormancy and energy state of nodes, and a parallel genetic algorithm for covering optimization in the cloud environment is proposed. For the operation and maintenance requirements of WSN, a parallel data statistics method for network monitoring is proposed. The experimental results show that the parallel algorithm is greatly improved in terms of the accuracy and time efficiency.


2018 ◽  
Vol 14 (11) ◽  
pp. 40
Author(s):  
Bohua Guo ◽  
Yanwu Zhang

<p class="0abstract"><span lang="EN-US">To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new scheme is put forward based on the privacy protection of polynomial regression and the privacy protection method based on the homomorphic encryption. The polynomial data aggregation (PRDA+) protocol is also proposed. In this scheme, the node and the base station will pre-deploy a secret key, and the random number generator encrypts the random number for the seed through the private key, which protects the privacy of the data. Then, by comparing the decrypted aggregate data through the correlation between the two metadata, the integrity protection of the data is realized. A weighted average aggregation scheme that can be verified is proposed. In view of the different importance of user information, the corresponding weights are set for each sensor node. EL Gamal digital signature is used to authenticate sensor nodes. The results show that the signature verification algorithm enables the scheme to resist data tampering and data denial, and to trace the source of erroneous data.</span></p>


2018 ◽  
Vol 14 (11) ◽  
pp. 133
Author(s):  
Shuan Liu

<p class="0abstract"><span lang="EN-US">Based on the security of the receiving signal strength indicator positioning algorithm, the RSSI positioning algorithm in the environment of witch attack, wormhole attack and replication attack has largely failed</span><span lang="EN-US">.</span><span lang="EN-US">Although existing security </span><span lang="EN-US">positioning</span><span lang="EN-US"> algorithms can effectively prevent attacks from occurring, the massive consumption of network resources can’t be ignored.</span><span lang="EN-US">Therefore, a tolerable security positioning method is proposed for each of the three attacks in order to improve the security of positioning.</span><span lang="EN-US">According to the node's physical information, the attack node is detected.</span><span lang="EN-US">Through simulation experiments, compared with the traditional indoor security </span><span lang="EN-US">positioning</span><span lang="EN-US"> method, the proposed algorithm can significantly reduce the intervention of witch attack, wormhole attack and replication attack on positioning error.</span><span lang="EN-US">While achieving the goal of combating attacks, it reduces the computational complexity, decreases node energy consumption, and extends the network life cycle.</span></p>


2018 ◽  
Vol 14 (11) ◽  
pp. 117
Author(s):  
Bo Qiu

To realize the design of mobile 4G gateway of ZigBee wireless sensor network (WSN), a scheme of wireless remote monitoring based on ZigBee and general packet radio service (GPRS) WSN gateway system is proposed. The scheme combines the advantages of short distance, low power consumption, low cost and long distance popular communication of ZigBee technology, and uses the system architecture of ZigBee + GPRS + Android. On this hardware platform, the transplantation of Android system and the development of related hardware device drivers are designed and implemented, so as to build the software platform of the system. Based on the software and hardware platform of the system, the related applications are designed and realized according to the function requirements of the system, and the software and hardware platform and the application program are tested and analyzed. The test results show that the system runs steadily and has good performance. To sum up, the hardware platform has the advantages of low energy consumption, high performance and scalability.


2018 ◽  
Vol 14 (11) ◽  
pp. 64
Author(s):  
Wanghui Li ◽  
Ganghua Bai

To successfully establish a unified and standardized Internet of Things (IoT) system, a specific scheme based on the bandwidth and quality of service (QoS) analysis as well as the third generation mobile communication system is given. The basic architecture of the IoT is introduced, the technical requirements of each level on the network are put forward, and the application of the IoT system in different industries is established. At the same time, a congestion control algorithm based on the application layer is proposed. This algorithm can greatly enhance the adaptability and controllability of the communication network of the IoT. Moreover, when the system is in normal operation, the algorithm can reasonably allocate and optimize bandwidth resources, thus greatly saving network traffic. The algorithm tests the current network state through the network test module, and then determines whether the data is sent according to the test results to ensure that the system has sufficient resources to respond to the sudden situation.


2018 ◽  
Vol 14 (11) ◽  
pp. 193
Author(s):  
Ahmed El Mahjoubi ◽  
Tomader Mazri ◽  
Nabil Hmina

RF capacity management and optimization is an important part of the network performances of the future.   Technically, 4.5G/5G mobile network is expected to enable people-thing and thing-thing interconnections by combining communication technologies and networks. Our Lab has been actively promoting research on 4G &amp; 5G performances, in which the RF Capacity management issue is of great interest. New 4G/5G tests put forward a lot of requirements for RF network performances in terms of KPIs, QoS, as well as user experience. Based on Morocco’s current situation, this article first discusses the LTE cell resources monitoring and optimization, Furthermore, we will introduce LTE OMSTAR tool, and LTE cell resources optimization scenarios are summarized.


2018 ◽  
Vol 14 (11) ◽  
pp. 4
Author(s):  
Qiong Ren

<p class="0abstract"><span lang="EN-US">To explore the wireless sensor network (WSN) structure, the cooperative WSN architecture of mass data processing based on cloud computing is studied. The technology of WSN and cloud computing is deeply discussed. The system and node structure of WSN are studied by theoretical analysis method, and the performance of the WSN is studied by using the numerical simulation method. The mass data processing technology based on Map Reduce and its application in WSN are discussed. The numerical simulation method is used to experiment on the architecture of SVC4WSN and MD4LWSN. The relationship between the optimal network number and the node communication radius at different node density is verified. Moreover, the energy and time delay </span><span lang="EN-US">Reduce </span><span lang="EN-US">path is compared with three protocols of LEACH, PEGASIS and PEDAP. The results show that the two Reduce paths have better performance in both network survival time and the total time slot of data acquisition.</span></p>


2018 ◽  
Vol 14 (11) ◽  
pp. 52
Author(s):  
Xiaojuan Zhao

<p class="0abstract"><span lang="EN-US">To cope with the security challenges brought by the popularization of wireless sensor network (WSN), a new random key pre-distribution scheme for WSNs based on the grid deployment theory of Blom mechanism is proposed. The core idea is to divide the network area where the nodes are into different types of hexagonal grids and nodes in different grids use different ways to create keys. Theoretical analysis and simulation results show that the scheme has better connectivity, local security and global security. In view of the existing storage consumption problems, a deterministic key establishment scheme is proposed based on the irregular network model. The simulation results show that the effective coding mechanism introduced optimizes the storage consumption in the network range. It also has a higher security threshold and absolute connectivity, and the enemy's ability to resist capture attacks is stronger.</span></p>


2018 ◽  
Vol 14 (11) ◽  
pp. 160
Author(s):  
Yao Yao ◽  
Qing-le Quan ◽  
Hong-hui Zhang ◽  
Qiong Li

<p class="0abstract"><span lang="EN-US">In order to study the power patrol technology of unmanned aerial vehicle, the tracking algorithm was applied. The automatic patrolling of power lines was discussed in terms of algorithms. An unmanned aerial vehicle transmission line inspection method based on machine vision was proposed. The image and video of the unmanned aerial vehicle inspection of the power line had a complex background. By Wiener filtering de-noising and probability density functions, the image clarity was improved. According to the existing tracking techniques and algorithms, a Camshaft target tracking algorithm based on lossless Kalman filter was proposed. The method of non-destructive Kalman filter was adopted to predict the region of interest of power line identification. Using the Camshaft algorithm, the prediction of the window was searched and the size of the window was adjusted. Transmission lines were tracked in real time. The results showed that the restoration effect of the algorithm was obvious. The clarity of the image was improved. It prepared for the extraction and tracking of the future transmission lines. Therefore, the proposed method provides a feasible way for the UAV power line inspection technology based on machine vision.</span></p>


2018 ◽  
Vol 14 (11) ◽  
pp. 90 ◽  
Author(s):  
Xieji Gang

To realize the exploration of A routing algorithm for ZigBee technology, a kind of intelligent parking system based on ZigBee wireless sensor network is designed, and the parking space is managed by online and offline interaction. First of all, the status of parking at home and abroad is studied, and the demand for parking is analyzed. Secondly, the intelligent scheme of parking system is studied, including parking guidance technology and parking space intelligent recommendation technology. The former is based on the A routing algorithm to search the shortest path, and uses Unity for route planning simulation, and the latter is based on collaboration filtering algorithm to discuss the recommendation method of similar parking spaces. The result shows that the prototype of an intelligent parking system based on ZigBee is eventually realized, and the functions of online viewing, online parking reservation, online path planning and parking guidance are realized. As a result, the purpose of managing offline parking spaces through online is achieved, the utilization rate of resources in the existing parking lot is improved and the use rate of parking space is promoted. At last, it effectively alleviates the urban parking chaos and has certain application value.


Sign in / Sign up

Export Citation Format

Share Document