• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • Journal Of Social Structure
  • In Jour Smart Sensing And Intelligent Systems
  • Journal Of Nematology
  • International Journal Advanced Network Monitoring Controls
  • Transport Problems
  • Architecture Civil Engineering Environment
  • Acta Neurobiologiae Experimentalis
  • Connections
  • Statistics In Transition


research-article | 30-November-2020

Technical Introduction of Wireless Mesh Network

I. INTRODUCTION As a wireless access network that can be deployed quickly and does not need expensive network wiring infrastructure, its application value in the next generation Internet has been proved. In the process of evolution to the next generation network, wireless is an indispensable technology. Wireless Mesh can cooperate with other networks and is dynamic and calculable network architecture. Traditional wireless networks are mainly point-to-point or point-to-multipurpose star

Yana Luo, Jian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 73–78

Article | 30-November-2018

From Network Security to Network Autonomous

People can’t live without the internet; internet has become a necessity in daily life. The share of the network economy has accounted for 22% of the global GDP. The importance of the network has become more and more prominent, so the basic work about the network is even more important. Now the Internet has two biggest problems. One is the cyber sovereignty, which is about the network’s belongs. It is obviously that the United States hold the internet. How to adhere to cyber sovereignty is still

Yubian Wang, Shebzukhov Yuri

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 61–65

Article | 30-November-2019

Research and Implementation of Future Network Router

I. THE NEW NETWORK IPV9 Internet Protocol (IP) is a communication protocol designed for computers to communicate with each other in the network. IP provides a common rule for computers to access the Internet. The Internet has become the largest open network in the world. With the rapid development of the global economy, the advancement of communication technology and network technology, the penetration rate of computers and mobile terminals is getting higher and higher. The problems with IPv4

Sun Huai, Wang Zhongsheng

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 10–22

Article | 14-October-2020

Interview with the Inventor of the Future Network IPV9

limitations. Since the establishment of the Decimal Network Standards Working Group of the Ministry of Industry and Information Technology in August 2001, Shanghai Decimal Network Information Technology Co., Ltd. has conducted more than 20 years of research in the future network field, developed a complete network framework system, and completed IPV9 with independent intellectual property rights. The patent obtained by IPV9 (2001, patent number CN98122785) has been recognized by many countries including

Guoshao Chen, Yubian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 73–79

Article | 14-October-2020

A Method to Access a Decimal Network (IPV9) Resource

Decimal network is a complete independent intellectual property rights based overall decimal digital code, the establishment of 2256 times of cyberspace sovereignty. It includes 13 root domain name servers from the parent root, the primary root, and the zero-trust security mechanism for communication after verification. Compatible with current Internet systems, it has a future Internet architecture that overlaps geographical location and IP address space. Most Internet applications today are

Guangzhou Liu, Fuya Yu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 36–46

Article | 07-May-2018

The Establishment and Implementation of Information Network Security Plan

This paper explains the idea of information security and discusses the establishment of the security system of information network. By using the information system security engineering method, we will establish and improve the network security plan and disaster recovery plan through strict organization and management, adequate financial support, strong talent support and deep technical guarantee. This paper puts forward the overall strategic goal of the “people-oriented, to prevent the main

Wang Yuanyuan

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 104–107

Article | 30-November-2020

Application Research of Decimal Network Technology

I. THE GENERATION OF DECIMAL NETWORK Nowadays, the network is highly valued by all countries in the world. The core of Internet technology is IPv4 and IPv6, and it is developed by the United States. The IPv4 protocol address space is 232, and it has some shortcoming with the development of the Internet, in theory, IPv6 has 2128 addresses, but only one eighth of the addresses can be assigned to end users, so IPv6 also has certain limitations. Decimal network working group joint Shanghai network

Zhang Liu, Shuyang Li

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 50–56

Article | 11-January-2021

Discussion on Decimal Network Based on IPV9

I. INTRODUCTION TCP/IP network architecture and Protocol standards in recent years, computer network research and application of hot technology. At present, the widely used IP protocol is IPv4, based on which the Internet has become the largest computer network system in the world. However, with the rapid development of economic globalization and modern communication technology and network, the scale of computer network is expanding rapidly, and IPv4 protocol starts to expose various problems

Hu Shun, Dongmei Xu, Lin Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 34–39

Article | 30-November-2018

Research of Network Closed-loop Control System Based on the Model Predictive Control

I. INTRODUCTION The remote control system is an integration of control technology and network communication technology, it applications in many fields more and more common as ocean development, space station maintenance, remote surgery, virtual reality in recent years, and stable, fast, accurate is the highest target remote control system pursue[1]. Closed-loop controller is to control by the disturbances of feedback, which is by comparative behavior of the system output and the deviation

Xu Shuping, Wang Shuang, Guo yu, Su Xiaohui

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 30–37

Article | 02-April-2020

Review of Network Technology System from the Past, Present to the Future

I. INTRODUCTION The computer network refers to the computer system which can provide transmission, storage, analysis and sharing of data for the purpose of acquiring and mastering data. It serves for the needs of communication with others. Two or more computer networks with communication protocol, transmission channel and infrastructure interoperability constitute a computer network interconnection and interworking system that connects and shares data. Strictly speaking, it can be called

Chengjin Mou, Xiaohui Guo

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 61–65

Article | 30-November-2018

Design and Research of New Network Address Coding

other aspects. Although the use of NAT (“Network Address Translation”), CIDR (“Classless Inter-Domain Routing”) and other technologies can alleviate the IPv4 crisis to some extent. But in fact, it has not fundamentally solved the problem. At the same time, it will bring new problems in cost, quality of service, security and other aspects, posing greater challenges. To solve the problem of insufficient IPv4 addresses, scientists proposed IPv6. However, due to the limitations of the technology era

Yufeng Lai, Jianping Xie, Xiaowei Cheng, Yuyu Li

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 29–38

Article | 19-April-2021

Research on User Dynamic Selection Network Technology

I. USER DYNAMIC SELECTION NETWORK Regional Internet Service Provider (ISP) provides services for community ISP who is similar to a unified relay station provides directly network support for users. In this way, the packet cannot be transmitted directly, but are transmitted after some preprocessing in the middle [1]. There are three methods for users to choose the Internet. One is that the network ports provided by the community ISP and a regional ISP only is connected, as shown in Figure 1(a

Wang Jian, Wang Yubian

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 28–34

Article | 11-January-2021

Deep Capsule Network Handwritten Digit Recognition

relationship between the observer and the object similar to the object’s posture information, a set of activated neurons is selected to represent it. This group of neurons is called nerve capsule. One of the advantages of capsule network is that it needs less training data than convolutional neural network, but the effect is not inferior to it. For the traditional neural network, neurons can not represent multiple attributes at the same time, resulting in the activation of neurons can only represent a

Yuxing Tan, Hongge Yao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 1–8

Article | 07-May-2018

Research on the Application of Political Teaching Under the Network Platform

With the advent of the era of network, information technology has penetrated into many fields such as politics, economy, culture and so on. Human’s production mode, life style and learning way have changed greatly. The traditional educational mode has been unable to meet the diverse needs of students. Our educational reform and development are facing unprecedented challenges. The driving point of educational reform is to drive educational modernization with educational information. In this

Pan Yingli

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 95–98

Article | 23-April-2018

Single Image Dehazing Based on Deep Neural Network

This paper proposes a single image dehazing based on deep neural network that is to deal with haze image. In this paper, we build up a deep neural network to restore the hazy image.We test our method both objective and subjective and compare with classical method for dehazing. Our test shows that our method works better than the others in reducing Halo effect and also our method does well in restore colorful of input image. Finally, our method process faster.

Dewei Huang, Kexin Chen, Jianqiang Lu, Weixing Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 10–14

Research Article | 13-August-2019

Castells' network concept and its connections to social, economic and political network analyses

This article discusses the conceptualization of network in Manuel Castells’ theory of network society and its relation to network analysis. Networks assumed a significant role in Castells’ opus magnum, The Information Age trilogy, in the latter half of the 1990s. He became possibly the most prominent figure globally in adopting network terminology in social theory, but at the same time he made hardly any empirical or methodological contribution to network analysis. This article

Ari-Veikko Anttiroiko

Journal of Social Structure, Volume 16 , ISSUE 1, 1–18

Article | 09-April-2018

The Prediction of Haze Based on BP Neural Network and Matlab

In this paper, the neural network theory is used to establish the BP neural network prediction system for the occurrence of haze. The corresponding parameters are determined by MATLAB language, and the effect of the model is tested by the prediction of Shijiazhuang area. The result shows the feasibility of the predictive model. So it’s valuable and has a bright future.

Ma Limei, Wang Fangwei

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 107–119

Article | 30-November-2019

Comparison Research on Future Network Between IPv4, IPv6 and IPV9

With the rapid development of science and technology, the world has entered an information age of data communication. The most famous of the data networks is Internet, a packet-switched network developed by the U.S. department of defense called the ARPANET, which is considered the precursor to the information superhighway. Now almost all countries and regions have joined the Internet. In order for information to be transmitted correctly over the Internet to its destination, each computer

Halavachou Yury, Fei Xu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 28–35

Article | 11-April-2018

Key Point Detection in Images Based on Triangle Distribution of Directed Complex Network

Key point detection is still a challenging issue in pattern recognition. With the recent developments on complex network theory, pattern recognition techniques based on graphs have improved considerably. Key point detection can be approached by community identification in directed complex network because image is related with network model. This paper presents a complex network approach for key point detection in video monitoring image, which is both accurate and fast. We evaluate our method

Qingyu Zou, Jianwen Guan, Jing Bai, Weiliang Sun

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 190–193

Article | 23-April-2018

Research on Wireless Sensor Network Coverage Based on Improved Particle Swarm Optimization Algorithm

In order to improve the network coverage, this paper presents the research on wireless sensor network coverage based on improved particle swarm optimization algorithmfor wireless sensor nodes that are randomly deployed in a certain area.In this paper, we use the regional network coverage as the target objective function, and combine various improved particle swarm optimization algorithms to optimize the deployment location of all nodes to enhance the area coverage. The experimental results show

Li Changxing, Zhang Qing, Zhang Long-yao

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 20–25

Research Article | 21-April-2017

Transportation network reduction

Network reduction problem is formulated as follows: We are given a transportation network T, a set of important origin – destination relations R and a number q greater than 1. The goal is to find a subnetwork S of the given network T such that all shortest paths between all origin – destination pairs from R using only subnetwork S are not longer than q-multiple of the corresponding distance in original network T. A mathematical model and an exact algorithm of just mentioned task is presented.

Stanislav PALÚCH, Štefan PEŠKO, Tomáš MAJER, Jan ČERNÝ

Transport Problems, Volume 10 , ISSUE 2, 69–74

Article | 30-November-2019

Research and Implementation of Future Network IPV9

I. IP A. The Introduction of IP IP(Internet Protocol), is the network layer Protocol in the TCP/IP architecture. When we use the Internet, the most important question is whether my messages and actions can be successfully sent and whether I can receive messages from the outside. Today, our needs are fundamentally assured through IP. Sending and receiving is actually a kind of information transmission, our various operations will be various applications in the form of packets for transmission

Liu Zhang, Wang Yubian

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 47–57

Article | 14-October-2020

Analysis and Forecast of Urban Air Quality Based on BP Neural Network

many assumptions in the training process to achieve prediction, and finally achieves air quality the accuracy of the prediction needs to be further improved. The neural network has a good approximation effect in air quality prediction. It can continuously update the newly acquired air pollutant information to the neural network, update the prediction model in time, and improve the prediction accuracy. The neural network has a strong performance in air quality prediction. Dynamic adaptability and

Wenjing Wang, Shengquan Yang

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 57–64

Article | 30-November-2020

Research of Forecasting Information Time Delays with Nenural Network in Telecontrol System

I. INTRODUCTION Network control system based on Internet broke through the many limitations on control system based on field bus and become the new development direction of the network control system, stable, fast, and accurate still the ultimate goal of network control systems pursued [1]. Introduction network easy for the organization and deployment of the control system but the transmission delay and data drops inevitably exist in network communication, these will give control system adverse

Xu Shuping, Wu Jinfe, Su Xiaohui, Xiong Xiaodun

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 1–10

Article | 08-April-2018

The Research of Information Delay in the Neural Network Forecast Remote Control System

Aiming at the issues of random delay and delay uncertainty in both the before channel and feedback channel for network control system, the root causes of random delay influence closed-loop control system by case is analysis, and the predictive control method based on neural network to solve the feasibility of existence network random delay in control system closed-loop control has provided. Simulation results show that the method can reflect and predict the delay characteristics of between

Xu Shuping, Chen Yiwei, Cheng Xinhua, Su Xiaohui

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 38–48

Article | 23-April-2018

Research on Balanced Energy Consumption of Wireless Sensor Network Nodes Based on Clustering Algorithm

A multi-cluster-head based clustering routing algorithm is researched and realized in order to achieve better balance the energy consumption of wireless sensor network nodes as well as promote the stability and extend the service life of the network. By taking cluster as the basic unit, it divides the wireless sensor network into multiple clusters, each of which includes a main cluster head node, an assistant cluster head node, a cluster management node and several ordinary nodes. The article

Jie Huang

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 15–19

Article | 30-November-2018

Research of New Network Address Structure

I. INTRODUCTION At the beginning of the Internet development, IPv4 addresses were sufficient and successful, but in the last 20 years of the 20th century, the global Internet was growing rapidly, and the number of hosts connected to the Internet was growing exponentially every year. Therefore, the number of existing addresses is no longer sufficient for this development demand. IPv6 solves the problem of address shortage in IPv4, but it does not fully consider the network security problem in

Jiao Chong, Jianping Xie, Yinqiu Xu, Hongwen Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 39–47

Article | 30-November-2020

Motion Blur Image Restoration by Multi-Scale Residual Neural Network

of the blur kernel and achieves end-to-end deblurring, but due to the illposed nature of blind deblurring, the details of the image are missing, Enhance the color saturation of the image to meet human visual needs. Therefore, this article will focus on restoring the contour edges of the image. A multi-scale residual module is added to the network, and different convolution kernel sizes are used to extract more image features through the information sharing of the shallow network and the deep

Xu Hexin, Zhao Li, Jiao Yan

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 57–67

Article | 30-November-2018

Application of Improved BP Neural Network in Hybrid Control Model of Lime Quality

lime rotary kiln is the main technology workers. Through the process system on-line monitoring state parameters to predict the current product quality, and it is as the basis for the adjustment of control parameters. The quality of products is greatly influenced by artificial judgment or off-line detection. In this paper, the ability of the neural network is used to deal with the nonlinear mapping problem, and the quality of the product is predicted based on the on-line monitoring state parameters

Lingli Zhu, Tingzhong Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 83–86

Research paper | 31-July-2017

The effect of network template from normal subjects in the detection of network impairment

This study aimed to provide a simple way to approach group differences by independent component analysis when researching functional connectivity changes of resting‑state network in brain disorders. We used baseline resting state functional magnetic resonance imaging from the Alzheimer’s disease neuroimaging initiative dataset and performed independent component analysis based on different kinds of subject selection, by including two downloaded templates and single‑subject independent

Chun‑Chao Huang, Shang‑Hua Lin, Ching‑Po Lin, The Alzheimer’s Disease Neuroimaging Initiative

Acta Neurobiologiae Experimentalis, Volume 76 , ISSUE 4, 294–303

Research Article | 11-February-2019

Do People Who Identify as Popular Become Popular in a New Network? A 9-Month Longitudinal Network Analysis

Abstract Although scholars have argued that people actively shape and reshape their social networks (e.g., Parks, 2016), this aspect of relational development has received little attention. This study sought to determine if people’s self-perceptions of interpersonal communication skills translated into behavior that led to relationship formation in a new network. A 9-month longitudinal social network analysis (N = 94) of the residents of a first-year university residence hall using Facebook tie

Christopher J. Carpenter, Xun Zhu, Rachel A. Smith

Journal of Social Structure, Volume 20 , ISSUE 1, 1–24

Article | 03-November-2017

Adaptive Routing Protocol for Reliable Sensor Network Applications

The existing routing protocol for sensor networking can be divided into proactive routing protocol, reactive routing protocol and hybrid routing protocol. Each routing protocol has its merits and shortcomings. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. An adaptive method based on redundancy node and dual routing protocol was proposed in the study. Redundancy node, when wireless sensor network is being deployed, can divide the

Jiann-Liang Chen, Yu-Ming Hsu, I-Cheng Chang

International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 4, 515–539

Research Article | 10-January-2020

Imputation of missing network data: Some simple procedures

Analysis of social network data is often hampered by non-response and missing data. Recent studies show the negative effects of missing actors and ties on the structural properties of social networks. This means that the results of social network analyses can be severely biased if missing ties were ignored and only complete cases were analyzed. To overcome the problems created by missing data, several treatment methods are proposed in the literature: model-based methods within the framework of

Mark Huisman

Journal of Social Structure, Volume 10 , ISSUE 1, 1–29

Article | 11-April-2018

Design of Routing Protocol and Node Structure in Wireless Sensor Network based on Improved Ant Colony Optimization Algorithm

Wireless sensor network is composed of many wireless sensor nodes with the same or different functions. A typical sensor node consists of four parts: sensor unit, information processing unit, wireless communication unit and energy supply unit. In this paper, the existing ant colony algorithm is analyzed, and an improved ant colony optimization algorithm is proposed. The paper presents design of routing protocol and node structure in wireless sensor network based on improved ant colony

Yan Song, Xiaomei Yao

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 168–172

Article | 11-January-2021

Imperative to Build Network Security System and Speed Up the Future Network Construction

I. INTRODUCTION The idea of “reorganizing the architecture of the web” is not a new idea. It has been around for 15 years. Since 2007, the international standardization organization ISO/IEC has been carrying out the Future Network standardization project of the new architecture Network system, and has set 2020 as the phased target for commercial use. This paper based on the research and development experience of ISO/IEC future network international standard, it shows that network system

Aiqun Wu, Zhangxing Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 75–81

Research paper | 27-December-2017

Study on PLC with Switch Management in Intelligent Manufacturing Network

This paper discusses a new solution for switch management in intelligent manufacturing network. It makes PLC (Programmable Logic Controller) communication module have the switch management features and exchange I/O data in manufacturing network. The switch manager has used the chip of the Ethernet switch device 88E6165. The Marvell 88E6165 device embedded in communication devices is a single-chip 6 port gigabit Ethernet switch with five integrated gigabit Ethernet transceivers. It performs the

Guangfu Wang

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 856–878

Research Article | 10-April-2013


A fault diagnosis method based on adaptive dynamic clone selection neural network (ADCSNN) is proposed in this paper. In this method the weights of neural network is encoded as the antibody, and the network error is considered as the antigen. The algorithm is then applied to fault detection of motor equipment. The experiments results show that the fault diagnosis method based on ADCS neural network has the capability in escaping local minimum and improving the algorithm speed, this gives better

Wu Hongbing, Lou Peihuang, Tang Dunbing

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 482–504

Research Article | 12-December-2017

Cyclic Temporal Network Density and its impact on Information Diffusion for Delay Tolerant Networks

We adopt temporal graph model to explore the dynamic temporal properties of three mobility datasets in DTN (Delay Tolerant Network), collected from different sources, including one university campus WLAN and two conferences WLANs. With this model, we observe that the temporal network density of DTN changes with time and approximate varies periodically. Then we study the impact of this phenomenon on information diffusion. Our studies and findings can be used for establishing more realistic

Lintao Yang, Sai Wang, Hao Jiang

International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 1, 35–52

Research Article | 21-April-2017


The article deals with the possibilities of optimizing the postal transportation network with respect to planned road infrastructure. The research adopted in this article uses allocation models within graph theory to obtain results for addressed optimization problem. The article presents and compares two types of these models – p-median and uncapacitated fixed charge facility location model. The latter is subsequently applied on the postal network to determine the optimal location of postal


Transport Problems, Volume 10 , ISSUE 4, 35–43

Article | 01-June-2015


A novel intelligent neural network control scheme which integrates the merits of fuzzy inference, neural network adaptivity and simple PID method is presented in this paper. This control method overcomes the defects existed in the traditional variable frequency induction motor driven hydraulic source, such as slow response, poor control precision, easy to overshoot. Permanent magnet synchronous motor driven constant pump hydraulic system is designed instead of common motor, energy saving, fast

Ma Yu

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1406–1423

Article | 01-December-2016


Hyperspectral data has rich spectrum information, strong correlation between bands and high data redundancy. Feature band extraction of hyperspectral data is a prerequisite and an important basis for the subsequent study of classification and target recognition. Deep belief network is a kind of deep learning model, the paper proposed a deep belief network to realize the characteristics band extraction of hyperspectral data, and use the advantages of unsupervised and supervised learning of deep

Jiang Xinhua, Xue Heru, Zhang Lina, Zhou Yanqing

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 1991–2009

research-article | 30-November-2020

Research on Capsule Network Based on Attention Mechanism

I. INTRODUCTION The concept of capsule network started in 2011 and was proposed by Professor Hinton [1], and then in 2017, the first generation of capsule network (CapsNet) was realized. The capsule network includes three layers. The first two layers of the network use the traditional convolutional layer, and the capsule layer is added after the convolutional layer. And pioneered the use of dynamic routing algorithms in the network as the connection between the primary caps and digit caps to

Yan Jiao, Li Zhao, Hexin Xu

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 1–8

Research Article | 01-September-2014


A methodology based on multi-weights neural network (MWNN) is presented to identify faults of rolling bearing. With considerations of difficulties in analyzing rolling bearing vibration data, we analyzed how to extract time domain feature parameters of faults. Further, the time domain feature parameters extracted from fault signals are utilized to train multi-weights neural network for achieving an optimal coverage of fault feature space. Thus, faults of rolling bearing can

Yujian Qiang, Ling Chen, Liang Hua, Juping Gu, Lijun Ding, Yuqing Liu

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1004–1023

Article | 31-July-2018


In the automation systems of sorting process the use of computer networks of Ethernet technology is possible. But its traditional drawback is a probabilistic nature of the network access, which does not guarantee the information transmission in specified time intervals. However, there are other technologies that are free from this defect, for example, the Token Ring technology. A methodology, for determination of the network parameters in the automation system on marshalling yard at the

Igor Zhukovyts'kyy, Victoria Pakhomova

Transport Problems, Volume 13 , ISSUE 2, 149–158

Article | 01-December-2014


Underwater wireless sensor network nodes deployment optimization problem is studied and underwater wireless sensor nodes deployment determines its capability and lifetime. Underwater wireless sensor network if no wireless sensor node is available in the area due to used up energy or any other reasons, the area which is not detected by any wireless sensor node forms coverage holes. The coverage holes recovery algorithm aiming at the coverage holes in wireless sensor network is designed in this

Hengchang Jing

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1890–1907

Research Article | 27-December-2017


paper presents an immune network based unsupervised classification method, which is not necessary to define complex objective function. By arbitrarily selecting a certain number of data to be training samples, the proposed algorithm mines the prior knowledge of the samples and selects a few samples to constitute the initial nodes of immune network. After the evolutionary of the immune network, the clustering results are obtained, combined with nearest neighbor classification mechanism, the

Yanmin LUO, Peizhong LIU, Minghong LIAO

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 1, 116–134

Research Article | 01-September-2017


A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes

R. Elankavi, R. Kalaiprasath, R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 174–185

Article | 01-December-2014


In this paper, we share our recent work related to Radio Frequency Identification (RFID) sensor network with readers. The work mainly focus on the protocol for network system to perform the task of autonomous decentralized data distribution with consideration of economic and low-power RFID-sensor module scheme. We analyzed data pitfall in distributed RFID-sensor network, revealing the reason lies in the phenomenon. A distributed solution to tackle the problem has been designed in a simple way

Charles Z. Liew, Raymond P. Shaw, Ting-Ting Zhang

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1535–1554

Article | 11-March-2018

The Invisible Contours of Online Dating Communities: A Social Network Perspective

This study analyzed the e-mail exchange network of participants of a national dating website. The investigation examined whether aggregated partner preferences give rise to distinct, “invisible,” clusters in online dating networks that structure dating opportunities and result in homophilous subgroups. The findings identified and visualized the ten largest network clusters of participants who interacted with each other and examined the dater characteristics most responsible for

Diane H. Felmlee, Derek A. Kreager

Journal of Social Structure, Volume 18 , ISSUE 1, –

Research Article | 27-December-2017


The ability to classify distinctive odor pattern for aromatic plants species provides significant impact in food industry especially for herbs. Each herbs species has a unique physicochemical and a distinctive odors. This project emphasizes on the techniques of artificial intelligence (AI) to distinguish distinctive odor pattern for herbs. Neural Network method has been exploited for the classification and optimization of various odor patterns. Based on AI techniques, Neural Network-based

A. Che Soh, K. K.Chow, U. K. Mohammad Yusuf, A. J. Ishak, M. K. Hassan, S. Khamis

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 584–609

Article | 05-June-2013


Traditional data gathering approaches cannot be applied to Mobile Sensor Network (MSN) due to sparse network density and sensor node mobility. In this paper, we propose a utility based data gathering protocol (UDG). The distance utility is used to indicate the closeness between sensor nodes and the sink node, and the activity utility is used to evaluate the ability of sensor nodes acting as relays. UDG combines the distance utility with the activity utility to make routing decisions. It also

Liu Jieyan, Wu Lei, Gong Haigong

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 953–972

Article | 01-September-2016


Wireless sensor network is a kind of brand-new information acquisition platform, which is realized by the introduction of self-organizing and auto-configuration mechanisms. Node localization technology represents a crucial component of wireless sensor network. In this paper, a localization method based on kernel principal component analysis and particle swarm optimization back propagation algorithm is carefully discussed. First of all, taking KPCA as the front-end system to extract the main

Wang Jun, Zhang Fu, Ren Tiansi, Chen Xun, Liu Gang

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1323–1340

Article | 30-November-2019

Research on Blockchain Availability Modeling in P2P Network

Figure 1, blockchain system can achieve fast synchronization of data without central server and consistency of consensus mechanism through P2P network. P2P realizes the sharing of data resources and cooperation of services among terminal devices by means of direct exchange. However the dynamic and changeable of blockchain P2P network, the requirement of the availability of block chain network becomes more and more important. Figure 1. The architecture of p2p networks in the blockchain From the

Zan Wang, Yanfang Fu, Lianjiong Zhong, Fei Dai

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 36–43

Article | 30-November-2018

Design and Research of Future Network (IPV9) API

socket is actually a communication endpoint, an interface between an application and a network protocol. Each socket has a socket number, including the IP address of the host and a 16-bit host port number, such as (host IP address: port number). In short, Socket is equals to (IP address: port number), which is represented by a decimal IP address followed by a port number, separated by a colon or comma. Each transport layer connection is uniquely identified by two terminals (that is, two sockets) at

Xu Yinqiu, Xie Jianping

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 56–63

research-article | 04-November-2019

Exploring Patterns of Social Relationships among Food Bloggers on Twitter Using a Social Network Analysis Approach

spread of content and information design practices among influencers that ultimately influence appetite. The current study begins to address this gap by leveraging social network analysis and theoretical frameworks of social relationships to explore and interpret patterns of connections among food bloggers on Twitter. Social Networking Sites Facilitate Connections Among Bloggers To establish themselves as social media influencers, bloggers must display their identities in an authentic manner online

Allison D. Hepworth, Jess Kropczynski, Justin Walden, Rachel A. Smith

Journal of Social Structure, Volume 20 , ISSUE 4, 1–21

Article | 11-April-2018

Forecasting CSI 300 index using a Hybrid Functional Link Artificial Neural Network and Particle Swarm Optimization with Improved Wavelet Mutation

Financial market dynamics forecasting has long been a focus of economic research. A hybridizing functional link artificial neural network (FLANN) and improved particle warm optimization (PSO) based on wavelet mutation (WM), named as IWM-PSO-FLANN, for forecasting the CSI 300 index is proposed in this paper. In the training model, it expands a wider mutation range while apply wavelet theory to the PSO, in order to exploring the solution space more effectively for better parameter solution. In

Tian Lu, Zhongyan Li

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 173–178

Article | 01-March-2016


Aiming at three-dimensional space localization problem in wireless sensor network, a method of three-dimensional centroid algorithm with spherical perception radius (3DCSPR) is proposed. The algorithm uses Gaussian probability density function to estimate the sensor node radius, and uses tetrahedron method and three-dimensional center to locate unknown node with estimated. Firstly, RSSI value between beacon nodes and destination node is selected by RSSI distribution density function, that

Xiang Hua, Zhang Jinjin, Bin Lei

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 1, 233–255

Article | 14-July-2019


and agent-based simulation was justified for estimating the workload on transport infrastructure around the passenger port and for the existing ferry or cruise route network. The practical results of new simulation model, on the one hand, justify the need for a comprehensive study of the conditions for the formation of ferry and cruise route networks in changing conditions. On the other hand, these new results could improve the quality of decision-making process in forecasting the route network on

Nikolai MAIOROV, Vladimir FETISOV, Srećko KRILE, Darijo MISKOVIC

Transport Problems, Volume 14 , ISSUE 2, 111–121

research-article | 30-November-2018


1. INTRODUCTION A protection zone along water distribution network is one of the proposals to limit the negative effects of potential breakages of buried water pipes, connected with the creation of swallow holes, hollows or depressions [1, 2]. Water flowing out from a leaking pipe can wash out fine soil particles from a solid matrix and move them through soil pores causing suffosion. The phenomena of this kind are dangerous especially in urban areas with developed infrastructure. Empty spaces


Architecture, Civil Engineering, Environment, Volume 12 , ISSUE 1, 123–128

Article | 30-June-2013


Duty cycling is an important method for energy constrained sensor network systems to prolong lifetime. Current research on duty cycling is mainly based on such assumption that all the sensory coverage should be maintained while some nodes are sleeping. However, for the applications of target monitoring, it is not necessary anymore to keep the whole sensory coverage of the sensor network. It only needs to make sure that such kinds of nodes are active which can perceive the activities of the

Ying Guo, Feng Hong, Zhongwen Guo

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 1054–1076

Article | 01-June-2016


In order to effectively differentiate all kinds of defects inside the composites, this paper carries out testing on the internal defects of three-dimensional (3d) braided composites by use of acoustic emission nondestructive detecting technology. It puts forward the processing method for acoustic emission signals for the internal defects of three-dimensional braided composites based on wavelet neural network (WNN). This method does wavelet transformation on real-time collected acoustic emission

Su Hua, Zhang Tianyuan, Zhang Ning

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 780–798

Article | 01-September-2016


This paper proposes a novel localization algorithm for wireless sensor network (WSN). Accurate localization is very important for WSN. WSN localization problem is sometimes regarded as an optimization problem. Plant growth simulation algorithm (PGSA) is a kind of new intelligent optimization algorithm, which is intelligent simulation of plant growth in natural way. In addition to the common characteristics of intelligent algorithms, PGSA show robustness and provides a global optimal solution

Yuqiang Qin, Hui Ying

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1287–1304

Article | 08-December-2019


Roll-on Roll-of (Ro-Ro) transport is one of the primary options EU policy is focusing on for developing intermodal transport and MOS initiatives, aimed at reducing road transport (especially trucks). In line with EU guidelines, this study proposes an integrated and optimized network scheme for the maritime Ro-Ro freight services currently operating in the Italian Tyrrhenian area to improve the overall supply of shipping services. The methodological approach used is based on the integration of

Gianfranco FANCELLO, Patrizia SERRA, Simona MANCINI

Transport Problems, Volume 14 , ISSUE 4, 63–76

research-article | 06-November-2020

Competitive fitness analysis using Convolutional Neural Network

through a filter that lets the larvae, but not the adults, though. To further improve Caenorhabditis fitness analysis, here we present (i) a fitness assay protocol involving separation of parental and offspring generations and (ii) an open-source model for image analysis based on a convolutional neural network (CNN). Machine learning models are very convenient for image analysis because they can be trained on a sample of pictures to analyze images of interest with a high output rate. The concept of

Joanna K. Palka, Krzysztof Fiok, Weronika Antoł, Zofia M. Prokop

Journal of Nematology, Volume 52 , 1–15

Research Article | 20-February-2013

Traffic Signal Control for Urban Trunk Road Based on Wireless Sensor Network and Intelligent Algorithm

Based on the analysis for the present research on controlling urban trunk road, a intelligent control method for urban trunk road based on wireless sensor and fuzzy neural network was proposed. In this method, we took two layers of WSN structure. The first one was data collecting layer, which consisted of traffic information collecting nodes and sink nodes. Data collecting layer was responsible for collecting vehicle information at single crossing, transmitted to the second layer after data

Peng Xiaohong, Mo Zhi, Liao Riyao

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 1, 352–367

Research Article | 13-December-2017


tracking system using multiple mobile sensors. For the purposes of surveillance and security, trackers use an Extended Kohonen neural network to track the moving targets in their environments. The proposed tracking algorithm can be used for single and multiple target tracking. A clustering algorithm is used in order to minimize the number of active trackers over time and hence save energy. An auction based algorithm is used for the purpose of optimizing the cooperation between trackers. Quantitative

Ahmed M. Elmogy, Fakhreddine O. Karray

International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 3, 716–734

Article | 08-December-2019


Today, one of the main important tasks is to analyze the states of achievement related to the required levels for marine passenger terminals and their route networks, depending on the influence of the external environment (based on the discretization of processes). This proposal is relevant both to increase the passenger traffic and to change the route network of ferry lines. There is an uneven congestion of individual directions of ferry lines and passenger terminals, which determines the need

Nikolai MAIOROV, Vladimir FETISOV, Srećko KRILE, Darijo MISKOVIC

Transport Problems, Volume 14 , ISSUE 4, 21–30

Article | 05-September-2013


According to EGTS proposal, an adaptive channel hopping algorithm that can be used in wireless mesh sensor networks was is designed in this paper. The nodes select proper channels independently and use them to communicate with their neighbors. Once a pair of nodes find their current channel has been deteriorated, they abandoned the current channel and enable the reserved channel, so that the reliability of the network is improved. The algorithm is compatible with the primitives and the frame

Zhao Jindong, Fan Baode, Lu Yunhong, Mu Chunxiao

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, –

Research paper | 31-October-2017


compared with ANN (Artificial Neural Network) methodology. The results showed that ANN performed better than the ARIMA models in forecasting the prices.

Abhishek Singh, G. C. Mishra

Statistics in Transition New Series, Volume 16 , ISSUE 1, 83–96

Article | 07-May-2018

The Remote Control System Based on the Virtual Reality

Aiming at the issues of random delay and delay uncertainty of the control information network, a kind of network remote closed-loop control structure based on virtual reality simulation is proposed. The method in accordance with the idea of open-loop system to achieve closed-loop control make the influence of network latency excluded real-time little closed-loop control system of controlled object value and no effect on the characteristics of the controlled object. Simulation results show that

Su Xiaohui, Dong Qiyu, Huang Mengyao, Xu Shuping

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 22–27

Article | 05-June-2013


sensor network. Furthermore, collected data are proved to be consistent with natural phenomenon. Compared with traditional monitoring method, the new method has better advantages.

He Yueshun, Zhang Wei

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 867–887

research-article | 27-March-2019

Do Men Discuss Birth Control? A Social Network Analysis in Bangladesh

population control in broader social structures is also gaining momentum, as recent studies on diffusion have shown that fertility choices often are made within a social network (Behrman et al., 2002; Kincaid, 2000; Montgomery and Casterline, 1993; Rutenberg and Watkins, 1997; Perkins et al., 2015). Even so, few studies have focused on the role of men enmeshed within social and institutional structures. This is especially wanting in the fertility studies in the South Asian context, which is characterised

Bhanu Bhatia

Journal of Social Structure, Volume 20 , ISSUE 2, 1–19

Article | 30-November-2018

Research of Oil Pump Control Based On Fuzzy Neural Network PID Algorithm

control the oil pump accurately and stably, and is easy to cause system shock. With the development of intelligent control technology, such as fuzzy control, neural network control, and sensor technology, more and more control methods and control technology become more and more mature. This paper synthesizes the advantages of simple PID control, fuzzy control does not depend on model, and neural network control is adaptive. Fuzzy neural network PID control is used to control oil pump accurately, after

Chen Gong, Shengquan Yang

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 63–68

Article | 02-November-2017


A smart space, such as smart sensor rooms, an office, or simply an area, requires a smart telephony network for an effective voice communication between users. Nowadays, modern Private Branch Exchange (PBX) system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically

Heng-Chih Huang, Yueh-Min Huang, Kuan-Chieh Chiu

International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 1, 15–29

Article | 01-September-2015


To identify the important attributes of complex system, which is high-dimensional and contain both discrete and continuous variables, this paper proposes a sensitivity analysis method of hierarchical hybrid fuzzy - neural network. We derive the sensitivity indexes of discrete and continuous variables through the differential method. To verify the effectiveness of our method, this study employed a man-made example and a remote sensing image classification example to test the performance of our

Xing Haihua, Yu Xianchuan, Hu Dan, Dai Sha

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1837–1854

Article | 24-November-2017


postal logistics network. Published results is oriented to revaluate existing position of local centre and find a location for the new local distribution centre potentially. New location of local distribution centre can to optimize (minimize) the total transport costs of the local postal transportation network in area of the Lublin Province.


Transport Problems, Volume 12 , ISSUE 3, 43–50

Article | 13-July-2020

Image Inpainting Research Based on Deep Learning

features of images than traditional inpainting algorithms based on structure and texture, so often used for image inpainting. At present, image inpainting based on generative adversarial networks is a major research hotspot in the field of deep learning image inpainting, which lays a solid foundation for the development of image inpainting technology. A. The basic idea of generating adversarial networks Generative adversarial network is undoubtedly one of the popular artificial intelligence

Zhao Li, Zhao Ruixia

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 23–30

Article | 30-November-2018

Research and Design of Next Generation Internet (IPV9) Datagram

A datagram is the basic unit of data transmitted on the network. It contains a header and the data itself, in which the header describes the destination of the data and its relationship to other data. Datagram is a complete and independent data entity, which carries the information to be transferred from the source computer to the destination computer and does not rely on the previous exchange between the source and the destination and the transmission network [1]. TCP/IP protocol defines a

Zhongsheng Wang, Jianping Xie, Zhao Lin, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 10–28

Article | 08-April-2018

Research of Virtual Network Classroom Collaborative Mechanism Based on Petri Net

In order to keep multi-role communication action of virtual network classroom orderly and correctly at the same time, this paper proposes and studies its communication collaborative relationship based on Petri Net. Firstly, it introduces the basic theory and the system state change graph of the roles in virtual classroom, and discusses in detail the collaborative relationship between students and teacher in network environment. Especially by taking advantage of Petri Net tool, this paper in

Shengquan Yang, Shujuan Huang

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 29–37

research-article | 25-August-2020

1/10th scale autonomous vehicle based on convolutional neural network

self-driving library written in Python for the implementation of the neural network. To analyze the AI aspect of the research, the paper by NVIDIA DAVE-2 (Bojarski et al., 2016) and ALVINN (Pomerleau, 1989) were the first attempts to build an operational CNN-based model. Analyzing different research work done, this research paper uses different heterogeneous and open-source material to build the autonomous vehicle (Blaga et al., 2018; Zhang and Mahale, 2018; Tian et al., 2018). It also reports the

Avishkar Seth, Alice James*, Subhas C. Mukhopadhyay

International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–17

Article | 01-September-2015


, we present a prototype of a multimodal architecture, and show how modality selection and fission algorithms are implemented in such a system. We use a pattern technique to divide a complex command into elementary subtasks and select suitable modalities for each of them. We integrate a context-based method using a Bayesian network to resolve ambiguous or uncertain situations.

Atef Zaguia, Chakib Tadj, Amar Ramdane-Cherif

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1667–1686

Article | 07-May-2018

3D Target Recognition Based on Decision Layer Fusion

Target recognition has always been a hot research topic in computer image and pattern recognition. This paper proposes a target recognition method based on decision layer fusion. ModelNet[1]—The 3D CAD model library, which is used to be identified. Features are extracted from the model’s point cloud data and multi-view images. The image is identified using the AlexNet[2] network, The point cloud is identified by the VoxNet[3] network. The fusion algorithm is used in the decision layer to

Ma Xing, Yu Fan, Yu Haige, Wei Yanxi, Yang Wenhui

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 19–22

Article | 07-May-2018

Research of Email Classification based on Deep Neural Network

algorithm is low. In allusion to the problem of poor accuracy of email classification based on naive bayes algorithm, scholars have proposed some new email classification algorithms. The email classification algorithm based on deep neural network is one kind of them. The deep neural network is an artificial neural network with full connection between layer and layer. The algorithm extracted the email feature from the training email samples and constructed a DNN with multiple hidden layers, the DNN

Wang Yawen, Yu Fan, Wei Yanxi

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 17–21

Article | 09-April-2018

Prediction of the Heat Load in Central Heating Systems Using GA-BP Algorithm

This paper presented the research on heat load prediction method of central heating system. The combined simulation data at Xi'an in January was used as the samples for training and predicting. This paper selected the daily average outdoor wind speed, the daily average outdoor temperature, date type, sunshine duration as input variables and the heating load value as output variable. After preprocessing of the historical data, the BP neural network algorithm and the GA-BP algorithm were

Bingqing Guo, Jin Xu, Ling Cheng, Lei Chen

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 137–141

Article | 30-November-2018

Street View House Number Identification Based on Deep Learning

designed manually (such as SIFT, SURF, HOG, etc.), and the features of the artificial design are well interpreted. However, in the face of complex backgrounds, changing fonts and various deformations, it is rather troublesome and difficult to extract more general features[7]. The Convolutional Neural Network (CNN) is a multi-layered supervised learning neural network. Although the training process requires a large amount of data compared with the traditional method, the convolutional neural network can

Haoqi Yang, Hongge Yao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 47–52

research-article | 30-November-2018

Employment of PSO algorithm to improve the neural network technique for radial distribution system state estimation

Nomenclatures SE state estimation PS power system PSN power system networks PSO–NN particle swarm optimization–neural network DPN distribution power network RDPSNs radial distribution power system networks DMS distribution management system GTP graph theoretic procedure algorithm DSSE distribution system state estimation model WLS weighted least square WLAV weighted least absolute value PMUs phasor measurement units ANN artificial neural network

Husham Idan Hussein, Ghassan Abdullah Salman, Ahmed Majeed Ghadban

International Journal on Smart Sensing and Intelligent Systems , Volume 12 , ISSUE 1, 1–10

Article | 01-September-2014


point for estimating average condition. Sensor node at each monitoring point is connected via RS 485 network which works with a protocol developed for this purpose. Each sensor node consists of sensors, signal conditioning, controller and RS485 transceiver. All these nodes are calibrated and the voltage level of RS 485 system is converted to RS 232 voltage level to make compatible with the COM port of the PC. Data acquisition software is developed with the help of NI Lab VIEW.

Debashis Saikia, P.K. Boruah, Utpal Sarma

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1254–1270

Article | 02-April-2020

Research on House Price Prediction Based on Multi-Dimensional Data Fusion

;; So far, all values of the attribute have been expressed as One-Hot form. D. Data Fusion This section analyzes the problem of data fusion, that is, how to merge Large_Attributes, Small_Attributes, Interval_Attributes, and Enumerated_Attributes together. This thesis will propose a pixel-based data fusion method: first establish a pixel matrix; then use a fully connected neural network model to process the pixel matrix. 1) Create a pixel matrix This section aims to transform multiple attributes

Yonghui Yang

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 1–8

research-article | 15-October-2020

Commentary: How to do personal network surveys: from name generators to statistical modeling

The first time I showed the visualization of the personal network to a respondent I had the feeling of being in front of a tool with enormous potential. It was a case of a student who had just adopted a metropolitan lifestyle, moving almost daily between the city where she lived and the capital where she was studying at the university. The analysis of the structural properties of her personal network was a good way to describe the distribution of her relationships (and her life) between

Isidro Maya-Jariego

Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 98–102

Article | 05-June-2013


Wireless sensor network (WSN) shows unique advantages in cold alpine area comparing with traditional in-situ monitoring approaches. This paper presents two WSN applications in cold alpine area, one in the Hulugou watershed and the other in the Babaohe watershed, both of which are situated in the upper mountainous reach of the Heihe River Basin of West China. Apart from introductions to the two WSN applications and experimental results, experiences learned and challenges met during designing

Chen Hao, Nan Zhuotong

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 932–952

Article | 10-April-2018

Research on Intelligent Monitoring Technology of Micro Hole Drilling

Aiming at the problem that the micro drills is easy to be broken in the process of drilling; it is difficult to detect the drill bit. The drilling torque signal is taken as the monitoring object. A new method for the on-line monitoring the micro-drill breakage based on BP neural network is proposed. After the three layer wavelet decomposition of the drilling torque signal, the energy feature vector is used as the input layer of the BP network, and the mapping model of the working state and the

Yanhong Sun, Mei Tian

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 142–146

Article | 16-December-2013

Applying Merging Convetional Marker and Backpropagation Neural Network in QR Code Augmented Reality Tracking

Usability of QR Code in Augmented Reality system has been used for digital content accessible publicly. However, QR Code in AR system still has imprecision tracking. In this article we propose merging QR Code within conventional marker and backpropagation neural network (BPNN) algorithm to recognizing QR Code Finder Pattern. The method which our chosen to approaching conventional marker. The result of BPNN testing, QRFP detected in perspective distortion with ID-encoded character length 78, 53

Gia M. Agusta, Khodijah Hulliyah, Arini, Rizal Broer Bahaweres

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 1918–1948

Article | 30-November-2020

Deep Periocular Recognition Method via Multi-Angle Data Augmentation

and statistics, namely deep convolutional neural networks (CNNs), was proposed by Proenca and was also used to build periocular recognition systems. At the same time, Canadian professor Hugo. Proenca [5] also proposed to use neural network to process the human eye areas outside the eye, and to take the features extracted from these areas as a mode of identity recognition and attribute recognition. In order to solve the problem of angular rotation of eyes in practical application, this paper

Bo Liu, Songze Lei, Yonggang Li, Aokui Shan, Baihua Dong

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 11–17

Research paper | 01-June-2011

A Novel Biased Energy Distribution (BED) Technique for Cluster-Based Routing in Wireless Sensor Networks

This paper presents the impact of utilizing a biased energy distribution (BED) scheme for clustering sensor networks. In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols assume that all the nodes are provided with equal amount of energy but this shortens the network lifetime and makes the network unstable. This paper proposes a

A. F. Salami, H. Bello-Salau, F. Anwar, A. M. Aibinu

International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 2, 161–173

Article | 04-June-2018

Creating a Conference Poster with High-Resolution Network Figures

Creating a poster with high-resolution network images can be a challenging task. In this article, the process of exporting a network figure from a network analysis tool, importing it in a vector graphics tool, and preparing the poster for print is discussed. The steps include critical strategies for producing print-quality figures that also apply to the preparation of network figures for journal publication. We discuss different file formats and argue that the favorite tool for creating

Jürgen Pfeffer

Connections, Volume 37 , ISSUE 1-2, 95–100

Article | 30-November-2018

Application Research Based on 5G Wireless Communication Technology

and technical applications. 5G wireless communication technology is the fifth generation mobile communication technology. It was developed on the basis of the 4th generation mobile network of certain innovations and transformations. Compared to the previous 2G, 3G, 4G, 5G technology, they have taken advantage of them. Make up for the shortcomings of previous signal differences and network instability. There is no uniform definition of 5G technology [1]. The general consensus that has emerged is

Junying Bai, Yongli An, Ruihua Sun

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 86–92

Article | 30-November-2018

Anfis Coordination of Changes In Power Oscillation Damper Parameters with Variation In Power System Operating Point

system (FIS) whose membership function parameters are tuned (adjusted) using either a back propagation algorithm alone, or in combination with a least squares type of method. This allows fuzzy systems to learn from the data they are modeling [8]. It has a network-type structure similar to that of a neural network. Thus, it maps inputs through input membership functions and associated parameters and then through output membership functions and associated parameters to outputs, can be used to interpret

Dr I. I. Alabi, Dr A. I. Araga, Mr Sabo Aliyu

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 17–24

Research Article | 15-February-2020

Designing a Wireless Sensors Network for  Monitoring and Predicting Droughts

sensor drought monitoring system is capable of remote real-time monitoring for extended periods. This monitoring can also help identify drought in the early stages and thereby indicate promptly when to take corrective measures. Intelligent sensors in a wireless network monitor the soil condition. These sensors collect various environmental; parameters and then send the pre-processed data wirelessly to a base station. From the base station this data uploads every two seconds to the cloud (internet

A Gaddam, M Al-Hrooby, W F Esmael

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Article | 01-December-2014


, wavelet packet and kernel principal component analysis are used to extract the data features. Then cascaded decision is presented to improve the recognition rate of artificial neural network, by which the film thickness can be estimated accurately. With a set of tests, the results demonstrate that the method is effective. It can be widely used to take measurement of the film thickness in industrial field.

Erqing Zhang, Pan Fu, Kesi LI, Xiaohui Li, Zhongrong Zhou

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1870–1889

Research Article | 18-January-2019

A network approach to understanding obesogenic environments for children in Pennsylvania

Abstract Network methods have been applied to obesity to map connections between obesity-related genes, model biological feedback mechanisms and potential interventions, and to understand the spread of obesity through social networks. However, network methods have not been applied to understanding the obesogenic environment. Here, we created a network of 32 features of communities hypothesized to be related to obesity. Data from an existing study of determinants of obesity among 1,288

Emily A. Knapp, Usama Bilal, Bridget T. Burke, Geoff B. Dougherty, Thomas A. Glass

Connections, Volume 38 , ISSUE 1, 1–11

No Record Found..
Page Actions