Current Issue : April-June Volume : 2022 Issue Number : 2 Articles : 5 Articles
Wireless sensor network (WSN) is a new type of wireless network. It has many advantages, but there are some problems. These problems make it easier for attackers to analyze network security holes and attack and destroy entire networks. This article designs a security wireless sensor network model. It can resist most known network attacks without significantly reducing the energy power of sensor nodes. First, we cluster the network organization to reduce energy consumption. It also protects the network based on the calculation of trust levels and the establishment of trust relationships between trusted nodes and operates the trust management system based on a centralized method, secondly, on the basis of LEACH agreement, draws lessons from the principle of biological immune system, optimizes the wireless sensor network, and further proposes a new immune system structure suitable for wireless sensor networks. The experimental results show that the wireless sensor network model designed in this paper solves the high-efficiency and energy-saving design task, and the trust management system has satisfactory results in defending against attacks....
In recent years, badminton sports have attracted the public and the majority of young students. Badminton training has received extensive attention in the field of sports. However, there is currently no effective and accurate method for effective analysis of badminton training. In order to solve this problem, this paper combines the training teaching theory and the representation training theory and applies the fuzzy algorithm to construct the fuzzy evaluation model based on the analytic hierarchy process. After the experiment, the test scores of the sports quality of the two groups of badminton special students were improved. Through the screening of the seven functional modes of action, it was found that the special students’ left and right symmetry differences were obvious, the lower limbs were not stable, the core area was weak, and the muscle control ability on both sides of the spine needed to be strengthened....
In gardening, particularly in golf courses, soil moisture management is critical for maximizing water efficiency. Remote sensing has been used to estimate soil moisture in recent years with relatively low accuracies. In this paper, we aim to use remote sensing and wireless sensor networks to generate soil moisture indexes for a golf course. In the golf course, we identified three types of soil, and data was gathered for three months. Mathematical models were obtained using data from Sentinel-2, bands with a resolution of 10 and 20 m, and sensed soil moisture. Models with acceptable accuracy were obtained only for one out of three soil types, the natural soil in which natural vegetation is grown. Two multiple regression models are presented with an R2 of 0.46 for bands at 10 m and 0.70 for bands at 20 m. Their mean absolute error was lower than 3% in both cases. For the modified soils, the greens, and the golf course fairway, it was not feasible to obtain regression models due to the temporal uniformity of the grass and the range of variation of soil moisture. The developed moisture indexes were compared with existing options. The attained accuracies improve the current models. The verification indicates that the model generated with band 4 and band 12 is the one with better accuracy....
A genetic algorithm (GA) contains a number of genetic operators that can be tweaked to improve the performance of specific implementations. Parent selection, crossover, and mutation are examples of these operators. One of the most important operations in GA is selection. The performance of GA in addressing the single-objective wireless sensor network stability period extension problem using various parent selection methods is evaluated and compared. In this paper, six GA selection operators are used: roulette wheel, linear rank, exponential rank, stochastic universal sampling, tournament, and truncation. According to the simulation results, the truncation selection operator is the most efficient operator in terms of extending the network stability period and improving reliability. The truncation operator outperforms other selection operators, most notably the well-known roulette wheel operator, by increasing the stability period by 25.8% and data throughput by 26.86%. Furthermore, the truncation selection operator outperforms other selection operators in terms of the network residual energy after each protocol round....
Knowing the behavioral patterns of city residents is of great value in formulating and adjusting urban planning strategies, such as urban road planning, urban commercial development, and urban pedestrian flow control. Based on the high penetration rate of cell phones, it is possible to indirectly understand the behavior of city residents based on the call records of users. However, the behavioral patterns of large-scale users over a long period of time can present characteristics such as large dispersion, difficult to discover patterns, and difficult to explain behavioral patterns. In this paper, we design and implement a human behavior pattern analysis system based on massive mobile communication data based on serial data modeling method and visual analysis technology. For the problem that it is difficult to capture the behavioral patterns of residents in cities in call records, this paper constructs base station trajectories based on users’ cell phone call records and uses users’ long-time base station trajectories to mine users’ potential behavioral patterns. Since users with similar activity characteristics will exhibit similar base station trajectories, this paper focuses on the similarity between text sequences and base station trajectory sequences and combines the word embedding method in natural language processing to build a Cell2vec model to identify the semantics of base stations in cities. In order to obtain the group behavior patterns of users from the base station trajectories of group users, a user clustering method based on users’ regional mobile preferences is proposed, and the results are projected using the Stochastic Neighbor Embedding (t- SNE) algorithm to expose the clustering features of large-scale cell phone users in the low-dimensional space. To address the problem that user behavior patterns are difficult to interpret, a visual analysis model with group as well as regional semantics is designed for the spatial and temporal characteristics of user behavior. Among them, the clustering model uses the distance between scatter points to map the similarity between users, which helps analysts to explore the behavioral characteristics of group users....
Loading....