-
121
Method of improving big data value density based on heterogeneous association
Published 2017-12-01“…The big data resources possessed by telecom operators are usually distributed in many different systems,such as DPI、OIDD、CRM.Moreover,the formulation,interpretation and rules of the big data are not always the same in different systems.Therefore,it is difficult to identify and utilize the same object’s multi-type data in different sys-tems.Big data analysis’ sample size and dimension are limited,with the decreasing of analysis results’ reality and accuracy.The methods,architectures and implementation examples of big data’s heterogeneous association were pre-sented.The data fusion in user-dimension from different systems could optimize the data sample space of applications,such as user portrait.Thus,the value of carrier’s big data density was greatly improved.…”
Get full text
Article -
122
Distributed aggregate algorithm for average query based on WSN
Published 2008-01-01“…The algorithm offered a fundamentally distributed solution to analyze data locally without necessarily collected the information of whole nodes to a single central site, and did not require data fusion and long-distance communication. The algorithm could adaptively adjust query range according to query results as well. …”
Get full text
Article -
123
Construction of large-scale wireless sensor network using ZigBee specification
Published 2008-01-01“…Furthermore, analysis shows that the network management, the data fusion, and the performance can be also improved.…”
Get full text
Article -
124
Key technology and application of intelligent connected patrol vehicles for security scenario
Published 2020-04-01“…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
Get full text
Article -
125
A Method for Multiple Attribute Decision Making Based on the Fusion of Multisource Information
Published 2014-01-01“…Two main advantages of this proposed approach are that (i) it provides a data fusion technique, which can efficiently deal with the multisource decision making information; (ii) it can produce the degree of credibility of the entire decision making. …”
Get full text
Article -
126
Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks
Published 2023-12-01“…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
Get full text
Article -
127
ENHANCING TRAFFIC SAFETY: A COMPREHENSIVE APPROACH THROUGH REAL-TIME DATA AND INTELLIGENT TRANSPORTATION SYSTEMS
Published 2024-03-01“…Thus, this study applies data fusion and data mining techniques to analyze travel time and valuable information about traffic accidents based on the real-time data collected from On-Board Unit installed in vehicles. …”
Get full text
Article -
128
A rank correlation coefficient based particle filter to estimate parameters in non-linear models
Published 2019-04-01“…The estimation process of particle filtering algorithm is a series of weighted calculation processes, which can be regarded as weighted data fusion. This article proposed an improved particle filtering algorithm combining with different rank correlation coefficients to overcome the shortcomings of degeneracy. …”
Get full text
Article -
129
Bidirectional RNN-based private car trajectory reconstruction algorithm
Published 2020-12-01“…To address the problem that in the complex urban environment, due to the inevitable interruption of GNSS positioning signal and the accumulation of errors during vehicle driving, the collected vehicle trajectory data was likely to be inaccurate and incomplete.a bidirectional weighted trajectory reconstruction algorithm was proposed based on RNN neural network.The GNSS-OBD trajectory acquisition device was used to collect vehicle trajectory information, and multi-source data fusion was adopted to achieve bidirectional weighted trajectory reconstruction.Furthermore, the neural arithmetic logic unit (NALU) was leveraged with the purpose of enhancing the extrapolation ability of deep network and ensuring the accuracy of trajectory reconstruction.For the evaluation, real-world experiments were conducted to evaluate the performance of the proposed method in comparison with existing methods.The root mean square error (RMSE) indicator shows the algorithm accuracy and the reconstructed trajectory is visually displayed through Google Earth.Experimental results validate the effectiveness and reliability of the proposed algorithm.…”
Get full text
Article -
130
A load balanced and energy efficient underwater clustering protocol for UWSN
Published 2016-11-01“…Focused on the low energy efficiency and short lifetime of underwater wireless sensor network(UWSN),a load balanced and energy efficient underwater clustering(LBEEUC)protocol for UWSN was proposed.For cluster head settings,due to the consideration of load balanced,the proportion of cluster heads based on experience-load was set.The area with high experience-load could obtain more cluster heads than other areas to process data forwarding.And then,for intra-cluster communication,some relay nodes were set to save energy of long range data transmission between cluster head and nodes.Relay nodes also could be used to eliminate redundant information by advance data fusion.Finally,for inter-cluster routing,Q-learning algorithm was used to implement optimal path planning based on the criterion of least energy consuming.The simulation results demonstrate that the LBEEUC protocol can efficiently improve the energy utilization,prolong the network lifetime and balance the energy consumption of the network.…”
Get full text
Article -
131
Gender Recognition from Unconstrained and Articulated Human Body
Published 2014-01-01“…This paper also pursues data fusion schemes and efficient feature dimensionality reduction based on the partial least squares estimation. …”
Get full text
Article -
132
Handing Tolerance Problem in Fault Diagnosis of Linear-Analogue Circuits with Accurate Statistics Approach
Published 2013-01-01“…The advantage of this proposed method is that it can accurately locate the data fusion among fault states. In addition, the results in analogue benchmark (e.g., linear voltage divider circuit) indicate that it is effective in fault diagnosis in accordance with given fault diagnostic requirements (e.g., fault diagnosis error, fault detection rate).…”
Get full text
Article -
133
Path assessment based network admission control algorithm
Published 2010-01-01“…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
Get full text
Article -
134
Intelligent Control System Design of Ring Light via IOT Mobile Robot
Published 2023-01-01“…In this study, a mobile robot positioning system based on the wireless positioning technology of the IoT is first designed, and an adaptive federated filtering algorithm based on the confidence of the sensor measurement data is given, and the data fusion processing is carried out for the positioning system to achieve the accurate positioning of the mobile robot. …”
Get full text
Article -
135
Reversible digital watermarking-based protocol for data integrity in wireless sensor network
Published 2018-03-01“…For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network,a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand,the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique,and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand,elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation,communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.…”
Get full text
Article -
136
Container Security Device Chain Network for Safe Railway Transportation
Published 2014-11-01“…However, in CCNP, the tag energy consumption for packet forwarding is always the same regardless of the position in a chain owing to an efficient data fusion scheme. In our simulation using QualNet, CCNP reduces the number of disconnections between tags by 59.5% as compared to general chain networks. …”
Get full text
Article -
137
Load forecasting based on knowledge flow and transfer learning
Published 2022-05-01“…In all things connected, comprehensive perception, intelligent decision-making information era of big data, in the information acquisition of big data and a large amount of signal processing, there are still large amount of data redundancy, calculation and the shortcoming of high cost, not in time, and no marked.The transfer learning was applied, and the knowledge flow system based on the weight impact factor for information fusion was integrated to assist the analysis and simplify the calculation for the IoT sensing system.The knowledge flow mode of transfer learning and data fusion was adopted in the IoT sensing system, and the simulation calculation of short-term load prediction was made based on the partial data of regional power consumption.The influencing factors of users’ electricity consumption behavior were analyzed, and the optimal weight distribution of influencing factors was obtained through training, so as to predict the power consumption rate.The results show that in this way, it can clearly identify the characteristics of electricity consumption behavior, and predict the energy consumption according to the characteristics of electricity consumption.…”
Get full text
Article -
138
Heterogeneous Signal Fusion Method in Driving Fatigue Detection Signals
Published 2021-01-01“…Change of steering angle, eyelid closure, and blinking marks and the fatigue driving experiment was designed to evaluate the results of different data fusion methods. Experimental results show that the detection accuracy of the heterogeneous signal fusion method in fatigue detection is as high as 80%.…”
Get full text
Article -
139
Market-Based Approach to Mobile Surveillance Systems
Published 2012-01-01“…The realization of the potential of mobile surveillance requires the solution of different challenging problems such as task allocation, mobile sensor deployment, multisensor management, cooperative object detection and tracking, decentralized data fusion, and interoperability and accessibility of system nodes. …”
Get full text
Article -
140
Nonlinear Extended Kalman Filter for Attitude Estimation of the Fixed-Wing UAV
Published 2022-01-01“…Aiming at the attitude estimation problem, many data fusion or filtering methods had been applied, which fail in many cases, which attains the nonlinear measurement model, process dynamics, and high navigation range. …”
Get full text
Article