This study proposes a sensor selection approach based on maximum entropy fuzzy clustering to address the target tracking problem in large-scale sensor networks. The authors try to deal with this problem at two levels: (i) sensor-level tracking: data association problem and sensor-level tracking are carried out at the local level, and only the track outputs are transmitted to the fusion centre for data fusion; (ii) global-level fusion: two sensor selection strategies are adopted at the fusion centre, which seek to only choose a subset of reliable sensors for track-to-track fusion and bias registration. In addition, an improved sensor selection approach is proposed for data fusion in both sparse and dense target environments, and a new fuzzy membership reconstruction strategy is introduced for data association in dense target environments. Furthermore, the proposed sensor selection strategy is also effective in the presence of the possible changing sensor biases. Simulation results are given to evaluate the performance of the proposed approaches.
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.