28 research outputs found

    A push-based probabilistic method for source location privacy protection in underwater acoustic sensor networks

    No full text
    As the research topics in ocean emerge, Underwater Acoustic Sensor Networks (UASNs) have become ever more relevant. Consequently, challenges arise with the security and privacy of the UASNs. Compared to the active attacks, the characteristics of passive attacks are more difficult to discriminate. Thus, the focus of this study is on the passive attacks in UASNs, where a Push-based Probabilistic method for Source Location Privacy Protection (PP-SLPP) is proposed. The fake packet technology and the multi-path technology are utilized in the PP-SLPP scheme to counter the passive attacks, so as to protect the source location privacy in UASNs. Moreover, the Ekman drift current model is employed to simulate the underwater environment. And the mean shift algorithm and the k-means algorithm are adopted in the dynamic layer and static layer of the Ekman drift current model, respectively, to increase the stability of the clusters. Finally, an Autonomous Underwater Vehicle (AUV) swarm is implemented to collect data in clusters. Through the comparison with existing data collection schemes in UASNs, the simulation results have demonstrated that the PP-SLPP scheme can achieve a longer safety period, with a minor compromise of energy consumption and delay

    A multiqueue interlacing peak scheduling method based on tasks’ classification in cloud computing

    No full text
    In cloud computing, resources are dynamic, and the demands placed on the resources allocated to a particular task are diverse. These factors could lead to load imbalances, which affect scheduling efficiency and resource utilization. A scheduling method called interlacing peak is proposed. First, the resource load information, such as CPU, I/O, and memory usage, is periodically collected and updated, and the task information regarding CPU, I/O, and memory is collected. Second, resources are sorted into three queues according to the loads of the CPU, I/O, and memory: CPU intensive, I/O intensive, and memory intensive, according to their demands for resources. Finally, once the tasks have been scheduled, they need to interlace the resource load peak. Some types of tasks need to be matched with the resources whose loads correspond to a lighter types of tasks. In other words, CPU-intensive tasks should be matched with resources with low CPU utilization; I/O-intensive tasks should be matched with resources with shorter I/O wait times; and memory-intensive tasks should be matched with resources that have low memory usage. The effectiveness of this method is proved from the theoretical point of view. It has also been proven to be less complex in regard to time and place. Four experiments were designed to verify the performance of this method. Experiments leverage four metrics: 1) average response time; 2) load balancing; 3) deadline violation rates; and 4) resource utilization. The experimental results show that this method can balance loads and improve the effects of resource allocation and utilization effectively. This is especially true when resources are limited. In this way, many tasks will compete for the same resources. However, this method shows advantage over other similar standard algorithms.</p

    A trust update mechanism based on reinforcement learning in underwater acoustic sensor networks

    No full text
    Underwater acoustic sensor networks (UASNs) have been widely applied in marine scenarios, such as offshore exploration, auxiliary navigation and marine military. Due to the limitations in communication, computation, and storage of underwater sensor nodes, traditional security mechanisms are not applicable to UASNs. Recently, various trust models have been investigated as effective tools towards improving the security of UASNs. However, the existing trust models lack flexible trust update rules, particularly when facing the inevitable dynamic fluctuations in the underwater environment and a wide spectrum of potential attack modes. In this study, a novel trust update mechanism for UASNs based on reinforcement learning (TUMRL) is proposed. The scheme is developed in three phases. First, an environment model is designed to quantify the impact of underwater fluctuations in the sensor data, which assists in updating the trust scores. Then, the definition of key degree is given; in the process of trust update, nodes with higher key degree react more sensitively to malicious attacks, thereby better protecting important nodes in the network. Finally, a novel trust update mechanism based on reinforcement learning is presented, to withstand changing attack modes while achieving efficient trust update. The experimental results prove that our proposed scheme has satisfactory performance in improving trust update efficiency and network security

    Intelligent fault diagnosis of rotor-bearing system under varying working conditions with modified transfer convolutional neural network and thermal images

    No full text
    The existing intelligent fault diagnosis methods of rotor-bearing system mainly focus on vibration analysis under steady operation, which has low adaptability to new scenes. In this article, a new framework for rotor-bearing system fault diagnosis under varying working conditions is proposed by using modified convolutional neural network (CNN) with transfer learning. First, infrared thermal images are collected and used to characterize the health condition of rotor-bearing system. Second, modified CNN is developed by introducing stochastic pooling and Leaky rectified linear unit to overcome the training problems in classical CNN. Finally, parameter transfer is used to enable the source modified CNN to adapt to the target domain, which solves the problem of limited available training data in the target domain. The proposed method is applied to analyze thermal images of rotor-bearing system collected under different working conditions. The results show that the proposed method outperforms other cutting edge methods in fault diagnosis of rotor-bearing system

    Optimal Deployment of Solar Insecticidal Lamps over Constrained Locations in Mixed-Crop Farmlands

    No full text
    Solar Insecticidal Lamps (SILs) play a vital role in green prevention and control of pests. By embedding SILs in Wireless Sensor Networks (WSNs), we establish a novel agricultural Internet of Things (IoT), referred to as the SILIoTs. In practice, the deployment of SIL nodes is determined by the geographical characteristics of an actual farmland, the constraints on the locations of SIL nodes, and the radio-wave propagation in complex agricultural environment. In this paper, we mainly focus on the constrained SIL Deployment Problem (cSILDP) in a mixed-crop farmland, where the locations used to deploy SIL nodes are a limited set of candidates located on the ridges. We formulate the cSILDP in this scenario as a Connected Set Cover (CSC) problem, and propose a Hole Aware Node Deployment Method (HANDM) based on the greedy algorithm to solve the constrained optimization problem. The HANDM is a two-phase method. In the first phase, a novel deployment strategy is utilised to guarantee only a single coverage hole in each iteration, based on which a set of suboptimal locations is found for the deployment of SIL nodes. In the second phase, according to the operations of deletion and fusion, the optimal locations are obtained to meet the requirements on complete coverage and connectivity. Experimental results show that our proposed method achieves better performance than the peer algorithms, specifically in terms of deployment cost.</p

    UPMGA tree for all baculovirus.

    No full text
    Cladogram based on amino acid sequences of the partial polh/gran, lef-8 and lef-9 genes in all complete baculovirus genome sequences. We collapsed all the Gammabaculovirus and Alphabaculovirus. The phylogenetic tree was inferred using MEGA 5.1 program.</p

    All species from the genus <i>Betabaculovirus</i> completely sequenced to date<sup>*</sup>.

    No full text
    <p>All species from the genus <i>Betabaculovirus</i> completely sequenced to date<sup><a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0147882#t001fn001" target="_blank">*</a></sup>.</p

    Energy-optimal data collection for unmanned aerial vehicle-aided industrial wireless sensor network-based agricultural monitoring system: a clustering compressed sampling approach

    No full text
    In this article, we propose a hierarchical data collection scheme, toward the realization of unmanned aerial vehicle (UAV)-aided industrial wireless sensor networks. The particular application is that of agricultural monitoring. For that, we propose the use of hybrid compressed sampling through exact and greedy approaches. With the exact approach - to model the energy-optimal formulation - an improved linear programming formulation of the minimum cost flow problem was utilized. The greedy approach is based on a proposed balance factor parameter, consisting of data sparsity, and distance from cluster head to normal nodes. To improve node clustering efficiency, a hierarchical data collection scheme is implemented, by which nodes in different layers are adaptively clustered, and the UAV can be scheduled to perform energy-efficient data collection. Simulation results show that our method can effectively collect the data and plan the path for the UAV at a low energy cost

    Energy-optimal data collection for unmanned aerial vehicle-aided industrial wireless sensor network-based agricultural monitoring system: a clustering compressed sampling approach

    No full text
    In this article, we propose a hierarchical data collection scheme, toward the realization of unmanned aerial vehicle (UAV)-aided industrial wireless sensor networks. The particular application is that of agricultural monitoring. For that, we propose the use of hybrid compressed sampling through exact and greedy approaches. With the exact approach - to model the energy-optimal formulation - an improved linear programming formulation of the minimum cost flow problem was utilized. The greedy approach is based on a proposed balance factor parameter, consisting of data sparsity, and distance from cluster head to normal nodes. To improve node clustering efficiency, a hierarchical data collection scheme is implemented, by which nodes in different layers are adaptively clustered, and the UAV can be scheduled to perform energy-efficient data collection. Simulation results show that our method can effectively collect the data and plan the path for the UAV at a low energy cost

    Boundary tracking of continuous objects based on binary tree structured SVM for industrial wireless sensor networks

    No full text
    Due to the flammability, explosiveness and toxicity of continuous objects (e.g., chemical gas, oil spill, radioactive waste) in the petrochemical and nuclear industries, boundary tracking of continuous objects is a critical issue for industrial wireless sensor networks (IWSNs). In this article, we propose a continuous object boundary tracking algorithm for IWSNs – which fully exploits the collective intelligence and machine learning capability within the sensor nodes. The proposed algorithm first determines an upper bound of the event region covered by the continuous objects. A binary tree-based partition is performed within the event region, obtaining a coarse-grained boundary area mapping. To study the irregularity of continuous objects in detail, the boundary tracking problem is then transformed into a binary classification problem; a hierarchical soft margin support vector machine training strategy is designed to address the binary classification problem in a distributed fashion. Simulation results demonstrate that the proposed algorithm shows a reduction in the number of nodes required for boundary tracking by at least 50%. Without additional fault-tolerant mechanisms, the proposed algorithm is inherently robust to false sensor readings, even for high ratios of faulty nodes (≈ 9%)
    corecore