research-article | 30-November-2020
I.
INTRODUCTION
As a wireless access network that can be deployed quickly and does not need expensive network wiring infrastructure, its application value in the next generation Internet has been proved. In the process of evolution to the next generation network, wireless is an indispensable technology. Wireless Mesh can cooperate with other networks and is dynamic and calculable network architecture.
Traditional wireless networks are mainly point-to-point or point-to-multipurpose star
Yana Luo,
Jian Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 73–78
Article | 30-November-2018
People can’t live without the internet; internet has become a necessity in daily life. The share of the network economy has accounted for 22% of the global GDP. The importance of the network has become more and more prominent, so the basic work about the network is even more important. Now the Internet has two biggest problems. One is the cyber sovereignty, which is about the network’s belongs. It is obviously that the United States hold the internet. How to adhere to cyber sovereignty is still
Yubian Wang,
Shebzukhov Yuri
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 61–65
Article | 30-November-2019
I.
THE NEW NETWORK IPV9
Internet Protocol (IP) is a communication protocol designed for computers to communicate with each other in the network. IP provides a common rule for computers to access the Internet. The Internet has become the largest open network in the world. With the rapid development of the global economy, the advancement of communication technology and network technology, the penetration rate of computers and mobile terminals is getting higher and higher. The problems with IPv4
Sun Huai,
Wang Zhongsheng
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 10–22
Article | 14-October-2020
limitations.
Since the establishment of the Decimal Network Standards Working Group of the Ministry of Industry and Information Technology in August 2001, Shanghai Decimal Network Information Technology Co., Ltd. has conducted more than 20 years of research in the future network field, developed a complete network framework system, and completed IPV9 with independent intellectual property rights. The patent obtained by IPV9 (2001, patent number CN98122785) has been recognized by many countries including
Guoshao Chen,
Yubian Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 73–79
Article | 14-October-2020
Decimal network is a complete independent intellectual property rights based overall decimal digital code, the establishment of 2256 times of cyberspace sovereignty. It includes 13 root domain name servers from the parent root, the primary root, and the zero-trust security mechanism for communication after verification. Compatible with current Internet systems, it has a future Internet architecture that overlaps geographical location and IP address space. Most Internet applications today are
Guangzhou Liu,
Fuya Yu
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 36–46
Article | 07-May-2018
This paper explains the idea of information security and discusses the establishment of the security system of information network. By using the information system security engineering method, we will establish and improve the network security plan and disaster recovery plan through strict organization and management, adequate financial support, strong talent support and deep technical guarantee. This paper puts forward the overall strategic goal of the “people-oriented, to prevent the main
Wang Yuanyuan
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 104–107
research-article | 31-August-2021
I.
Network quality monitoring method
Network measurement is obtaining the parameters and performance of the network through quantitative measurement. Usually, the main parameters of network measurement include congestion, delay, bandwidth, packet loss rate, throughput response speed and other application quality of service. Measurements can be divided into different types. According to the network level involved in the measurement, it can be divided into network layer measurement and
Jian Wang,
Zhongsheng Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 3, 36–41
Article | 30-November-2020
I.
THE GENERATION OF DECIMAL NETWORK
Nowadays, the network is highly valued by all countries in the world. The core of Internet technology is IPv4 and IPv6, and it is developed by the United States. The IPv4 protocol address space is 232, and it has some shortcoming with the development of the Internet, in theory, IPv6 has 2128 addresses, but only one eighth of the addresses can be assigned to end users, so IPv6 also has certain limitations.
Decimal network working group joint Shanghai network
Zhang Liu,
Shuyang Li
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 50–56
Article | 11-January-2021
I.
INTRODUCTION
TCP/IP network architecture and Protocol standards in recent years, computer network research and application of hot technology. At present, the widely used IP protocol is IPv4, based on which the Internet has become the largest computer network system in the world. However, with the rapid development of economic globalization and modern communication technology and network, the scale of computer network is expanding rapidly, and IPv4 protocol starts to expose various problems
Hu Shun,
Dongmei Xu,
Lin Gao
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 34–39
Article | 30-November-2018
I.
INTRODUCTION
The remote control system is an integration of control technology and network communication technology, it applications in many fields more and more common as ocean development, space station maintenance, remote surgery, virtual reality in recent years, and stable, fast, accurate is the highest target remote control system pursue[1].
Closed-loop controller is to control by the disturbances of feedback, which is by comparative behavior of the system output and the deviation
Xu Shuping,
Wang Shuang,
Guo yu,
Su Xiaohui
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 30–37
Article | 02-April-2020
I.
INTRODUCTION
The computer network refers to the computer system which can provide transmission, storage, analysis and sharing of data for the purpose of acquiring and mastering data. It serves for the needs of communication with others. Two or more computer networks with communication protocol, transmission channel and infrastructure interoperability constitute a computer network interconnection and interworking system that connects and shares data. Strictly speaking, it can be called
Chengjin Mou,
Xiaohui Guo
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 61–65
Article | 30-November-2018
other aspects. Although the use of NAT (“Network Address Translation”), CIDR (“Classless Inter-Domain Routing”) and other technologies can alleviate the IPv4 crisis to some extent. But in fact, it has not fundamentally solved the problem. At the same time, it will bring new problems in cost, quality of service, security and other aspects, posing greater challenges.
To solve the problem of insufficient IPv4 addresses, scientists proposed IPv6. However, due to the limitations of the technology era
Yufeng Lai,
Jianping Xie,
Xiaowei Cheng,
Yuyu Li
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 29–38
Article | 19-April-2021
I.
USER DYNAMIC SELECTION NETWORK
Regional Internet Service Provider (ISP) provides services for community ISP who is similar to a unified relay station provides directly network support for users. In this way, the packet cannot be transmitted directly, but are transmitted after some preprocessing in the middle [1].
There are three methods for users to choose the Internet.
One is that the network ports provided by the community ISP and a regional ISP only is connected, as shown in Figure 1(a
Wang Jian,
Wang Yubian
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 28–34
Article | 11-January-2021
relationship between the observer and the object similar to the object’s posture information, a set of activated neurons is selected to represent it. This group of neurons is called nerve capsule. One of the advantages of capsule network is that it needs less training data than convolutional neural network, but the effect is not inferior to it.
For the traditional neural network, neurons can not represent multiple attributes at the same time, resulting in the activation of neurons can only represent a
Yuxing Tan,
Hongge Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 1–8
Article | 07-May-2018
With the advent of the era of network, information technology has penetrated into many fields such as politics, economy, culture and so on. Human’s production mode, life style and learning way have changed greatly. The traditional educational mode has been unable to meet the diverse needs of students. Our educational reform and development are facing unprecedented challenges. The driving point of educational reform is to drive educational modernization with educational information. In this
Pan Yingli
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 95–98
Article | 23-April-2018
This paper proposes a single image dehazing based on deep neural network that is to deal with haze image. In this paper, we build up a deep neural network to restore the hazy image.We test our method both objective and subjective and compare with classical method for dehazing. Our test shows that our method works better than the others in reducing Halo effect and also our method does well in restore colorful of input image. Finally, our method process faster.
Dewei Huang,
Kexin Chen,
Jianqiang Lu,
Weixing Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 10–14
Research Article | 13-August-2019
This article discusses the conceptualization of network in Manuel Castells’ theory of network society and its relation to network analysis. Networks assumed a significant role in Castells’ opus magnum, The Information Age trilogy, in the latter half of the 1990s. He became possibly the most prominent figure globally in adopting network terminology in social theory, but at the same time he made hardly any empirical or methodological contribution to network analysis. This article
Ari-Veikko Anttiroiko
Journal of Social Structure, Volume 16 , ISSUE 1, 1–18
Article | 09-April-2018
In this paper, the neural network theory is used to establish the BP neural network prediction system for the occurrence of haze. The corresponding parameters are determined by MATLAB language, and the effect of the model is tested by the prediction of Shijiazhuang area. The result shows the feasibility of the predictive model. So it’s valuable and has a bright future.
Ma Limei,
Wang Fangwei
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 107–119
Article | 30-November-2019
With the rapid development of science and technology, the world has entered an information age of data communication. The most famous of the data networks is Internet, a packet-switched network developed by the U.S. department of defense called the ARPANET, which is considered the precursor to the information superhighway. Now almost all countries and regions have joined the Internet.
In order for information to be transmitted correctly over the Internet to its destination, each computer
Halavachou Yury,
Fei Xu
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 28–35
Article | 11-April-2018
Key point detection is still a challenging issue in pattern recognition. With the recent developments on complex network theory, pattern recognition techniques based on graphs have improved considerably. Key point detection can be approached by community identification in directed complex network because image is related with network model. This paper presents a complex network approach for key point detection in video monitoring image, which is both accurate and fast. We evaluate our method
Qingyu Zou,
Jianwen Guan,
Jing Bai,
Weiliang Sun
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 190–193
Article | 23-April-2018
In order to improve the network coverage, this paper presents the research on wireless sensor network coverage based on improved particle swarm optimization algorithmfor wireless sensor nodes that are randomly deployed in a certain area.In this paper, we use the regional network coverage as the target objective function, and combine various improved particle swarm optimization algorithms to optimize the deployment location of all nodes to enhance the area coverage. The experimental results show
Li Changxing,
Zhang Qing,
Zhang Long-yao
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 20–25
Research Article | 21-April-2017
Network reduction problem is formulated as follows: We are given a transportation network T, a set of important origin – destination relations R and a number q greater than 1. The goal is to find a subnetwork S of the given network T such that all shortest paths between all origin – destination pairs from R using only subnetwork S are not longer than q-multiple of the corresponding distance in original network T. A mathematical model and an exact algorithm of just mentioned task is presented.
Stanislav PALÚCH,
Štefan PEŠKO,
Tomáš MAJER,
Jan ČERNÝ
Transport Problems, Volume 10 , ISSUE 2, 69–74
Article | 30-November-2019
I.
IP
A.
The Introduction of IP
IP(Internet Protocol), is the network layer Protocol in the TCP/IP architecture.
When we use the Internet, the most important question is whether my messages and actions can be successfully sent and whether I can receive messages from the outside. Today, our needs are fundamentally assured through IP. Sending and receiving is actually a kind of information transmission, our various operations will be various applications in the form of packets for transmission
Liu Zhang,
Wang Yubian
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 47–57
research-article | 31-August-2021
the network to understand complex ideas by building upon simpler ones. For example, a deep network can build the concept of an image of a car by combining simpler concepts, such as edges, corners, contour, and object parts [1].
Convolutional Neural Network (CNN) is one such type of deep networks. Yann LeCan carried out one of the first exercises on CNN. He taught a computer system how to recognize the differences between handwritten digits [2]. When the system chose incorrectly, he would correct
Ashray Bhandare,
Devinder Kaur
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 3, 26–35
Article | 14-October-2020
many assumptions in the training process to achieve prediction, and finally achieves air quality the accuracy of the prediction needs to be further improved. The neural network has a good approximation effect in air quality prediction. It can continuously update the newly acquired air pollutant information to the neural network, update the prediction model in time, and improve the prediction accuracy. The neural network has a strong performance in air quality prediction. Dynamic adaptability and
Wenjing Wang,
Shengquan Yang
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 57–64
Article | 30-November-2020
I.
INTRODUCTION
Network control system based on Internet broke through the many limitations on control system based on field bus and become the new development direction of the network control system, stable, fast, and accurate still the ultimate goal of network control systems pursued [1]. Introduction network easy for the organization and deployment of the control system but the transmission delay and data drops inevitably exist in network communication, these will give control system adverse
Xu Shuping,
Wu Jinfe,
Su Xiaohui,
Xiong Xiaodun
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 1–10
Article | 08-April-2018
Aiming at the issues of random delay and delay uncertainty in both the before channel and feedback channel for network control system, the root causes of random delay influence closed-loop control system by case is analysis, and the predictive control method based on neural network to solve the feasibility of existence network random delay in control system closed-loop control has provided. Simulation results show that the method can reflect and predict the delay characteristics of between
Xu Shuping,
Chen Yiwei,
Cheng Xinhua,
Su Xiaohui
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 38–48
Article | 23-April-2018
A multi-cluster-head based clustering routing algorithm is researched and realized in order to achieve better balance the energy consumption of wireless sensor network nodes as well as promote the stability and extend the service life of the network. By taking cluster as the basic unit, it divides the wireless sensor network into multiple clusters, each of which includes a main cluster head node, an assistant cluster head node, a cluster management node and several ordinary nodes. The article
Jie Huang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 15–19
Article | 30-November-2018
I.
INTRODUCTION
At the beginning of the Internet development, IPv4 addresses were sufficient and successful, but in the last 20 years of the 20th century, the global Internet was growing rapidly, and the number of hosts connected to the Internet was growing exponentially every year. Therefore, the number of existing addresses is no longer sufficient for this development demand. IPv6 solves the problem of address shortage in IPv4, but it does not fully consider the network security problem in
Jiao Chong,
Jianping Xie,
Yinqiu Xu,
Hongwen Zhao
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 39–47
Article | 30-November-2020
of the blur kernel and achieves end-to-end deblurring, but due to the illposed nature of blind deblurring, the details of the image are missing, Enhance the color saturation of the image to meet human visual needs. Therefore, this article will focus on restoring the contour edges of the image. A multi-scale residual module is added to the network, and different convolution kernel sizes are used to extract more image features through the information sharing of the shallow network and the deep
Xu Hexin,
Zhao Li,
Jiao Yan
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 57–67
Article | 30-November-2018
lime rotary kiln is the main technology workers. Through the process system on-line monitoring state parameters to predict the current product quality, and it is as the basis for the adjustment of control parameters. The quality of products is greatly influenced by artificial judgment or off-line detection.
In this paper, the ability of the neural network is used to deal with the nonlinear mapping problem, and the quality of the product is predicted based on the on-line monitoring state parameters
Lingli Zhu,
Tingzhong Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 83–86
Research paper | 31-July-2017
This study aimed to provide a simple way to approach group differences by independent component analysis when researching functional connectivity changes of resting‑state network in brain disorders. We used baseline resting state functional magnetic resonance imaging from the Alzheimer’s disease neuroimaging initiative dataset and performed independent component analysis based on different kinds of subject selection, by including two downloaded templates and single‑subject independent
Chun‑Chao Huang,
Shang‑Hua Lin,
Ching‑Po Lin,
The Alzheimer’s Disease Neuroimaging Initiative
Acta Neurobiologiae Experimentalis, Volume 76 , ISSUE 4, 294–303
Research Article | 11-February-2019
Abstract
Although scholars have argued that people actively shape and reshape their social networks (e.g., Parks, 2016), this aspect of relational development has received little attention. This study sought to determine if people’s self-perceptions of interpersonal communication skills translated into behavior that led to relationship formation in a new network. A 9-month longitudinal social network analysis (N = 94) of the residents of a first-year university residence hall using Facebook tie
Christopher J. Carpenter,
Xun Zhu,
Rachel A. Smith
Journal of Social Structure, Volume 20 , ISSUE 1, 1–24
Article | 03-November-2017
The existing routing protocol for sensor networking can be divided into proactive routing protocol, reactive routing protocol and hybrid routing protocol. Each routing protocol has its merits and shortcomings. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. An adaptive method based on redundancy node and dual routing protocol was proposed in the study. Redundancy node, when wireless sensor network is being deployed, can divide the
Jiann-Liang Chen,
Yu-Ming Hsu,
I-Cheng Chang
International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 4, 515–539
Research Article | 10-January-2020
Analysis of social network data is often hampered by non-response and missing data. Recent studies show the negative effects of missing actors and ties on the structural properties of social networks. This means that the results of social network analyses can be severely biased if missing ties were ignored and only complete cases were analyzed. To overcome the problems created by missing data, several treatment methods are proposed in the literature: model-based methods within the framework of
Mark Huisman
Journal of Social Structure, Volume 10 , ISSUE 1, 1–29
Article | 11-April-2018
Wireless sensor network is composed of many wireless sensor nodes with the same or different functions. A typical sensor node consists of four parts: sensor unit, information processing unit, wireless communication unit and energy supply unit. In this paper, the existing ant colony algorithm is analyzed, and an improved ant colony optimization algorithm is proposed. The paper presents design of routing protocol and node structure in wireless sensor network based on improved ant colony
Yan Song,
Xiaomei Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 168–172
Article | 11-January-2021
I.
INTRODUCTION
The idea of “reorganizing the architecture of the web” is not a new idea. It has been around for 15 years. Since 2007, the international standardization organization ISO/IEC has been carrying out the Future Network standardization project of the new architecture Network system, and has set 2020 as the phased target for commercial use. This paper based on the research and development experience of ISO/IEC future network international standard, it shows that network system
Aiqun Wu,
Zhangxing Gao
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 75–81
Research paper | 27-December-2017
This paper discusses a new solution for switch management in intelligent manufacturing network. It makes PLC (Programmable Logic Controller) communication module have the switch management features and exchange I/O data in manufacturing network. The switch manager has used the chip of the Ethernet switch device 88E6165. The Marvell 88E6165 device embedded in communication devices is a single-chip 6 port gigabit Ethernet switch with five integrated gigabit Ethernet transceivers. It performs the
Guangfu Wang
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 856–878
Research Article | 10-April-2013
A fault diagnosis method based on adaptive dynamic clone selection neural network (ADCSNN) is proposed in this paper. In this method the weights of neural network is encoded as the antibody, and the network error is considered as the antigen. The algorithm is then applied to fault detection of motor equipment. The experiments results show that the fault diagnosis method based on ADCS neural network has the capability in escaping local minimum and improving the algorithm speed, this gives better
Wu Hongbing,
Lou Peihuang,
Tang Dunbing
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 482–504
Research Article | 12-December-2017
We adopt temporal graph model to explore the dynamic temporal properties of three mobility datasets in DTN (Delay Tolerant Network), collected from different sources, including one university campus WLAN and two conferences WLANs. With this model, we observe that the temporal network density of DTN changes with time and approximate varies periodically. Then we study the impact of this phenomenon on information diffusion. Our studies and findings can be used for establishing more realistic
Lintao Yang,
Sai Wang,
Hao Jiang
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 1, 35–52
research-article | 30-November-2021
This brief article illustrates the features of ScriptNet, a functional visualization software tool which implements elements of the “script-network” method (Lord et al., 2020). The toolkit is developed as a standard graphical user interface (GUI) found in the Windows operating systems (OS) and Macintosh operating systems (MacOS), and is available at: https://github.com/ScriptNet-project/ScriptNet
In its current format, ScriptNet has been developed as proof of concept. The code is open source
Elisa Bellotti,
Nicholas Lord,
Cecilia Flores Elizondo,
Joshua R. Melville,
Steve Mckellar
Connections, Volume 42 , ISSUE 1, 16–30
Research Article | 21-April-2017
The article deals with the possibilities of optimizing the postal transportation network with respect to planned road infrastructure. The research adopted in this article uses allocation models within graph theory to obtain results for addressed optimization problem. The article presents and compares two types of these models – p-median and uncapacitated fixed charge facility location model. The latter is subsequently applied on the postal network to determine the optimal location of postal
Radovan MADLEŇÁK,
Jozef ŠTEFUNKO
Transport Problems, Volume 10 , ISSUE 4, 35–43
Article | 01-June-2015
A novel intelligent neural network control scheme which integrates the merits of fuzzy inference, neural network adaptivity and simple PID method is presented in this paper. This control method overcomes the defects existed in the traditional variable frequency induction motor driven hydraulic source, such as slow response, poor control precision, easy to overshoot. Permanent magnet synchronous motor driven constant pump hydraulic system is designed instead of common motor, energy saving, fast
Ma Yu
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1406–1423
Article | 01-December-2016
Hyperspectral data has rich spectrum information, strong correlation between bands and high data redundancy. Feature band extraction of hyperspectral data is a prerequisite and an important basis for the subsequent study of classification and target recognition. Deep belief network is a kind of deep learning model, the paper proposed a deep belief network to realize the characteristics band extraction of hyperspectral data, and use the advantages of unsupervised and supervised learning of deep
Jiang Xinhua,
Xue Heru,
Zhang Lina,
Zhou Yanqing
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 1991–2009
research-article | 30-November-2020
I.
INTRODUCTION
The concept of capsule network started in 2011 and was proposed by Professor Hinton [1], and then in 2017, the first generation of capsule network (CapsNet) was realized. The capsule network includes three layers. The first two layers of the network use the traditional convolutional layer, and the capsule layer is added after the convolutional layer. And pioneered the use of dynamic routing algorithms in the network as the connection between the primary caps and digit caps to
Yan Jiao,
Li Zhao,
Hexin Xu
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 1–8
Research Article | 01-September-2014
A methodology based on multi-weights neural network (MWNN) is presented to identify faults of rolling bearing. With considerations of difficulties in analyzing rolling bearing vibration data, we analyzed how to extract time domain feature parameters of faults. Further, the time domain feature parameters extracted from fault signals are utilized to train multi-weights neural network for achieving an optimal coverage of fault feature space. Thus, faults of rolling bearing can
Yujian Qiang,
Ling Chen,
Liang Hua,
Juping Gu,
Lijun Ding,
Yuqing Liu
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1004–1023
Article | 31-July-2018
In the automation systems of sorting process the use of computer networks of Ethernet technology is possible. But its traditional drawback is a probabilistic nature of the network access, which does not guarantee the information transmission in specified time intervals. However, there are other technologies that are free from this defect, for example, the Token Ring technology. A methodology, for determination of the network parameters in the automation system on marshalling yard at the
Igor Zhukovyts'kyy,
Victoria Pakhomova
Transport Problems, Volume 13 , ISSUE 2, 149–158
Article | 01-December-2014
Underwater wireless sensor network nodes deployment optimization problem is studied and underwater wireless sensor nodes deployment determines its capability and lifetime. Underwater wireless sensor network if no wireless sensor node is available in the area due to used up energy or any other reasons, the area which is not detected by any wireless sensor node forms coverage holes. The coverage holes recovery algorithm aiming at the coverage holes in wireless sensor network is designed in this
Hengchang Jing
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1890–1907
Research Article | 27-December-2017
paper presents an immune network based unsupervised classification method, which is not necessary to define complex objective function. By arbitrarily selecting a certain number of data to be training samples, the proposed algorithm mines the prior knowledge of the samples and selects a few samples to constitute the initial nodes of immune network. After the evolutionary of the immune network, the clustering results are obtained, combined with nearest neighbor classification mechanism, the
Yanmin LUO,
Peizhong LIU,
Minghong LIAO
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 1, 116–134
Research Article | 01-September-2017
A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes
R. Elankavi,
R. Kalaiprasath,
R. Udayakumar
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 174–185
Article | 01-December-2014
In this paper, we share our recent work related to Radio Frequency Identification (RFID) sensor network with readers. The work mainly focus on the protocol for network system to perform the task of autonomous decentralized data distribution with consideration of economic and low-power RFID-sensor module scheme. We analyzed data pitfall in distributed RFID-sensor network, revealing the reason lies in the phenomenon. A distributed solution to tackle the problem has been designed in a simple way
Charles Z. Liew,
Raymond P. Shaw,
Ting-Ting Zhang
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1535–1554
Article | 11-March-2018
This study analyzed the e-mail exchange network of participants of a national dating website. The investigation examined whether aggregated partner preferences give rise to distinct, “invisible,” clusters in online dating networks that structure dating opportunities and result in homophilous subgroups. The findings identified and visualized the ten largest network clusters of participants who interacted with each other and examined the dater characteristics most responsible for
Diane H. Felmlee,
Derek A. Kreager
Journal of Social Structure, Volume 18 , ISSUE 1, –
Research Article | 27-December-2017
The ability to classify distinctive odor pattern for aromatic plants species provides significant impact in food industry especially for herbs. Each herbs species has a unique physicochemical and a distinctive odors. This project emphasizes on the techniques of artificial intelligence (AI) to distinguish distinctive odor pattern for herbs. Neural Network method has been exploited for the classification and optimization of various odor patterns. Based on AI techniques, Neural Network-based
A. Che Soh,
K. K.Chow,
U. K. Mohammad Yusuf,
A. J. Ishak,
M. K. Hassan,
S. Khamis
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 584–609
Article | 05-June-2013
Traditional data gathering approaches cannot be applied to Mobile Sensor Network (MSN) due to sparse network density and sensor node mobility. In this paper, we propose a utility based data gathering protocol (UDG). The distance utility is used to indicate the closeness between sensor nodes and the sink node, and the activity utility is used to evaluate the ability of sensor nodes acting as relays. UDG combines the distance utility with the activity utility to make routing decisions. It also
Liu Jieyan,
Wu Lei,
Gong Haigong
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 953–972
Article | 01-September-2016
Wireless sensor network is a kind of brand-new information acquisition platform, which is realized by the introduction of self-organizing and auto-configuration mechanisms. Node localization technology represents a crucial component of wireless sensor network. In this paper, a localization method based on kernel principal component analysis and particle swarm optimization back propagation algorithm is carefully discussed. First of all, taking KPCA as the front-end system to extract the main
Wang Jun,
Zhang Fu,
Ren Tiansi,
Chen Xun,
Liu Gang
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1323–1340
Article | 30-November-2019
Figure 1, blockchain system can achieve fast synchronization of data without central server and consistency of consensus mechanism through P2P network. P2P realizes the sharing of data resources and cooperation of services among terminal devices by means of direct exchange. However the dynamic and changeable of blockchain P2P network, the requirement of the availability of block chain network becomes more and more important.
Figure 1.
The architecture of p2p networks in the blockchain
From the
Zan Wang,
Yanfang Fu,
Lianjiong Zhong,
Fei Dai
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 36–43
Article | 30-November-2018
socket is actually a communication endpoint, an interface between an application and a network protocol. Each socket has a socket number, including the IP address of the host and a 16-bit host port number, such as (host IP address: port number).
In short, Socket is equals to (IP address: port number), which is represented by a decimal IP address followed by a port number, separated by a colon or comma. Each transport layer connection is uniquely identified by two terminals (that is, two sockets) at
Xu Yinqiu,
Xie Jianping
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 56–63
Article | 11-April-2018
Financial market dynamics forecasting has long been a focus of economic research. A hybridizing functional link artificial neural network (FLANN) and improved particle warm optimization (PSO) based on wavelet mutation (WM), named as IWM-PSO-FLANN, for forecasting the CSI 300 index is proposed in this paper. In the training model, it expands a wider mutation range while apply wavelet theory to the PSO, in order to exploring the solution space more effectively for better parameter solution. In
Tian Lu,
Zhongyan Li
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 173–178
research-article | 04-November-2019
spread of content and information design practices among influencers that ultimately influence appetite. The current study begins to address this gap by leveraging social network analysis and theoretical frameworks of social relationships to explore and interpret patterns of connections among food bloggers on Twitter.
Social Networking Sites Facilitate Connections Among Bloggers
To establish themselves as social media influencers, bloggers must display their identities in an authentic manner online
Allison D. Hepworth,
Jess Kropczynski,
Justin Walden,
Rachel A. Smith
Journal of Social Structure, Volume 20 , ISSUE 4, 1–21
Article | 01-March-2016
Aiming at three-dimensional space localization problem in wireless sensor network, a method of three-dimensional centroid algorithm with spherical perception radius (3DCSPR) is proposed. The algorithm uses Gaussian probability density function to estimate the sensor node radius, and uses tetrahedron method and three-dimensional center to locate unknown node with estimated. Firstly, RSSI value between beacon nodes and destination node is selected by RSSI distribution density function, that
Xiang Hua,
Zhang Jinjin,
Bin Lei
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 1, 233–255
Article | 14-July-2019
and agent-based simulation was justified for estimating the workload on transport infrastructure around the passenger port and for the existing ferry or cruise route network. The practical results of new simulation model, on the one hand, justify the need for a comprehensive study of the conditions for the formation of ferry and cruise route networks in changing conditions. On the other hand, these new results could improve the quality of decision-making process in forecasting the route network on
Nikolai MAIOROV,
Vladimir FETISOV,
Srećko KRILE,
Darijo MISKOVIC
Transport Problems, Volume 14 , ISSUE 2, 111–121
research-article | 30-November-2018
1.
INTRODUCTION
A protection zone along water distribution network is one of the proposals to limit the negative effects of potential breakages of buried water pipes, connected with the creation of swallow holes, hollows or depressions [1, 2]. Water flowing out from a leaking pipe can wash out fine soil particles from a solid matrix and move them through soil pores causing suffosion. The phenomena of this kind are dangerous especially in urban areas with developed infrastructure. Empty spaces
Małgorzata IWANEK,
Paweł SUCHORAB,
Łukasz SIDOROWICZ
Architecture, Civil Engineering, Environment, Volume 12 , ISSUE 1, 123–128
Article | 30-June-2013
Duty cycling is an important method for energy constrained sensor network systems to prolong lifetime. Current research on duty cycling is mainly based on such assumption that all the sensory coverage should be maintained while some nodes are sleeping. However, for the applications of target monitoring, it is not necessary anymore to keep the whole sensory coverage of the sensor network. It only needs to make sure that such kinds of nodes are active which can perceive the activities of the
Ying Guo,
Feng Hong,
Zhongwen Guo
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 1054–1076
Article | 01-June-2016
In order to effectively differentiate all kinds of defects inside the composites, this paper carries out testing on the internal defects of three-dimensional (3d) braided composites by use of acoustic emission nondestructive detecting technology. It puts forward the processing method for acoustic emission signals for the internal defects of three-dimensional braided composites based on wavelet neural network (WNN). This method does wavelet transformation on real-time collected acoustic emission
Su Hua,
Zhang Tianyuan,
Zhang Ning
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 780–798
Article | 01-September-2016
This paper proposes a novel localization algorithm for wireless sensor network (WSN). Accurate localization is very important for WSN. WSN localization problem is sometimes regarded as an optimization problem. Plant growth simulation algorithm (PGSA) is a kind of new intelligent optimization algorithm, which is intelligent simulation of plant growth in natural way. In addition to the common characteristics of intelligent algorithms, PGSA show robustness and provides a global optimal solution
Yuqiang Qin,
Hui Ying
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1287–1304
Article | 08-December-2019
Roll-on Roll-of (Ro-Ro) transport is one of the primary options EU policy is focusing on for developing intermodal transport and MOS initiatives, aimed at reducing road transport (especially trucks). In line with EU guidelines, this study proposes an integrated and optimized network scheme for the maritime Ro-Ro freight services currently operating in the Italian Tyrrhenian area to improve the overall supply of shipping services. The methodological approach used is based on the integration of
Gianfranco FANCELLO,
Patrizia SERRA,
Simona MANCINI
Transport Problems, Volume 14 , ISSUE 4, 63–76
research-article | 06-November-2020
through a filter that lets the larvae, but not the adults, though.
To further improve Caenorhabditis fitness analysis, here we present (i) a fitness assay protocol involving separation of parental and offspring generations and (ii) an open-source model for image analysis based on a convolutional neural network (CNN). Machine learning models are very convenient for image analysis because they can be trained on a sample of pictures to analyze images of interest with a high output rate. The concept of
Joanna K. Palka,
Krzysztof Fiok,
Weronika Antoł,
Zofia M. Prokop
Journal of Nematology, Volume 52 , 1–15
Research Article | 20-February-2013
Based on the analysis for the present research on controlling urban trunk road, a intelligent control method for urban trunk road based on wireless sensor and fuzzy neural network was proposed. In this method, we took two layers of WSN structure. The first one was data collecting layer, which consisted of traffic information collecting nodes and sink nodes. Data collecting layer was responsible for collecting vehicle information at single crossing, transmitted to the second layer after data
Peng Xiaohong,
Mo Zhi,
Liao Riyao
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 1, 352–367
Research Article | 13-December-2017
tracking system using multiple mobile sensors. For the purposes of surveillance and security, trackers use an Extended Kohonen neural network to track the moving targets in their environments. The proposed tracking algorithm can be used for single and multiple target tracking. A clustering algorithm is used in order to minimize the number of active trackers over time and hence save energy. An auction based algorithm is used for the purpose of optimizing the cooperation between trackers. Quantitative
Ahmed M. Elmogy,
Fakhreddine O. Karray
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 3, 716–734
Article | 08-December-2019
Today, one of the main important tasks is to analyze the states of achievement related to the required levels for marine passenger terminals and their route networks, depending on the influence of the external environment (based on the discretization of processes). This proposal is relevant both to increase the passenger traffic and to change the route network of ferry lines. There is an uneven congestion of individual directions of ferry lines and passenger terminals, which determines the need
Nikolai MAIOROV,
Vladimir FETISOV,
Srećko KRILE,
Darijo MISKOVIC
Transport Problems, Volume 14 , ISSUE 4, 21–30
Article | 05-September-2013
According to EGTS proposal, an adaptive channel hopping algorithm that can be used in wireless mesh sensor networks was is designed in this paper. The nodes select proper channels independently and use them to communicate with their neighbors. Once a pair of nodes find their current channel has been deteriorated, they abandoned the current channel and enable the reserved channel, so that the reliability of the network is improved. The algorithm is compatible with the primitives and the frame
Zhao Jindong,
Fan Baode,
Lu Yunhong,
Mu Chunxiao
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, –
Article | 07-May-2018
Aiming at the issues of random delay and delay uncertainty of the control information network, a kind of network remote closed-loop control structure based on virtual reality simulation is proposed. The method in accordance with the idea of open-loop system to achieve closed-loop control make the influence of network latency excluded real-time little closed-loop control system of controlled object value and no effect on the characteristics of the controlled object. Simulation results show that
Su Xiaohui,
Dong Qiyu,
Huang Mengyao,
Xu Shuping
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 22–27
Research paper | 31-October-2017
compared with ANN (Artificial Neural Network) methodology. The results showed that ANN performed better than the ARIMA models in forecasting the prices.
Abhishek Singh,
G. C. Mishra
Statistics in Transition New Series, Volume 16 , ISSUE 1, 83–96
Article | 05-June-2013
sensor network. Furthermore, collected data are proved to be consistent with natural phenomenon. Compared with traditional monitoring method, the new method has better advantages.
He Yueshun,
Zhang Wei
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 867–887
research-article | 27-March-2019
population control in broader social structures is also gaining momentum, as recent studies on diffusion have shown that fertility choices often are made within a social network (Behrman et al., 2002; Kincaid, 2000; Montgomery and Casterline, 1993; Rutenberg and Watkins, 1997; Perkins et al., 2015). Even so, few studies have focused on the role of men enmeshed within social and institutional structures. This is especially wanting in the fertility studies in the South Asian context, which is characterised
Bhanu Bhatia
Journal of Social Structure, Volume 20 , ISSUE 2, 1–19
Article | 30-November-2018
control the oil pump accurately and stably, and is easy to cause system shock. With the development of intelligent control technology, such as fuzzy control, neural network control, and sensor technology, more and more control methods and control technology become more and more mature. This paper synthesizes the advantages of simple PID control, fuzzy control does not depend on model, and neural network control is adaptive. Fuzzy neural network PID control is used to control oil pump accurately, after
Chen Gong,
Shengquan Yang
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 63–68
Article | 13-July-2020
features of images than traditional inpainting algorithms based on structure and texture, so often used for image inpainting. At present, image inpainting based on generative adversarial networks is a major research hotspot in the field of deep learning image inpainting, which lays a solid foundation for the development of image inpainting technology.
A.
The basic idea of generating adversarial networks
Generative adversarial network is undoubtedly one of the popular artificial intelligence
Zhao Li,
Zhao Ruixia
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 23–30
Article | 02-November-2017
A smart space, such as smart sensor rooms, an office, or simply an area, requires a smart telephony network for an effective voice communication between users. Nowadays, modern Private Branch Exchange (PBX) system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically
Heng-Chih Huang,
Yueh-Min Huang,
Kuan-Chieh Chiu
International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 1, 15–29
Article | 01-September-2015
To identify the important attributes of complex system, which is high-dimensional and contain both discrete and continuous variables, this paper proposes a sensitivity analysis method of hierarchical hybrid fuzzy - neural network. We derive the sensitivity indexes of discrete and continuous variables through the differential method. To verify the effectiveness of our method, this study employed a man-made example and a remote sensing image classification example to test the performance of our
Xing Haihua,
Yu Xianchuan,
Hu Dan,
Dai Sha
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1837–1854
Article | 24-November-2017
postal logistics network. Published results is oriented to revaluate existing position of local centre and find a location for the new local distribution centre potentially. New location of local distribution centre can to optimize (minimize) the total transport costs of the local postal transportation network in area of the Lublin Province.
Paweł DROŹDZIEL,
Monika WIŃSKA,
Radovan MADLEŇÁK,
Paweł SZUMSKI
Transport Problems, Volume 12 , ISSUE 3, 43–50
Article | 30-November-2018
A datagram is the basic unit of data transmitted on the network. It contains a header and the data itself, in which the header describes the destination of the data and its relationship to other data. Datagram is a complete and independent data entity, which carries the information to be transferred from the source computer to the destination computer and does not rely on the previous exchange between the source and the destination and the transmission network [1]. TCP/IP protocol defines a
Zhongsheng Wang,
Jianping Xie,
Zhao Lin,
Wei Zhong
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 10–28
Article | 08-April-2018
In order to keep multi-role communication action of virtual network classroom orderly and correctly at the same time, this paper proposes and studies its communication collaborative relationship based on Petri Net. Firstly, it introduces the basic theory and the system state change graph of the roles in virtual classroom, and discusses in detail the collaborative relationship between students and teacher in network environment. Especially by taking advantage of Petri Net tool, this paper in
Shengquan Yang,
Shujuan Huang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 29–37
research-article | 25-August-2020
self-driving library written in Python for the implementation of the neural network. To analyze the AI aspect of the research, the paper by NVIDIA DAVE-2 (Bojarski et al., 2016) and ALVINN (Pomerleau, 1989) were the first attempts to build an operational CNN-based model.
Analyzing different research work done, this research paper uses different heterogeneous and open-source material to build the autonomous vehicle (Blaga et al., 2018; Zhang and Mahale, 2018; Tian et al., 2018). It also reports the
Avishkar Seth,
Alice James*,
Subhas C. Mukhopadhyay
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–17
Article | 01-September-2015
, we present a prototype of a multimodal architecture, and show how modality selection and fission algorithms are implemented in such a system. We use a pattern technique to divide a complex command into elementary subtasks and select suitable modalities for each of them. We integrate a context-based method using a Bayesian network to resolve ambiguous or uncertain situations.
Atef Zaguia,
Chakib Tadj,
Amar Ramdane-Cherif
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1667–1686
Article | 07-May-2018
Target recognition has always been a hot research topic in computer image and pattern recognition. This paper proposes a target recognition method based on decision layer fusion. ModelNet[1]—The 3D CAD model library, which is used to be identified. Features are extracted from the model’s point cloud data and multi-view images. The image is identified using the AlexNet[2] network, The point cloud is identified by the VoxNet[3] network. The fusion algorithm is used in the decision layer to
Ma Xing,
Yu Fan,
Yu Haige,
Wei Yanxi,
Yang Wenhui
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 19–22
Article | 07-May-2018
algorithm is low. In allusion to the problem of poor accuracy of email classification based on naive bayes algorithm, scholars have proposed some new email classification algorithms. The email classification algorithm based on deep neural network is one kind of them. The deep neural network is an artificial neural network with full connection between layer and layer. The algorithm extracted the email feature from the training email samples and constructed a DNN with multiple hidden layers, the DNN
Wang Yawen,
Yu Fan,
Wei Yanxi
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 17–21
Article | 09-April-2018
This paper presented the research on heat load prediction method of central heating system. The combined simulation data at Xi'an in January was used as the samples for training and predicting. This paper selected the daily average outdoor wind speed, the daily average outdoor temperature, date type, sunshine duration as input variables and the heating load value as output variable. After preprocessing of the historical data, the BP neural network algorithm and the GA-BP algorithm were
Bingqing Guo,
Jin Xu,
Ling Cheng,
Lei Chen
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 137–141
Article | 30-November-2018
designed manually (such as SIFT, SURF, HOG, etc.), and the features of the artificial design are well interpreted. However, in the face of complex backgrounds, changing fonts and various deformations, it is rather troublesome and difficult to extract more general features[7].
The Convolutional Neural Network (CNN) is a multi-layered supervised learning neural network. Although the training process requires a large amount of data compared with the traditional method, the convolutional neural network can
Haoqi Yang,
Hongge Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 47–52
research-article | 30-November-2018
Nomenclatures
SE
state estimation
PS
power system
PSN
power system networks
PSO–NN
particle swarm optimization–neural network
DPN
distribution power network
RDPSNs
radial distribution power system networks
DMS
distribution management system
GTP
graph theoretic procedure algorithm
DSSE
distribution system state estimation model
WLS
weighted least square
WLAV
weighted least absolute value
PMUs
phasor measurement units
ANN
artificial neural network
Husham Idan Hussein,
Ghassan Abdullah Salman,
Ahmed Majeed Ghadban
International Journal on Smart Sensing and Intelligent Systems
, Volume 12 , ISSUE 1, 1–10
Article | 01-September-2014
point for estimating average condition. Sensor node at each monitoring point is connected via RS 485 network which works with a protocol developed for this purpose. Each sensor node consists of sensors, signal conditioning, controller and RS485 transceiver. All these nodes are calibrated and the voltage level of RS 485 system is converted to RS 232 voltage level to make compatible with the COM port of the PC. Data acquisition software is developed with the help of NI Lab VIEW.
Debashis Saikia,
P.K. Boruah,
Utpal Sarma
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1254–1270
Article | 02-April-2020
;;
So far, all values of the attribute have been expressed as One-Hot form.
D.
Data Fusion
This section analyzes the problem of data fusion, that is, how to merge Large_Attributes, Small_Attributes, Interval_Attributes, and Enumerated_Attributes together. This thesis will propose a pixel-based data fusion method: first establish a pixel matrix; then use a fully connected neural network model to process the pixel matrix.
1)
Create a pixel matrix
This section aims to transform multiple attributes
Yonghui Yang
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 1–8
Article | 10-April-2018
Aiming at the problem that the micro drills is easy to be broken in the process of drilling; it is difficult to detect the drill bit. The drilling torque signal is taken as the monitoring object. A new method for the on-line monitoring the micro-drill breakage based on BP neural network is proposed. After the three layer wavelet decomposition of the drilling torque signal, the energy feature vector is used as the input layer of the BP network, and the mapping model of the working state and the
Yanhong Sun,
Mei Tian
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 142–146
research-article | 15-October-2020
The first time I showed the visualization of the personal network to a respondent I had the feeling of being in front of a tool with enormous potential. It was a case of a student who had just adopted a metropolitan lifestyle, moving almost daily between the city where she lived and the capital where she was studying at the university. The analysis of the structural properties of her personal network was a good way to describe the distribution of her relationships (and her life) between
Isidro Maya-Jariego
Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 98–102
Article | 05-June-2013
Wireless sensor network (WSN) shows unique advantages in cold alpine area comparing with traditional in-situ monitoring approaches. This paper presents two WSN applications in cold alpine area, one in the Hulugou watershed and the other in the Babaohe watershed, both of which are situated in the upper mountainous reach of the Heihe River Basin of West China. Apart from introductions to the two WSN applications and experimental results, experiences learned and challenges met during designing
Chen Hao,
Nan Zhuotong
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 932–952
research-article | 30-November-2020
strategy has been extensively studied and many viable solutions have been developed and proposed, for example model predictive control (MPC) (Cristea et al., 2011; Han et al., 2012; Holenda et al., 2008; Martín et al., 2012; Yang et al., 2013), PID (Du et al., 2018; Husin et al., 2020b; Samsudin et al., 2013), fuzzy and neural network (NN) control (Han et al., 2020).
However, even with the DO control strategy, the aeration cost issues persist as DO control requires aerators and turbines which are
M. H. Husin,
M. F. Rahmat,
N. A. Wahab,
M. F. M. Sabri
International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–16
Article | 16-December-2013
Usability of QR Code in Augmented Reality system has been used for digital content accessible publicly. However, QR Code in AR system still has imprecision tracking. In this article we propose merging QR Code within conventional marker and backpropagation neural network (BPNN) algorithm to recognizing QR Code Finder Pattern. The method which our chosen to approaching conventional marker. The result of BPNN testing, QRFP detected in perspective distortion with ID-encoded character length 78, 53
Gia M. Agusta,
Khodijah Hulliyah,
Arini,
Rizal Broer Bahaweres
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 1918–1948
research-article | 30-November-2020
This article examines how leadership decapitation affects the decisions of drug cartels and militias to fight each other. Previous work investigates how the arrest or killing of a criminal or insurgent leader affects the viability of the group being targeted and changes in the level of violence (Atuesta and Ponce, 2017; Cronin, 2009; Johnston, 2012; Phillips, 2015; Price, 2012). However, the effect of such operations on the infighting network of criminal and vigilante organizations has not
Darren Colby
Connections, Volume 41 , ISSUE 1, 1–11
Article | 30-November-2020
and statistics, namely deep convolutional neural networks (CNNs), was proposed by Proenca and was also used to build periocular recognition systems. At the same time, Canadian professor Hugo. Proenca [5] also proposed to use neural network to process the human eye areas outside the eye, and to take the features extracted from these areas as a mode of identity recognition and attribute recognition.
In order to solve the problem of angular rotation of eyes in practical application, this paper
Bo Liu,
Songze Lei,
Yonggang Li,
Aokui Shan,
Baihua Dong
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 11–17
Research paper | 01-June-2011
This paper presents the impact of utilizing a biased energy distribution (BED) scheme for clustering sensor networks. In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols assume that all the nodes are provided with equal amount of energy but this shortens the network lifetime and makes the network unstable. This paper proposes a
A. F. Salami,
H. Bello-Salau,
F. Anwar,
A. M. Aibinu
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 2, 161–173
Article | 30-November-2018
and technical applications. 5G wireless communication technology is the fifth generation mobile communication technology. It was developed on the basis of the 4th generation mobile network of certain innovations and transformations. Compared to the previous 2G, 3G, 4G, 5G technology, they have taken advantage of them. Make up for the shortcomings of previous signal differences and network instability. There is no uniform definition of 5G technology [1]. The general consensus that has emerged is
Junying Bai,
Yongli An,
Ruihua Sun
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 86–92