2020
DOI: 10.1016/j.comcom.2020.04.026
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(34 citation statements)
references
References 27 publications
0
30
0
Order By: Relevance
“…It has the characteristics of fast scanning, small size, diversified shape, ability and durability, reusable, penetrating and barrier free reading, large capacity of data memory, high security and confidentiality. The main advantage of RFID system is no contact identification and fast reading speed, which can be used for interactive business such as process tracking [33].…”
Section: B Key Technologies and Algorithms Of Iotmentioning
confidence: 99%
“…It has the characteristics of fast scanning, small size, diversified shape, ability and durability, reusable, penetrating and barrier free reading, large capacity of data memory, high security and confidentiality. The main advantage of RFID system is no contact identification and fast reading speed, which can be used for interactive business such as process tracking [33].…”
Section: B Key Technologies and Algorithms Of Iotmentioning
confidence: 99%
“…(2) Secondly, matrix B is calculated by formula (18). 19(3) Thirdly, matrix C is calculated by formula (20).…”
Section: Trilinear Alternating Least Square For Parallel Factor Analysismentioning
confidence: 99%
“…Signal processing combined with empirical mode decomposition (EMD) and fuzzy c-means clustering is used for mornitoring piston pump defects in literature [16] . The traditional decomposition method of processing high-dimensional data will not only lose the integrity of the data but also increase the amount of calculation and introduce redundancy [17][18][19][20] . These methods of extracting time-frequency characteristics from single-channel signals, such as Fourier transform, cannot reflect the internal relationship of nonlinear changes between multi-source channel characteristic signals, nor can they eliminate information interference.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, there are enormous networks associating from the cellular systems to noninfrastructure wireless systems such as sensor networks, mobile ad hoc networks, and the Internet of Things (IoT). The communication security is the key element for the success of wireless sensor applications [1,2], especially for sensitive applications that work in mission-critical and hostile areas. Therefore, the provision of reliable and efficient security in wireless networks has always been a challenging task due to various malignant attacks and resource-constrained environment.…”
Section: Introductionmentioning
confidence: 99%
“…(1) We have presented a three-party identity-based authentication for the secure communications among users in an IoT infrastructure. The proposed identity-based scheme is designed using simple operations such as XOR, hash, and point multiplication (2) The proposed protocol enables mutual authentication between users and gateway for establishing and sharing the session key…”
Section: Introductionmentioning
confidence: 99%