Home Mathematics Design of visual symbol-aided system based on wireless network sensor and embedded system
Article Open Access

Design of visual symbol-aided system based on wireless network sensor and embedded system

  • Xuanzi Liu EMAIL logo
Published/Copyright: July 23, 2024
Become an author with De Gruyter Brill

Abstract

In order to solve the problem of the low transmission rate of wireless network sensors (WNSs), this article proposes a WNS visual assistance system based on embedded systems. The system uses WNSs instead of traditional wired sensors, which can achieve synchronous transmission of multi-node data, enabling nodes to work together better, thereby improving the real-time and reliability of the entire system. This article conducts in-depth research on feature extraction algorithms and tests the visual assistance system in the experimental section. The results show that the recognition rate and stability of the visual symbol assistance system implemented using WNSs are higher than those of ordinary systems. In the satisfaction survey, it was found that 87 people were very satisfied with the visual symbol assistance system, accounting for 87%, while only 57 people were very satisfied with the traditional visual symbol assistance system, accounting for 57%. The experimental results show that the system output stability of the design method is good, and the response time and reliability are better.

1 Introduction

The design of a visual symbol recognition system is the most external, direct, and contagious design. The operator’s concept and spirit can be designed through visual symbols to effectively promote the popularity and image of the enterprise and its products. Wireless network sensor (WNS) is a new type of wireless network technology with the characteristics of large range, high density, low cost, and self-recovery. At present, this technology has been widely used in environmental monitoring, power fault diagnosis, smart home, and other fields. However, one of the main problems of WNSs is their low transmission rate. To solve this problem, this article proposes a WNS vision assistant system based on an embedded system. The system uses WNSs instead of traditional wired sensors, allowing for the synchronous transmission of multi-node data and making nodes work better together, thus improving the real-time and reliability of the whole system. This method has the characteristics of low cost, low power consumption, high transmission rate, and has broad application prospects in the field of industrial control. The visual symbol auxiliary system can transform the abstract semantics of the enterprise concept, cultural characteristics, service content, and enterprise norms into the concept of specific symbols and create a unique enterprise image.

In order to explore the application of the visual symbol assistance system in all aspects, many scholars have conducted in-depth research on it. Due to the limited processing speed of the embedded processor, the image recognition processing module should be optimized, and the image pre-processing circuit can be added to the embedded processor. The date of the unique symbolic carving from different backgrounds in northern and eastern Scotland has been debated for more than a century. These symbols excavated by Noble et al. at key locations may be a complex non-alphabetic writing system, expressing the Picts’ response to the changes in European power and identity during the transition period from the Roman Empire to the early Middle Ages [1]. In order to improve the weakness of model checking, Souri et al. proposed a graphical symbol modeling tool package to design and verify the behavior model of distributed systems. They proposed a behavior modeling framework to design system behavior in the form of a Kripke structure and a tag transformation system [2]. Symbol execution systematically explores many possible execution paths at the same time without necessarily requiring specific input. This technology does not use fully specified input values, but abstractly represents them as symbols, and resorting to constraint solvers to construct would cause attribute conflicts. In the past 40 years, symbol execution has been incubated in dozens of developed tools, which have made significant practical breakthroughs in some famous software reliability applications. The purpose of Baldoni et al.’s study was to summarize the main ideas, challenges, and solutions in this field and extract them for use by a broad audience [3]. The WNS node is used as the visual signal acquisition unit. During image recognition, the embedded processor receives the image data sent by the WNS node and converts it into digital signals.

The visual symbol assistant system of WNS and embedded system mainly includes two parts: a data acquisition control module and a human–computer interaction module. Zhu et al. showed that the model based on long- and short-term memory could well change the interest rate of modulated signals with different symbols in the long-time domain sequence. In order to reduce the cost of distributed sensors in data communication, they studied the performance of low-cost spectral sensors using average magnitude spectrum data and online classification methods [4]. Jiang et al. designed a framework based on edge artificial intelligence (AI) to perform object detection tasks. They proposed a new learning classification algorithm to achieve the interpretability and robustness of AI in the system. Compared with existing technologies, the proposed recognition classification algorithm has high accuracy, interpretability, and strong robustness [5]. Mehmood et al. have proposed an efficient QoS-based multi-path routing (MPR) scheme for a wireless body area network (WBAN). In MPR, the incoming traffic is categorized into normal and emergency. Emergency traffic has been given high priority and routed on the best path within the network that improves the reliability and throughput of a WBAN [6]. Scalvini et al. proposed a new navigation aid to help people with severe blindness reach their destination. Blind people are guided by a short 3D spatialized sound that indicates the target point to follow. This sound is combined with other sonified information on potential obstacles in the vicinity. The proposed system is based on inertial sensors, GPS data, and the cartographic knowledge of pedestrian paths to define the trajectory [7]. Haq et al. proposed a new topology management and connectivity maintenance scheme called a tolerating fault and maintaining network connectivity using array antenna (ToMaCAA) for WNSs. ToMaCAA is a system designed to adapt to dynamic structures and maintain network connectivity while consuming fewer network resources. Thereafter, he incorporated a phase array antenna into the existing topology management technologies, proving ToMaCAA to be a novel contribution [8]. However, they did not investigate the stability and satisfaction of the visual symbol assistance system of the embedded system.

Aiming at the problems of inaccurate feature extraction and difficult feature selection in the process of visual symbol recognition, this article proposed a design method for a visual symbol assistant system based on a WNS and embedded system. The system took the embedded processor S3C44B0 as the core and used WNSs and embedded operating system for visual recognition control. A visual symbol assistant system based on WNSs and embedded systems was developed, and the system has good stability and accuracy of classification and recognition through experiments. The innovation of this article was that three kinds of visual symbol assistant systems were studied separately, which made it easier to highlight the authenticity of the article.

2 Feature extraction algorithm of visual symbol assistant system based on wireless sensor

2.1 WNS and embedded system

With the rapid development of microelectronics, computers, information technology, and other fields, sensing technology has been rapidly developed. Many application systems have adopted a variety of sensing methods. In short, a network sensor is a sensor that can be connected to a network or connected to a microprocessor, computer, or instrument system through a network. Therefore, how to give full play to the rich information contained in multiple sensors to ensure the reliability and performance of the system has become an important topic at present. The information contained by multiple sensors is characterized by diversity, complexity, and redundancy, and most application environments require real-time processing of information. It is difficult to do this by manpower alone, so people need to use computers to calculate to complete the feature fusion.

Multi-source information fusion is based on multiple information sources and combined in space or time according to a specific standard to obtain a consistent interpretation or description of the tested object. It can make the information system have better performance. The basic idea of multi-sensor image feature fusion is to make full use of the redundancy and complementarity of different input channel images. Through a specific feature extraction method, this article carries out feature extraction and fusion for more than two different sensor images. This can enable the fused target feature vector to represent it more completely, thus improving the credibility of target recognition. For example, the visual sensor can be used to be sensitive to the changes in the brightness of the image, which can better reflect the contrast and texture of the image and can extract the edge and texture of the image from the image. The infrared detector can reflect the thermal radiation characteristics of the object and the scene, monitor the object all the time, and extract the morphological features of the object. On this basis, based on the complementary characteristics of visible light and infrared images, specific images can be extracted from two different images, so as to obtain a series of image fusion features and then achieve image classification and recognition.

WNS is composed of several sensor nodes distributed in the network area. Each sensor node can detect information in a specific area. WNS is a kind of distributed sensor network. Its terminal is a sensor that can sense and inspect the outside world. By fusing these data, more information about the region can be obtained, and the information can be further processed, analyzed, and judged. WNS is a new type of multifunctional distributed embedded system. It has the characteristics of low power consumption, small size, and low cost. At the same time, it can support the synchronous transmission of network data according to different parameters of the application environment. The embedded system is a system that separates system software and hardware resources. It can be directly transplanted to the hardware platform and complete specific functions through corresponding application software. On this basis, the combination of WNSs and embedded systems can improve the real-time and reliability of the whole system. Its working principle and classification are shown in Figure 1.

Figure 1 
                  Sensor category and principle.
Figure 1

Sensor category and principle.

Figure 1 shows the types and working principles of sensors, which generally consist of four parts: sensitive components, conversion components, conversion circuits, and auxiliary power supplies. Sensitive components directly sense the measured object and output physical quantity signals that have a definite relationship with the measured object. The conversion element converts the physical quantity signal output by the sensitive element into an electrical signal. The conversion circuit is responsible for amplifying and modulating the electrical signal output by the conversion element. Conversion components and conversion circuits generally require an auxiliary power supply.

The WNS vision assistance system includes multiple nodes, as shown in Figure 2. In order to meet the real-time requirements of the system, two different types of WNSs are used to collect and process data. In the visual aid system, the data collected can be transmitted in the form of images. In embedded systems, multiple nodes transmit data through Ethernet connections [9,10]. In order to enable all nodes to receive image information synchronously, the dual-computer mechanism is adopted in this article. Because each node needs to process image data, the processing time of each node is very long. Therefore, in this article, the received image data can be packaged and sent to a specific network. This method is called multi-point transmission. The multi-point transmission mechanism is a very complex process, and it is necessary to analyze, simulate, and verify it.

Figure 2 
                  WNS vision assistance system.
Figure 2

WNS vision assistance system.

Figure 2 shows a WNS visual assistance system. The WNS is mainly composed of three parts, including nodes, sensor networks, and users. Among them, nodes are generally covered within a certain range through certain means, and the entire range can meet the monitoring range according to certain requirements; sensor networks are the most important part. It collects all node information through fixed channels, analyzes and calculates these node information, summarizes the analyzed results to a base station, and finally transmits them to the designated user end through satellite communication to meet the requirements of wireless sensing.

2.2 Distributed algorithm for target classification in WNSs

Because of its low-cost wireless sensor nodes, WNSs can more easily monitor the real world. This sensor can sense the external environment through sound wave, vibration, and infrared. A sensor node with sensing and communication functions is responsible for monitoring the target area and acquiring data in the sensor network, as well as completing communication with other sensor nodes, which enables simple processing of data. Wireless sensors can be applied to distributed decision problems such as target detection and recognition in the sensing area. In a complex and changeable environment, cooperative processing between the observation data of multiple nodes is necessary to achieve robust decision-making. In practical operation, the cooperative work between the sensing nodes and the unified work of the superior nodes is a typical parallel work. Considering the limited communication capacity of the sensing node (transmission power, energy consumption, and other factors), reducing the traffic between the sensing node and the parent node is the key to improve cooperative signal processing. All the methods proposed in this article take the target as the source node. Zero-mean Gaussian processing can be used to simulate the time-domain signal characteristics of the object. Each target generates a Gaussian spatial–temporal signal region with good statistical properties. On this basis, the research object can be divided into several spatial consistency regions with certain relevance.

There are many kinds of targets. It is the key to achieve target recognition to find target features that can accurately and comprehensively describe target characteristics and have a good classification effect. In general, because different sensors use different methods of feature expression, the methods of feature extraction are also different. Feature extraction and selection is to reduce the dimension of existing image objects and remove their shortcomings and defects. In a large number of original image data, in order to quickly calculate the object recognition effect, it is necessary to convert it into multiple feature quantities, namely the so-called feature extraction. On this basis, it is necessary to further reduce the dimension of the proposed feature, select the feature quantity with less information redundancy, and make it have the invariability of scale, rotation, offset, etc., so as to further improve the robustness of the proposed method.

2.2.1 Spectral feature extraction

Power spectrum is the abbreviation of power spectral density function, which is defined as the signal power in the unit frequency band. It shows the change of signal power with frequency, that is, the distribution of signal power in the frequency domain. The estimation of signal power spectral density is an important branch of signal processing. Its purpose is to extract effective signals from the frequency domain and estimate and eliminate them. The spectrum estimation of the signal has very important application value in speech, sonar, radar, and other fields. In recent years, it has been widely used in communication, control, geophysics, and other fields and has received more and more attention. Generally, the estimation of signal spectral density can be divided into traditional non-parametric and band-parametric methods. On this basis, this article focuses on the traditional spectrum estimation algorithm and carries out systematic theoretical research on it.

2.2.2 Classical spectral estimation

Fourier transform means that a function satisfying certain conditions can be expressed as a trigonometric function (sine and/or cosine function) or a linear combination of their integrals. The traditional spectral estimation method is based on the Fourier transform. Through Fourier analysis of time-domain signal, its spectrum information can be obtained. The construction of classical spectral estimation is inseparable from the following two aspects. First of all, at the beginning of the nineteenth century, scholars demonstrated that in a limited time period, any function could be expressed by an infinite number of sine and cosine components. Second, someone drew up an accurate definition of the autocorrelation function and its power spectrum in 1936. They associate it with the Fourier transform of the autocorrelation function and power spectrum, making it a pair of Fourier transform pairs with autocorrelation. This can further obtain the autocorrelation function and its energy spectrum, providing a reliable statistical basis for the study of autocorrelation equations.

2.2.3 Correlation function method

The power spectral density of any generalized stationary random process with constant mean is the Fourier transform of its autocorrelation function. According to the Wiener–Khintchine theorem, the autocorrelation function ( m ) a of stationary discrete random signals can be expressed as

(1) K aa ( n ) = C [ a * ( m ) a ( n + m ) ] .

If the power spectrum is defined as there is a transformation relationship between K aa ( n ) and W aa ( s ) (Fourier transform):

(2) W aa ( s ) = n = K aa ( n ) c ism ,

(3) K aa ( n ) = 1 2 π π π W aa ( s ) c ism ts .

If ( m ) a is ergodic in all states, its autocorrelation function can be obtained by extracting a time series and using the time average method, including

(4) K aa ( n ) = lim M = 1 2 M + 1 m = M M a * ( m ) a ( m + n ) .

Since ( m ) a in most applications is a real signal, the formula can be replaced by

(5) K aa ( n ) = lim M = 1 2 M + 1 m = M M a ( m ) a ( m + n ) .

In practical applications, the observable values of a sampling time series of random signals are limited, such as M values, which are

(6) a M ( m ) = { a ( 0 ) , a ( 1 ) , , a ( M 1 ) } = { a ( m ) , m = 0 , 1 , , M 1 } .

Therefore, its autocorrelation function can only be estimated with these M sampling data, and there are

(7) K ˆ aa ( n ) = 1 M m = 0 M 1 | n | a ( m ) a ( m + n ) , | n | M 1 .

The formula is a so-called asymptotic unbiased estimation of sampling autocorrelation function. The sampled autocorrelation function is Fourier transformed and replaced with formula (2). This method is called autocorrelation function method of spectrum estimation. In general, spectrum analysis refers to the analysis of signals by Fourier transform. Spectrum analysis includes amplitude spectrum and phase spectrum, but the most commonly used is amplitude spectrum. Before the advent of fast Fourier transform, this method was the most commonly used spectrum estimation technology.

Because the research field of visual assistant systems involves many fields, such as traffic, security, industry, etc., this article mainly studies a visual assistant system based on WNSs and embedded systems. The system replaces the traditional wired sensor with WNSs, receives the image information collected by the visual sensor through the node, and transmits the data to the network center computer through the wireless network.

3 Design and inspection of visual symbol auxiliary system

3.1 Experimental design

The input image is collected by WNSs, and the collected data are sent to the host through a serial port. The sensors required in this article include two: WNSs used by a conventional system (X) and a visual symbol recognition system (Y), both of which are installed on the S3C44B0 hardware platform [11,12]. This module mainly includes three sub-modules. Image pre-processing module: The image collected by WNSs is pre-processed to improve image quality, such as denoising and enhancement. The median filtering method and the mean filtering method can be used for noise removal. In the aspect of enhancement, histogram equalization, image sharpening, and other processing methods are used. Feature extraction module: It can extract features of visual symbols and select feature points in the image. This article uses the autocorrelation function to extract feature points. Human–computer interaction module: It can be realized according to the recognition results of visual symbols. The serial port data can be read from the embedded operating system and sent to S3C44B0. According to the data obtained by WNSs, people can determine whether there is a feature point. If there are feature points, the direction and speed of visual symbol movement are controlled according to the recognition results. Otherwise, the information uploaded by WNSs is sent to the host through the serial port [13,14]. This subroutine completes the task of visual symbol motion control and realizes the function of the auxiliary system. The multi-frame averaging method is used when WNSs collect images. Due to the large amount of calculation, this article adopts a non-uniform sampling method to ensure the speed and quality of image processing.

Five visual symbols need to be added during the system test. Visual symbols can be divided into image symbols, index symbols, and symbol symbols. The image symbol (A) includes mirror image (A1), photo (A2), sculpture (A3), model (A4), pattern (A5), etc. The index sign (B) includes the road sign (B1), station sign (B2), wind vane (B3), trademark (B4), signboard (B5), etc. The symbol (C) includes the expression (C1), action (C2), clothing (C3), clothing (C4), and orientation (C5) [15,16]. First, this article obtains the image information of five visual symbols through WNSs on the experimental device and then uses the visual recognition algorithm based on WNSs to process the image. In this article, the timer of advanced rise machine processor S3C44B0 is used for timing collection during WNS operation. In this article, the program is used to process the collected image information on the experimental device to obtain the characteristic parameters of visual symbols [17,18]. In the process of experiment, this article divides each group of data into different color regions with different thresholds and extracts feature values for each region. In this article, a classification recognition algorithm is used to classify and recognize each eigenvalue, and its recognition accuracy and system stability are as follows.

3.2 Experiment

3.2.1 Image symbol

How their rune shapes represent the symbol of the rune image is the similarity between the symbolic form and the symbolic object. In other words, the runic form of image symbols describes things in a way of “Xiao Hua.” For example, a portrait is a typical image symbol, which is the realism and imitation of the symbol object. In addition, mirror images, photos, sculptures, models, patterns, and so on have also used the means of expression of portraits and become symbols of images. In the world of symbols, real things can have their own visual symbols, and imagined things can also have their own visual symbols. For example, the statues of Buddhas and ghosts in the monasteries are similar to the imaginary objects in people’s minds, so they are also an image symbol. This article tests the image symbol auxiliary system of WNS and embedded system, and its system stability and classification recognition accuracy are shown in Figure 3.

Figure 3 
                     Recognition accuracy and stability of image symbol auxiliary system. (a) The accuracy and stability of X system's image symbol recognition. (b) The accuracy and stability of Y system's image symbol recognition.
Figure 3

Recognition accuracy and stability of image symbol auxiliary system. (a) The accuracy and stability of X system's image symbol recognition. (b) The accuracy and stability of Y system's image symbol recognition.

Figure 3(a) shows the recognition accuracy and stability of the X system, and Figure 3(b) shows the recognition accuracy and stability of the Y system. It can be seen from the figure that the classification and recognition accuracy of the X system remains between 74 and 82%, with a maximum of 81.4%. The stability is kept between 83 and 90%, with a maximum of 89.2%. The classification and recognition accuracy of the Y system is maintained between 87 and 99%, with a maximum of 98.1%. The stability is maintained at 94–100%, up to 99.9%. It can be seen that the classification recognition rate and system stability of the Y system are better than that of the X system and can also better reflect the advantages of the image symbol assistance system.

3.2.2 Index sign

The expression form of the index sign is that there is a direct causal relationship between the symbol body and the object to be represented, so that the symbol body can indicate or mark the existence of the object to be represented. Because of this feature, its symbol object would always be a certain entity or event related to time and space, just like the indicator in the zoo, which is the indicator of those animals. If one can see an iron cage of “northeast tiger,” it means that it is a northeast tiger, not an ordinary tiger. In another case, the signal lights installed on the top of tall buildings are used to remind people who fly at night. Similarly, there are signs of “construction ahead, please detour” on the road construction site, as well as road signs, stop signs, wind vanes, trademarks, signs, etc., which are the index marks of relevant things and are all index signs. In addition, the occurrence of some phenomena often accompanies or affects the occurrence of other phenomena. Among these phenomena, one phenomenon can become the index sign of another due to the proximity of time and space. For example, for the natural phenomenon of lightning, people usually see lightning first and then hear thunder. Although there is no causal relationship between lightning and thunder, people still regard lightning as the index sign of thunder. In short, as long as something can predict or mark the existence or past existence of a certain time, place, or thing, it can be regarded as a referential symbol. This article tests the index symbol auxiliary system of WNS and embedded system, and its system stability and classification recognition accuracy are shown in Figure 4.

Figure 4 
                     Identification of accuracy and stability of the auxiliary system of the index sign. (a) The accuracy and stability of X system's the index sign identification. (b) The accuracy and stability of Y system's the index sign identification.
Figure 4

Identification of accuracy and stability of the auxiliary system of the index sign. (a) The accuracy and stability of X system's the index sign identification. (b) The accuracy and stability of Y system's the index sign identification.

Figure 4(a) shows the recognition accuracy and stability of the X system, and Figure 4(b) shows the recognition accuracy and stability of the Y system. It can be seen from the figure that the classification and recognition accuracy of the X system remains between 63 and 76%, with a maximum of 75.2%, while the stability remains between 70 and 78%, with a maximum of 77.4%. However, the classification and recognition accuracy of the Y system remains between 87 and 94%, up to 93.5%, and the stability remains between 93 and 100%, up to 99.1%. It can be seen that the classification recognition rate and stability of the Y system are better than that of the X system and can also better reflect the advantages of the index symbol auxiliary system.

3.2.3 Symbol

There is no similarity or connection between the symbolic form of the symbol and the object to be represented, and their expression is only based on social conventions. For example, language is a good symbol. There is no relationship between language and what it represents. What language is used to represent what is just the result of a social group. Different people would have their own habits, thus forming a symbol system of Chinese, English, Mongolian, Arabic, and other languages. The related characters, sign language, flag language, and drum language are all symbols. Some abstract concepts, such as feelings, are difficult to imitate and have a direct relationship with. Therefore, it is usually expressed in a symbolic way. For example, roses represent love, pigeons represent peace, and red represents joy. White represents purity, flag represents nation, city gate represents a city, and so on. For example, there are gestures, expressions, actions, clothes, directions, numbers, etc. If they are connected with other things and recognized by specific social groups, they can also be regarded as a symbol. This article tests the symbol auxiliary system of WNS and embedded system, and its system stability and classification recognition accuracy are shown in Figure 5.

Figure 5 
                     Recognition accuracy and stability of symbol auxiliary system. (a) The accuracy and stability of symbol recognition in the X system. (b) The accuracy and stability of symbol recognition in the Y system.
Figure 5

Recognition accuracy and stability of symbol auxiliary system. (a) The accuracy and stability of symbol recognition in the X system. (b) The accuracy and stability of symbol recognition in the Y system.

Figure 5(a) shows the recognition accuracy and stability of the X system, and Figure 5(b) shows the recognition accuracy and stability of the Y system. It can be seen from the figure that the classification and recognition accuracy of the X system remains between 58 and 69%, with a maximum of 68.4%, while the stability remains between 67 and 74%, with a maximum of 73.5%. However, the classification and recognition accuracy of the Y system remains between 89 and 96%, up to 95.3%, and the stability remains between 90 and 99%, up to 98.3%. It can be seen that the classification recognition rate and system stability of the Y system is better than that of the X system, and it can also better reflect the advantages of the symbol auxiliary system.

3.2.4 System satisfaction

This article has verified the recognition efficiency and stability of the symbol assistance system and has learned the advantages of the wireless sensor symbol assistance system. Therefore, this article has conducted a survey on user satisfaction, and the number of users is 100, as shown in Figure 6.

Figure 6 
                     System satisfaction survey. (a) Satisfaction survey of system X. (b) Satisfaction survey of system Y.
Figure 6

System satisfaction survey. (a) Satisfaction survey of system X. (b) Satisfaction survey of system Y.

Figure 6(a) shows the satisfaction survey of system X, and Figure 6(b) shows the satisfaction survey of system Y. According to the figure, 57 people are very satisfied with the X system, accounting for 57%, 20 people are satisfied, accounting for 20%, and 17 people are dissatisfied, accounting for 17%. The number of people who are very dissatisfied is 6, accounting for 6%. Totally 87 people were very satisfied with the Y system, accounting for 87%, and 7 people were satisfied, accounting for 7%. There are four dissatisfied people, accounting for 4%, and two very dissatisfied people, accounting for 2%. It can be seen that the satisfaction of system Y is significantly higher than that of system X.

In order to further verify the application performance of the method proposed in this article in visual symbol assistance systems based on WNSs and embedded systems, this article will use statistical fusion processing-based methods and fuzzy state parameter recognition-based methods as control methods to ensure that different methods are tested in the same experimental environment. They conducted a comparative analysis of system response time and system reliability, and the comparison results are shown in Figures 7 and 8, respectively.

Figure 7 
                     Comparison results of system response time (the horizontal axis represents the number of iterations [time], and the vertical axis represents the response time [s]).
Figure 7

Comparison results of system response time (the horizontal axis represents the number of iterations [time], and the vertical axis represents the response time [s]).

Figure 8 
                     Comparison results of system reliability (the horizontal axis represents time [s], and the vertical axis represents system reliability [%]).
Figure 8

Comparison results of system reliability (the horizontal axis represents time [s], and the vertical axis represents system reliability [%]).

By analyzing Figure 7, it can be seen that compared with traditional methods, the proposed method has a shorter response time and can generally complete the response within 8 s. When other methods reach 90 iterations, their response time is higher than 10 s, indicating that the system designed by this method has better application performance. By analyzing Figure 8, it can be seen that in terms of system reliability, the system designed in this article has maintained a reliability of over 80%, which is significantly higher than other traditional methods. In addition, the system reliability of this article is relatively stable, while the system reliability of other traditional methods has significant fluctuations. It can be seen that the system designed by the method in this article has the ability to improve its information processing.

In summary, the visual symbol assistance system designed in this article based on WNSs and embedded systems has better application performance and higher output stability.

To sum up, the visual symbol assistant system based on wireless sensors is not only higher than the ordinary wireless sensor system in recognition rate, but also far higher than the ordinary wireless sensor system in stability and user satisfaction, which can highlight the advantages of this system.

4 Conclusions

This article proposes a visual symbol assistance system method using WNSs, which provides a modeled computing mode for the application of WNSs. Due to the consideration of isolated or local energy function analysis and output accuracy analysis, a globally adaptable scheduling system can be obtained by adjusting parameters or updating the system control matrix in different application contexts. In fact, completing global optimization by configuring the topology composition of nodes is a dynamic process, and the examples provided in this article also demonstrate that this method has better response time and reliability. The next step of work will focus on solving the following problems. First, there is a need for a more systematic model that includes an input matrix. How to incorporate a system tuning matrix to improve the automation and intelligence of the system. Second, for the source nodes within a monitoring area, it is necessary to consider how to collect and distribute multiple types of data, while also considering how to respond quickly in case of system failure (such as the harm of sudden changes in certain monitoring items to the system in real-time environment, and the need to quickly report sensitive data items). Large-scale parallel computing algorithms can better reduce redundancy, but they bring about increased network costs and network latency, which need to be comprehensively considered.

  1. Funding information: There is no funding information for the work in this article.

  2. Author contribution: The author confirms the sole responsibility for the conception of the study, presented results and manuscript preparation.

  3. Conflict of interest: The authors declare that there is no conflict of interest regarding the publication of this work.

  4. Data availability statement: The data of this article can be obtained through the email to the authors.

References

[1] Noble G, Goldberg M, Hamilton D. The development of the Pictish symbol system: Inscribing identity beyond the edges of Empire. Antiquity. 2018;92(365):1329–48.10.15184/aqy.2018.68Search in Google Scholar

[2] Souri A, Rahmani AM, Navimipour NJ, Rezaei R. A symbolic model checking approach in formal verification of distributed systems. Human-Centric Comput Inf Sci. 2019;9(1):1–27.10.1186/s13673-019-0165-xSearch in Google Scholar

[3] Baldoni R, Coppa E, Delia DC, Demetrescu C, Finocchi I. A survey of symbolic execution techniques. ACM Comput Surv (CSUR). 2018;51(3):1–39.10.1145/3182657Search in Google Scholar

[4] Zhu G, Ko S-W, Huang K. Inference from randomized transmissions by many backscatter sensors. IEEE Trans Wirel Commun. 2018;17(5):3111–27.10.1109/TWC.2018.2806967Search in Google Scholar

[5] Jiang X, Yu FR, Song T, Leung VCM. Edge intelligence for object detection in blockchain-based internet of vehicles: Convergence of symbolic and connectionist ai. IEEE Wirel Commun. 2021;28(4):49–55.10.1109/MWC.201.2000462Search in Google Scholar

[6] MehmoodG, Khan MZ, Bashir AK, Al-Otaibi YD, Khan S. An efficient QoS-based multi-path routing scheme for smart healthcare monitoring in wireless body area networks. Computers Electr Eng. 2023;109:108517.10.1016/j.compeleceng.2022.108517Search in Google Scholar

[7] Scalvini F, Bordeau C, Ambard M, Migniot C, Dubois J. Outdoor navigation assistive system based on robust and real-time visual–auditory substitution approach. Sensors. 2023;24(1):166.10.3390/s24010166Search in Google Scholar PubMed PubMed Central

[8] Haq MZU, Khan MZ, Rehman HU, Mehmood G, Binmahfoudh A, Krichen M, et al. An adaptive topology management scheme to maintain network connectivity in Wireless Sensor Networks. Sensors. 2022;22(8):2855.10.3390/s22082855Search in Google Scholar PubMed PubMed Central

[9] Foreman M, Weiss B. A symbolic representation for Anosov–Katok systems. Journal d’Analyse Mathématique. 2019;137(2):603–61.10.1007/s11854-019-0010-1Search in Google Scholar

[10] Atkinson E, Yuan C, Baudart G, Mandel L, Carbin M. Semi-symbolic inference for efficient streaming probabilistic programming. Proceedings of the ACM on Programming Languages 6OOPSLA2; 2022. p. 1668–96.10.1145/3563347Search in Google Scholar

[11] Li A, Krivochiza J, Domouchtsidis S, Tsinos CG, Masouros C, Cha S. A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions. IEEE Commun Surv Tutor. 2020;22(2):796–839.10.1109/COMST.2020.2980570Search in Google Scholar

[12] Neelamegham S, Aoki-Kinoshita K, Bolton E, Frank M, Lisacek F, Lütteke T, et al. Updates to the symbol nomenclature for glycans guidelines. Glycobiology. 2019;29(9):620–4.10.1093/glycob/cwz045Search in Google Scholar PubMed PubMed Central

[13] Warr Laurence N. IMA–CNMNC approved mineral symbols. Mineral Mag. 2021;85(3):291–320.10.1180/mgm.2021.43Search in Google Scholar

[14] Yang Q. Schubert problems, positivity and symbol letters. J High Energy Phys. 2022;2022(8):1–22.10.1007/JHEP08(2022)168Search in Google Scholar

[15] Bridgman T, Cummings S, Ballard J. Who built Maslow’s pyramid? A history of the creation of management studies’ most famous symbol and its implications for management education. Acad Manag Learn Educ. 2019;18(1):81–98.10.5465/amle.2017.0351Search in Google Scholar

[16] Zhou Z, Liu L, Chang H-H. Learning for detection: MIMO-OFDM symbol detection through downlink pilots. IEEE Trans Wirel Commun. 2020;19(6):3712–26.10.1109/TWC.2020.2976004Search in Google Scholar

[17] He Q, Hu Y, Schmeink A. Closed-form symbol error rate expressions for non-orthogonal multiple access systems. IEEE Trans Veh Technol. 2019;68(7):6775–89.10.1109/TVT.2019.2917579Search in Google Scholar

[18] Elvira V, Santamaria I. Multiple importance sampling for efficient symbol error rate estimation. IEEE Signal Process Lett. 2019;26(3):420–4.10.1109/LSP.2019.2892835Search in Google Scholar

Received: 2023-11-02
Accepted: 2024-03-13
Published Online: 2024-07-23

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. A study on intelligent translation of English sentences by a semantic feature extractor
  3. Detecting surface defects of heritage buildings based on deep learning
  4. Combining bag of visual words-based features with CNN in image classification
  5. Online addiction analysis and identification of students by applying gd-LSTM algorithm to educational behaviour data
  6. Improving multilayer perceptron neural network using two enhanced moth-flame optimizers to forecast iron ore prices
  7. Sentiment analysis model for cryptocurrency tweets using different deep learning techniques
  8. Periodic analysis of scenic spot passenger flow based on combination neural network prediction model
  9. Analysis of short-term wind speed variation, trends and prediction: A case study of Tamil Nadu, India
  10. Cloud computing-based framework for heart disease classification using quantum machine learning approach
  11. Research on teaching quality evaluation of higher vocational architecture majors based on enterprise platform with spherical fuzzy MAGDM
  12. Detection of sickle cell disease using deep neural networks and explainable artificial intelligence
  13. Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
  14. Characterization of neighborhood operators based on neighborhood relationships
  15. Real-time pose estimation and motion tracking for motion performance using deep learning models
  16. QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems
  17. A novel framework for single-valued neutrosophic MADM and applications to English-blended teaching quality evaluation
  18. An intelligent error correction model for English grammar with hybrid attention mechanism and RNN algorithm
  19. Prediction mechanism of depression tendency among college students under computer intelligent systems
  20. Research on grammatical error correction algorithm in English translation via deep learning
  21. Microblog sentiment analysis method using BTCBMA model in Spark big data environment
  22. Application and research of English composition tangent model based on unsupervised semantic space
  23. 1D-CNN: Classification of normal delivery and cesarean section types using cardiotocography time-series signals
  24. Real-time segmentation of short videos under VR technology in dynamic scenes
  25. Application of emotion recognition technology in psychological counseling for college students
  26. Classical music recommendation algorithm on art market audience expansion under deep learning
  27. A robust segmentation method combined with classification algorithms for field-based diagnosis of maize plant phytosanitary state
  28. Integration effect of artificial intelligence and traditional animation creation technology
  29. Artificial intelligence-driven education evaluation and scoring: Comparative exploration of machine learning algorithms
  30. Intelligent multiple-attributes decision support for classroom teaching quality evaluation in dance aesthetic education based on the GRA and information entropy
  31. A study on the application of multidimensional feature fusion attention mechanism based on sight detection and emotion recognition in online teaching
  32. Blockchain-enabled intelligent toll management system
  33. A multi-weapon detection using ensembled learning
  34. Deep and hand-crafted features based on Weierstrass elliptic function for MRI brain tumor classification
  35. Design of geometric flower pattern for clothing based on deep learning and interactive genetic algorithm
  36. Mathematical media art protection and paper-cut animation design under blockchain technology
  37. Deep reinforcement learning enhances artistic creativity: The case study of program art students integrating computer deep learning
  38. Transition from machine intelligence to knowledge intelligence: A multi-agent simulation approach to technology transfer
  39. Research on the TF–IDF algorithm combined with semantics for automatic extraction of keywords from network news texts
  40. Enhanced Jaya optimization for improving multilayer perceptron neural network in urban air quality prediction
  41. Design of visual symbol-aided system based on wireless network sensor and embedded system
  42. Construction of a mental health risk model for college students with long and short-term memory networks and early warning indicators
  43. Personalized resource recommendation method of student online learning platform based on LSTM and collaborative filtering
  44. Employment management system for universities based on improved decision tree
  45. English grammar intelligent error correction technology based on the n-gram language model
  46. Speech recognition and intelligent translation under multimodal human–computer interaction system
  47. Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
  48. Construction of GCNN-based intelligent recommendation model for answering teachers in online learning system
  49. Neural network big data fusion in remote sensing image processing technology
  50. Research on the construction and reform path of online and offline mixed English teaching model in the internet era
  51. Real-time semantic segmentation based on BiSeNetV2 for wild road
  52. Online English writing teaching method that enhances teacher–student interaction
  53. Construction of a painting image classification model based on AI stroke feature extraction
  54. Big data analysis technology in regional economic market planning and enterprise market value prediction
  55. Location strategy for logistics distribution centers utilizing improved whale optimization algorithm
  56. Research on agricultural environmental monitoring Internet of Things based on edge computing and deep learning
  57. The application of curriculum recommendation algorithm in the driving mechanism of industry–teaching integration in colleges and universities under the background of education reform
  58. Application of online teaching-based classroom behavior capture and analysis system in student management
  59. Evaluation of online teaching quality in colleges and universities based on digital monitoring technology
  60. Face detection method based on improved YOLO-v4 network and attention mechanism
  61. Study on the current situation and influencing factors of corn import trade in China – based on the trade gravity model
  62. Research on business English grammar detection system based on LSTM model
  63. Multi-source auxiliary information tourist attraction and route recommendation algorithm based on graph attention network
  64. Multi-attribute perceptual fuzzy information decision-making technology in investment risk assessment of green finance Projects
  65. Research on image compression technology based on improved SPIHT compression algorithm for power grid data
  66. Optimal design of linear and nonlinear PID controllers for speed control of an electric vehicle
  67. Traditional landscape painting and art image restoration methods based on structural information guidance
  68. Traceability and analysis method for measurement laboratory testing data based on intelligent Internet of Things and deep belief network
  69. A speech-based convolutional neural network for human body posture classification
  70. The role of the O2O blended teaching model in improving the teaching effectiveness of physical education classes
  71. Genetic algorithm-assisted fuzzy clustering framework to solve resource-constrained project problems
  72. Behavior recognition algorithm based on a dual-stream residual convolutional neural network
  73. Ensemble learning and deep learning-based defect detection in power generation plants
  74. Optimal design of neural network-based fuzzy predictive control model for recommending educational resources in the context of information technology
  75. An artificial intelligence-enabled consumables tracking system for medical laboratories
  76. Utilization of deep learning in ideological and political education
  77. Detection of abnormal tourist behavior in scenic spots based on optimized Gaussian model for background modeling
  78. RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
  79. Optimization of the road bump and pothole detection technology using convolutional neural network
  80. Comparative analysis of impact of classification algorithms on security and performance bug reports
  81. Cross-dataset micro-expression identification based on facial ROIs contribution quantification
  82. Demystifying multiple sclerosis diagnosis using interpretable and understandable artificial intelligence
  83. Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
  84. E-commerce big data processing based on an improved RBF model
  85. Analysis of youth sports physical health data based on cloud computing and gait awareness
  86. CCLCap-AE-AVSS: Cycle consistency loss based capsule autoencoders for audio–visual speech synthesis
  87. An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
  88. Computer aided diagnoses for detecting the severity of Keratoconus
  89. Improved rapidly exploring random tree using salp swarm algorithm
  90. Network security framework for Internet of medical things applications: A survey
  91. Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
  92. Enhancing 5G communication in business networks with an innovative secured narrowband IoT framework
  93. Quokka swarm optimization: A new nature-inspired metaheuristic optimization algorithm
  94. Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture
  95. Image modeling algorithm for environment design based on augmented and virtual reality technologies
  96. Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
  97. High-resolution image processing and entity recognition algorithm based on artificial intelligence
  98. Review Articles
  99. Transformative insights: Image-based breast cancer detection and severity assessment through advanced AI techniques
  100. Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
  101. Applications of integrating artificial intelligence and big data: A comprehensive analysis
  102. A systematic review of symbiotic organisms search algorithm for data clustering and predictive analysis
  103. Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
  104. Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
Downloaded on 21.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2023-0225/html
Scroll to top button