2016
DOI: 10.2298/csis160224019l
|View full text |Cite
|
Sign up to set email alerts
|

A two-step MF signal acquisition method for wireless underground sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Endsley [20] is the most concerned model that defines situation awareness as perception, by including the current state and future trend of the element in a space during a time period. Endsley model divides situation awareness into three parts: (1) Perception: it acquires and collects important information in network, which is the fundamental step of situation awareness model, (2) Comprehension: the collected data is integrated and analyzed and then used to evaluate the current situation, and (3) Prediction: the future trend is predicted on the basis of the results in (1) and (2). The data is collected from the management device, monitoring device and security device in the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Endsley [20] is the most concerned model that defines situation awareness as perception, by including the current state and future trend of the element in a space during a time period. Endsley model divides situation awareness into three parts: (1) Perception: it acquires and collects important information in network, which is the fundamental step of situation awareness model, (2) Comprehension: the collected data is integrated and analyzed and then used to evaluate the current situation, and (3) Prediction: the future trend is predicted on the basis of the results in (1) and (2). The data is collected from the management device, monitoring device and security device in the network.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, one of largest issues is security threat in mobile network [2][3][4]. People has developed many protection techniques to cope with these threats, such as mobile firewall, intrusion detection, and virus killer.…”
Section: Introductionmentioning
confidence: 99%
“…In the study of signal vibration frequency, the Fourier transformation method is commonly used to determine the signal; for non-stationary time-varying signals, wavelet transform is generally used to obtain energy spectra on different scales, but wavelet transform is also based on Fourier transform theory. However, there are still limitations of the window function because the frequency of time conversion in Liang et al 5 cannot accurately be described, and the frequency-domain resolution is low. After a large number of measured data analysis, the effective information of the optical fiber vibration signal collected by the system is mostly included in the mid-band frequency, so the method of modern power spectrum estimation with higher frequency-domain resolution is selected to extract the frequency-domain features.…”
Section: Second Stage: Vibration Pattern Recognitionmentioning
confidence: 99%
“…A two-level identification scheme is proposed, which in first passes through the time-domain features, after which the suspected perturbation position is extracted. en the short-term Fourier transform is used by Liang et al [13] to qualitatively analyze the spectral features. But DiCarlo and Weber [14] have extracted in the complex wavelet domain the energy distribution and vibration duration of different frequency bands as signal characteristics; and finally the support vector machine (SVM) is used to classify them.…”
Section: Introductionmentioning
confidence: 99%