期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Simulation of distributed optical fiber disturbance detection system based on Sagnac/Mach-Zehnder interferometer and cross-correlation location 被引量:2
1
作者 方捻 李杰 +2 位作者 王陆唐 黄肇明 杨烨 《Journal of Shanghai University(English Edition)》 CAS 2011年第2期115-118,共4页
A distributed optical fiber disturbance detection system consisted of a Sagnac interferometer and a Mach-Zehnder interferometer is demonstrated. Two interferometers outputs are connected to an electric band-pass filte... A distributed optical fiber disturbance detection system consisted of a Sagnac interferometer and a Mach-Zehnder interferometer is demonstrated. Two interferometers outputs are connected to an electric band-pass filter via a detector respectively. The central frequencies of the two filters are selected adaptively according to the disturbance frequency. The disturbance frequency is obtained by either frequency spectrum of the two interferometers outputs. An alarm is given out only when the Sagnac interferometer output is changed. A disturbance position is determined by calculating a time difference with a cross-correlation method between the filter output connected to the Sagnac interferometer and derivative of the filter output connected to the Mach-Zehnder interferometer. The frequency spectrum, derivative and cross-correlation are obtained by a signal processing system. Theory analysis and simulation results are presented. They show that the system structure and location method are effective, accurate, and immune to environmental variations. 展开更多
关键词 Sagnac interferometer Mach-Zehnder interferometer distributed optical fiber disturbance detection system cross-correlation LOCATION
下载PDF
Distributed Fault Detection for Consensus in Second-Order Discrete-Time Multiagent Systems with Adversary 被引量:1
2
作者 权悦 彭力 +1 位作者 吴志海 刘全胜 《Journal of Donghua University(English Edition)》 EI CAS 2014年第4期418-422,共5页
This paper is concerned with distributed fault detection of second-order discrete-time multi-agent systems with adversary,where the adversary is regarded as a slowly time-varying signal.Firstly,a novel intrusion detec... This paper is concerned with distributed fault detection of second-order discrete-time multi-agent systems with adversary,where the adversary is regarded as a slowly time-varying signal.Firstly,a novel intrusion detection scheme based on the theory of unknown input observability( UIO) is proposed. By constructing a bank of UIO,the states of the malicious agents can be directly estimated. Secondly,the faulty-node-removal algorithm is provided.Simulations are also provided to demonstrate the effectiveness of the theoretical results. 展开更多
关键词 second-order discrete-time multi-agent systems distributed detection and identification slowly time-varying signals unknown input observers
下载PDF
Performance Analysis of Distributed Neyman-Pearson Detection Systems
3
作者 赵娟 陶然 +1 位作者 王越 周思永 《Journal of Beijing Institute of Technology》 EI CAS 2007年第3期305-309,共5页
The performance of a distributed Neyman-Pearson detection system is considered with the decision rules of the sensors given and the decisions from different sensors being mutually independent conditioned on both hypot... The performance of a distributed Neyman-Pearson detection system is considered with the decision rules of the sensors given and the decisions from different sensors being mutually independent conditioned on both hypothese. To achieve the better performance at the fusion center for a general detection system of n 〉 3 sensor configuration, the necessary and sufficient conditions are derived by comparing the probability of detec- tion at the fusion center with that of each of the sensors, with the constraint that the probability of false alarm at the fusion center is equal to that of the sensor. The conditions are related with the performances of the sensors and using the results we can predict the performance at the fusion center of a distributed detection system and can choose appropriate sensors to construct efficient distributed detection systems. 展开更多
关键词 decision fusion rule distributed detection Neyman-Pearson criterion probability of detection necessary and sufficient condition
下载PDF
Performance Study of Distributed Multi-Agent Intrusion Detection System
4
作者 YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan 《Computer Aided Drafting,Design and Manufacturing》 2005年第2期38-43,共6页
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average. 展开更多
关键词 distributed intrusion detection system multi-agent intrusion detectionmethod information security
下载PDF
A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data 被引量:4
5
作者 Xiaonian Wu Chuyun Zhang +2 位作者 Runlian Zhang Yujue Wang Jinhua Cui 《Computers, Materials & Continua》 SCIE EI 2018年第7期61-72,共12页
There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detec... There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation.A data allocation strategy based on capacity and workload is introduced to achieve local load balance,and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster.Moreover,data integrity is protected by using session reassemble and session partitioning.The simulation results show that the new model enjoys favorable advantages such as good load balance,higher detection rate and detection efficiency. 展开更多
关键词 distributed intrusion detection data allocation load balancing data integrity big data
下载PDF
On Asynchrony in Multisensor Distributed Detection
6
作者 Sa Huimin & Chen Zhe(Department of Automatic Control, Beijing University of Aeronautics & Astronautics,100083, P. R.China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期53-59,共7页
In this paper, the asynchrony problem of distributed detection is analyzed and discussed.Two approaches are proposed and related results are given. It is shown that all fusion rules can beunified in the framework with... In this paper, the asynchrony problem of distributed detection is analyzed and discussed.Two approaches are proposed and related results are given. It is shown that all fusion rules can beunified in the framework with asynchrony which could be much ciooer to industrial practice. 展开更多
关键词 distributed detection Sensor fusion Asynchrony Data compression
下载PDF
Real-Time Traffic State and Boundary Flux Estimation with Distributed Speed Detecting Networks
7
作者 Yichi Zhang Heng Deng 《Journal of Transportation Technologies》 2022年第4期533-543,共11页
The rapid development of 5G mobile communication and portable traffic detection technologies enhances highway transportation systems in detail and at a vehicle level. Besides the advantage of no disturbance to the reg... The rapid development of 5G mobile communication and portable traffic detection technologies enhances highway transportation systems in detail and at a vehicle level. Besides the advantage of no disturbance to the regular traffic operation, these ubiquitous sensing technologies have the potential for unprecedented data collection at any temporal and spatial position. While as a typical distributed parameter system, the freeway traffic dynamics are determined by the current system states and the boundary traffic demand-supply. Using the three-step extended Kalman filtering, this paper simultaneously estimates the real-time traffic state and the boundary flux of freeway traffic with the distributed speed detector networks organized at any location of interest. In order to assess the effectiveness of the proposed approach, a freeway segment from Interstate 80 East (I-80E) in Alameda, Emeryville, and Northern California is selected. Experimental results show that the proposed method has the potential of using only speed detecting data to monitor the state of urban freeway transportation systems without access to the traditional measurement data, such as the boundary flows. 展开更多
关键词 Traffic State Boundary Flux Estimation Extended Kalman Filtering distributed Speed Detecting Networks
下载PDF
Type-2 Neutrosophic Set and Their Applications in Medical Databases Deadlock Resolution
8
作者 Marwan H.Hassan Saad M.Darwish Saleh M.Elkaffas 《Computers, Materials & Continua》 SCIE EI 2023年第2期4417-4434,共18页
Electronic patient data gives many advantages,but also new difficulties.Deadlocks may delay procedures like acquiring patient information.Distributed deadlock resolution solutions introduce uncertainty due to inaccura... Electronic patient data gives many advantages,but also new difficulties.Deadlocks may delay procedures like acquiring patient information.Distributed deadlock resolution solutions introduce uncertainty due to inaccurate transaction properties.Soft computing-based solutions have been developed to solve this challenge.In a single framework,ambiguous,vague,incomplete,and inconsistent transaction attribute information has received minimal attention.The work presented in this paper employed type-2 neutrosophic logic,an extension of type-1 neutrosophic logic,to handle uncertainty in real-time deadlock-resolving systems.The proposed method is structured to reflect multiple types of knowledge and relations among transactions’features that include validation factor degree,slackness degree,degree of deadline-missed transaction based on the degree of membership of truthiness,degree ofmembership of indeterminacy,and degree ofmembership of falsity.Here,the footprint of uncertainty(FOU)for truth,indeterminacy,and falsity represents the level of uncertainty that exists in the value of a grade of membership.We employed a distributed real-time transaction processing simulator(DRTTPS)to conduct the simulations and conducted experiments using the benchmark Pima Indians diabetes dataset(PIDD).As the results showed,there is an increase in detection rate and a large drop in rollback rate when this new strategy is used.The performance of Type-2 neutrosophicbased resolution is better than the Type-1 neutrosophic-based approach on the execution ratio scale.The improvement rate has reached 10%to 20%,depending on the number of arrived transactions. 展开更多
关键词 Deadlock recovery type-2 neutrosophic set healthcare databases distributed deadlock detection
下载PDF
An Isolation Principle Based Distributed Anomaly Detection Method in Wireless Sensor Networks 被引量:3
9
作者 Zhi-Guo Ding Da-Jun Du Min-Rui Fei 《International Journal of Automation and computing》 EI CSCD 2015年第4期402-412,共11页
Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collect... Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collected from WSNs effectively.This is achieved by proposing a distributed anomaly detection algorithm based on ensemble isolation principle.The new method offers distinctive advantages over the existing methods.Firstly,it does not require any distance or density measurement,which reduces computational burdens significantly.Secondly,considering the spatial correlation characteristic of node deployment in WSNs,local sub-detector is built in each sensor node,which is broadcasted simultaneously to neighbor sensor nodes.A global detector model is then constructed by using the local detector model and the neighbor detector model,which possesses a distributed nature and decreases communication burden.The experiment results on the labeled dataset confirm the effectiveness of the proposed method. 展开更多
关键词 distributed anomaly detection isolation principle light-weight method ensemble learning wireless sensor networks(WSNs)
原文传递
Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks
10
作者 Khairol Amali bin Ahmad Mohammad Nazmul Hasan +1 位作者 Md.Sharif Hossen Khaleel Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第3期3075-3087,共13页
Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where t... Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT. 展开更多
关键词 Pocket switched networks routings distributed cluster detections delay tolerant networks mobility in network
下载PDF
Detecting the Resistivity Distribution of Carbon Fiber Reinforced Concrete by Electrical Resistance Tomography Method
11
作者 徐东亮 李卓球 +1 位作者 宋显辉 吕泳 《Journal of Southwest Jiaotong University(English Edition)》 2006年第4期323-330,共8页
According to the principle of electrical resistance tomography ( ERT), the resistivity distribution of the carbon fiber reinforced concrete (CFRC) in the sensing field can be measured by injecting exciting current... According to the principle of electrical resistance tomography ( ERT), the resistivity distribution of the carbon fiber reinforced concrete (CFRC) in the sensing field can be measured by injecting exciting current and measuring the voltage on the sensor electrode arrays installed on the surface of the object. Therefore, measurement of the resistivity distribution of CFRC is divided into first measuring the boundary conditions and then inversely computing the resistivity distribution. To reach this goal, an ERT system was constructed, which is composed of a sensor array unit, a data acquisition unit and an image reconstruction unit. Simulations of static ERT was performed on set-ups with many objects spread in a homogeneous background, and a simulation of dynamic ERT was also done on a rectangular board, the resistivity of which was changed within a small domain of it. Then, the resistivity distribution of a CFRC sample with a circlar hole as the target was detected by the ERT system. Simulation and experimental results show that the reconstructed ERT image reflects the resistivity distribution or the resistivity change of CFRC structure well. Especially, a small change in resistivity can be identified from the reconstructed images in the simulation of dynamic ERT images. 展开更多
关键词 Electrical resistance tomography Carbon fiber reinforced concrete Resistivity distribution detection
下载PDF
Rapid and non-destructive detection method for water status and water distribution of rice seeds with different vigor 被引量:2
12
作者 Ping Song Ghiseok Kim +3 位作者 Peng Song Tao Yang Xia Yue Ying Gu 《International Journal of Agricultural and Biological Engineering》 SCIE EI CAS 2021年第2期231-238,共8页
In this study,newly harvested and aged rice seeds were analyzed to determine their aging process,identify the difference between artificially and naturally aged seeds,and develop a rapid,accurate,and non-destructive d... In this study,newly harvested and aged rice seeds were analyzed to determine their aging process,identify the difference between artificially and naturally aged seeds,and develop a rapid,accurate,and non-destructive detection method for water status and water distribution of rice seed with different vigor.To this end,an artificially accelerated aging test was conducted on the newly harvested rice seeds.Then,low-field nuclear magnetic resonance(LF-NMR)technology was applied to test the new(Shennong No.9816,2018),old(Shennong No.9816,2017),and artificially aged seeds(Shennong No.9816,2018).A standard germination test was conducted for three types of seeds.Finally,the differences of water status and distribution between rice seeds of different vigor were analyzed based on the standard germination test results and wave spectrometry information collected using LF-NMR.The results indicated that new seeds,old seeds,and the artificially accelerated aging rice seeds all exhibited two water phases,and the vigor of rice seeds after the artificial accelerated aging test was lower than that of new seeds.There were significant differences between the frequencies of bound water at the time of the peak and the time at the end of the peak for the three types of seeds.The two times showed an increasing trend for rice seeds with poor vigor,indicating that the ability of the water in the rice seeds having poor vigor to combine with other substances was weakened.There were significant differences between the distributions of free water peak end time for the three types of seeds.All the rice seeds with poor vigor exhibited a decreasing trend at this time,indicating that the freedom of free water inside the rice seed samples with poor vigor was weakened.The total water content of the artificially aged seeds and the aged seeds was higher than that of the new seeds,but the free water content increased from artificially aged seeds to new seeds to aged seeds.This indicates that LF-NMR technology is an effective detection method that can simply compare the differences in seed vitality with respect to water distribution as well as differentiate the seed internal water content of artificially aged and naturally aged seeds. 展开更多
关键词 low-field nuclear magnetic resonance rice seed water status detection water distribution detection seed vigor
原文传递
A Basic Model Analyzing GDSS Decision-Making Networks 被引量:1
13
作者 ZHENG Hut-song(Department of Management Engineering. Naming University of Posts and Telecommunications, Naming, 210003, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1999年第2期40-44,共5页
An analysis model, Decision-Making Network Graph, is introduced to construct GDSS decision-mobingnetworAs in order to study the interaction between the lash environment and organizational design. These componentstruct... An analysis model, Decision-Making Network Graph, is introduced to construct GDSS decision-mobingnetworAs in order to study the interaction between the lash environment and organizational design. These componentstructures are tandem one and tree-type one with two layers and multi-branches. Through the decision-makingnetwork graph,aformal solution of the joint effect of expertise of decision-makers and organizational configurationon the decision accuracy Of GDSS is given and an optimization is described 展开更多
关键词 organzation management GDSS network optimization distributed detection
原文传递
Simple,High-Performance Fusion Rule for Censored Decisions in Wireless Sensor Networks
14
作者 刘向阳 彭应宁 王秀坛 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第1期23-29,共7页
Data selection-based summation fusion (DSSF) was developed to overcome the shortcomings ot previously developed likelihood ratio tests based on channel statistics (LRT-CS) for the problem of fusing censored binary... Data selection-based summation fusion (DSSF) was developed to overcome the shortcomings ot previously developed likelihood ratio tests based on channel statistics (LRT-CS) for the problem of fusing censored binary decisions transmitted over Nakagami fading channels in a wireless sensor network (WSN). The LRT-CS relies on detection probabilities of the local sensors, while the detection probabilities are a priori unknown for uncooperative targets. Also, for Nakagami fading channels, the LRT-CS involves an infinite series, which is cumbersome for real-time application. In contrast, the DSSF only involves data comparisons and additions and does not require the detection probabilities of local sensors. Furthermore, the performance of DSSF is only slightly degraded in comparison with the LRT-CS when the detection probabilities of local sensors are a priori unknown. Therefore, the DSSF should be used in a WSN with limited resources. 展开更多
关键词 distributed signal detection decision fusion Nakagami fading channel wireless sensor network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部