-
A Language & an Approach for the Development of IoT Solutions
Issue:
Volume 6, Issue 1, June 2022
Pages:
1-14
Received:
7 June 2021
Accepted:
22 June 2021
Published:
8 January 2022
Abstract: IoT can contribute to the resolution of problems inherent in the control of our environment and to the automation of decisions based on data extracted from that environment. However, the opportunity to contribute to these activities is not offered to everyone. Indeed, according to the majority of decision makers in different fields, IoT solution development is limited to only IoT experts in these fields. According to our opinion this truth is not absolute. In order to demystify IoT and trivialize participation in the IoT solution development effort a language specific to IoT domain has been defined. This language is based on a meta-model of IoT and is made of a textual notation conforming to Backus Naur Form. It allows each participant in a development activity to express and discuss his or her idea of a solution to an IoT problem. An approach build on this language proposes a demarche that starts from the IoT meta-model to arrive at a solution code. Each developer can derive the meta-model to obtain a solution model. Next, she (or he) uses our development environment to concretize this model. Our environment is build using Eclipse/Xtext. It offers technological tools to support our approach. The case study that provides a proof of concept of the approach falls within the domain of smart agriculture.
Abstract: IoT can contribute to the resolution of problems inherent in the control of our environment and to the automation of decisions based on data extracted from that environment. However, the opportunity to contribute to these activities is not offered to everyone. Indeed, according to the majority of decision makers in different fields, IoT solution de...
Show More
-
Performance of Non-Line of Sight Underwater Optical Wireless Communication Links with Spatial Diversity
Al-Amin Barambu Umar,
Mark Stephen Leeson
Issue:
Volume 6, Issue 1, June 2022
Pages:
15-23
Received:
21 March 2021
Accepted:
2 June 2021
Published:
5 February 2022
Abstract: Line-of-sight (LOS) underwater optical wireless communication (UOWC) transmission may suffer blocking and are not always possible due to obstructions from sea creatures, bubbles, large suspended particles and features of the seabed, especially in coastal and turbid water environments. Thus, we present the performance of a spatially diverse non-line-of-sight (NLOS) UOWC system employing continuous phase modulation (CPM), which is shown to offer sensitivity benefits of several dBs over on–off keying (OOK) without coherent reception. We obtain the channel impulse response (CIR) by using Monte Carlo simulation, including absorption and multiple scattering. Turbulence is included by conditioning the CIR on log-normal statistics. To mitigate the resultant fading, we exploit spatial diversity with equal gain combining at the receiver side. Photon counting at the receiver is employed to accommodate shot noise. We compare the saddlepoint and Gaussian approximations for bit error rate (BER) calculations, using the latter for later calculations as it delivers excellent results and is simpler. Our results show that spatial diversity offers performance improvements, for example an 8 dB sensitivity gain at 10-9 BER using 1 Gbps 3×1 multiple-input single-output (MISO) transmission over a 20 m link with 0.16 log-amplitude variance. We determine using an upper bound that Intersymbol Interference (ISI) has a significant impact at high bit rates, producing error floors for multiple-output arrangements.
Abstract: Line-of-sight (LOS) underwater optical wireless communication (UOWC) transmission may suffer blocking and are not always possible due to obstructions from sea creatures, bubbles, large suspended particles and features of the seabed, especially in coastal and turbid water environments. Thus, we present the performance of a spatially diverse non-line...
Show More
-
An Efficient Intrusion Detection Approach for Wireless Sensor Networks
Fuad Abu Owaimer,
Ayman Tanira,
Mohammed Abu Hatab,
Mohammad Mikki
Issue:
Volume 6, Issue 1, June 2022
Pages:
24-29
Received:
26 March 2022
Accepted:
16 April 2022
Published:
10 May 2022
Abstract: Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.
Abstract: Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detec...
Show More
-
Case Characterization and Discipline Measurement Method Based on Discipline Inspection and Supervision Knowledge Graph
Yue Wang,
Yuefeng Liu,
Hanyu Zhang,
HaoFeng Liu,
Xiang Bao,
Bo Liu,
Jianmin Dong
Issue:
Volume 6, Issue 1, June 2022
Pages:
30-39
Received:
28 April 2022
Accepted:
18 May 2022
Published:
26 May 2022
Abstract: As an important link to realize intelligent discipline inspection and supervision, the term “case characterization and discipline measurement” refers to the automatic extraction of material facts from case description and the conclusion of conformity and nonconformity after comparison in accordance with legal norms. In response to the problem that there was no special method for the task of case characterization and discipline measurement, the paper combined the practical case handling process of the staff and proposed a method of case characterization and discipline measurement based on discipline inspection and supervision knowledge graph. The method uses the knowledge graph as auxiliary information and aligns the entities of regulations and cases using knowledge fusion technology to construct the discipline inspection and supervision knowledge graph. For the newborn case descriptions, named entity recognition technology is used to extract the key elements that determine the verdict outcome. Similar cases were identified with the same discipline breach nature. Then, text classification technology is used to predict the severity of case circumstances. Combined with the disciplinary violation facts, the disciplinary result is given according to the party discipline rules. Experiments were carried out with a dataset of typical cases notified by the discipline inspection and supervision. According to the experimental results, the proposed method shows its validity, which improves the interpretability of case characterization and discipline measurement and fills the field gap.
Abstract: As an important link to realize intelligent discipline inspection and supervision, the term “case characterization and discipline measurement” refers to the automatic extraction of material facts from case description and the conclusion of conformity and nonconformity after comparison in accordance with legal norms. In response to the problem that ...
Show More
-
Phase Unwrapped Method of Modified Fringe Order
Issue:
Volume 6, Issue 1, June 2022
Pages:
40-46
Received:
8 May 2022
Accepted:
13 June 2022
Published:
16 June 2022
Abstract: Phase measurement profilometry is an optical three-dimensional measurement method, in which phase is the key factor to accurately obtain the three-dimensional coordinates of the measured object, but there will be phase jump error in phase unwrapped process. In order to eliminate the phase jump error existing in the phase unwrapped process based on the principle of multi-frequency heterodyne, a phase unwrapped method with modified fringe orders is proposed. Modifying the integer part of the fringe orders according to the relationship between the integer part of the fringe orders of adjacent pixels can effectively eliminate the jump of the fringe orders caused by the small error, and avoid the transmission and amplification of the phase jump error in the process of fringe heterodyne. Using the multi-frequency characteristic, the absolute phase of the fringe with the middle period is solved by combining the phase information of the fringe with different periods, so as to improve the accuracy of the phase details of the solution. Both simulation and experimental results show that the proposed method has obvious correction effect on the phase jump error, and the unwrapped phase is smoother. Compared with existing methods, the phase error of the proposed method is reduced by an average of 23%.
Abstract: Phase measurement profilometry is an optical three-dimensional measurement method, in which phase is the key factor to accurately obtain the three-dimensional coordinates of the measured object, but there will be phase jump error in phase unwrapped process. In order to eliminate the phase jump error existing in the phase unwrapped process based on ...
Show More
-
Research on YOLOv5s Highway Pedestrian Detection Algorithm Integrating Attention Mechanism
Issue:
Volume 6, Issue 1, June 2022
Pages:
47-53
Received:
8 May 2022
Accepted:
13 June 2022
Published:
16 June 2022
Abstract: Pedestrian detection is widely used in daily life, but it is difficult to study in highway environment, such as occlusion overlap. In order to reduce error detection rate of highway pedestrian detection, an algorithm based on YOLOv5s was proposed. Since vehicle occlusion leads to the reduction of effective features of targets, CBAM attention and SE-NET mechanism module is introduced in the network of YOLOv5s to maximize the extraction of effective features. In order to prevent the spatial characteristic information in the trunk network from being damaged, CBAM module is added at the beginning and end of the structure, and SE-Net attention module is added in the neck network, that is, after the detection layer C3 module, the weight information obtained is connected with the subsequent Conv module, so that the model pays more attention to the pedestrian area. Due to low detection accuracy caused by pedestrian overlap. YOLOv5s was designed by combining DIOU_NMS candidate box screening mechanism. The results show that the mean average precision of YOLOv5s (IOU=0.5) increases by 0.48, and the value of Recall of the improved algorithm increases by 0.51 respectively. The improved pedestrian detection algorithm improves the accuracy of target box regression. Thus, the confidence of pedestrian detection is improved. Based on the improvement strategies mentioned above, the detection speed is 32fps, which meets the requirements of real-time detection.
Abstract: Pedestrian detection is widely used in daily life, but it is difficult to study in highway environment, such as occlusion overlap. In order to reduce error detection rate of highway pedestrian detection, an algorithm based on YOLOv5s was proposed. Since vehicle occlusion leads to the reduction of effective features of targets, CBAM attention and SE...
Show More