期刊文献+
共找到1,192篇文章
< 1 2 60 >
每页显示 20 50 100
An immune-swarm intelligence based algorithm for deterministic coverage problems of wireless sensor networks 被引量:1
1
作者 刘继忠 王保磊 +1 位作者 敖俊宇 Q.M.Jonathan WU 《Journal of Central South University》 SCIE EI CAS 2012年第11期3154-3161,共8页
A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the... A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the principle of particle swarm optimization (PSO) and artificial immune system (AIS).The algorithm was analyzed in detail and proper swarm size,evolving generations,gene-exchange individual order,and gene-exchange proportion in molecule were obtained for better algorithm performances.According to the test results,the appropriate parameters are about 50 swarm individuals,over 3 000 evolving generations,20%-25% gene-exchange proportion in molecule with gene-exchange taking place between better fitness affinity individuals.The algorithm is practical and effective in maximizing the coverage probability with given number of sensors and minimizing sensor numbers with required coverage probability in sensor placement.It can reach a better result quickly,especially with the proper calculation parameters. 展开更多
关键词 wireless sensor network deterministic area coverage immune-swarm algorithm particle swarm optimization artificialimmune system
在线阅读 下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
2
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
在线阅读 下载PDF
Factor graph method for target state estimation in bearing-only sensor network
3
作者 CHEN Zhan FANG Yangwang +1 位作者 ZHANG Ruitao FU Wenxing 《Journal of Systems Engineering and Electronics》 2025年第2期380-396,共17页
For target tracking and localization in bearing-only sensor network,it is an essential and significant challenge to solve the problem of plug-and-play expansion while stably enhancing the accuracy of state estimation.... For target tracking and localization in bearing-only sensor network,it is an essential and significant challenge to solve the problem of plug-and-play expansion while stably enhancing the accuracy of state estimation.This paper pro-poses a distributed state estimation method based on two-layer factor graph.Firstly,the measurement model of the bearing-only sensor network is constructed,and by investigating the observ-ability and the Cramer-Rao lower bound of the system model,the preconditions are analyzed.Subsequently,the location fac-tor graph and cubature information filtering algorithm of sensor node pairs are proposed for localized estimation.Building upon this foundation,the mechanism for propagating confidence mes-sages within the fusion factor graph is designed,and is extended to the entire sensor network to achieve global state estimation.Finally,groups of simulation experiments are con-ducted to compare and analyze the results,which verifies the rationality,effectiveness,and superiority of the proposed method. 展开更多
关键词 factor graph cubature information filtering bearing-only sensor network state estimation
在线阅读 下载PDF
Information gain based sensor search scheduling for low-earth orbit constellation estimation 被引量:3
4
作者 Bo Wang Jun Li +1 位作者 Wei An Yiyu Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期926-932,共7页
This paper addresses the problem of sensor search scheduling in the complicated space environment faced by the low-earth orbit constellation.Several search scheduling methods based on the commonly used information gai... This paper addresses the problem of sensor search scheduling in the complicated space environment faced by the low-earth orbit constellation.Several search scheduling methods based on the commonly used information gain are compared via simulations first.Then a novel search scheduling method in the scenarios of uncertainty observation is proposed based on the global Shannon information gain and beta density based uncertainty model.Simulation results indicate that the beta density model serves a good option for solving the problem of target acquisition in the complicated space environments. 展开更多
关键词 low-earth orbit constellation sensor network scheduling algorithm information gain acquisition.
在线阅读 下载PDF
Review on uncertainty analysis and information fusion diagnosis of aircraft control system
5
作者 ZHOU Keyi LU Ningyun +1 位作者 JIANG Bin MENG Xianfeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1245-1263,共19页
In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and comp... In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and complex structure),the aircraft control system contains several uncertainties,such as imprecision,incompleteness,redundancy and randomness.The information fusion technology is usually used to solve the uncertainty issue,thus improving the sampled data reliability,which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system.In this work,we first analyze the uncertainties in the aircraft control system,and also compare different uncertainty quantitative methods.Since the information fusion can eliminate the effects of the uncertainties,it is widely used in the fault diagnosis.Thus,this paper summarizes the recent work in this aera.Furthermore,we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system.Finally,this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends. 展开更多
关键词 aircraft control system sensor networks information fusion fault diagnosis UNCERTAINTY
在线阅读 下载PDF
MASC:一种基于移动辅助节点的Sweep Coverage机制 被引量:6
6
作者 林锋 王伟 周激流 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2010年第6期119-125,132,共8页
为了改进Sweep Coverage机制的性能,引入了移动辅助节点来辅助数据传输,并在此基础上提出了一种两层结构的Sweep Coverage机制(Mobile-Assisted Sweep Coverage,MASC)。MASC首先将POI分配给移动传感器节点完成数据采集,然后通过移动辅... 为了改进Sweep Coverage机制的性能,引入了移动辅助节点来辅助数据传输,并在此基础上提出了一种两层结构的Sweep Coverage机制(Mobile-Assisted Sweep Coverage,MASC)。MASC首先将POI分配给移动传感器节点完成数据采集,然后通过移动辅助节点来实现移动传感器节点和汇聚节点间数据的中继。仿真结果表明,在相同的网络场景下,提出的MASC机制较以往的覆盖机制取得更好的性能表现。 展开更多
关键词 无线传感器网络 覆盖机制 SWEEP coverage 移动辅助节点 移动控制
在线阅读 下载PDF
一种基于A-means聚类算法的Sweep Coverage机制 被引量:4
7
作者 刘晨光 林锋 周激流 《计算机应用研究》 CSCD 北大核心 2012年第3期1051-1053,共3页
为了改进Sweep Coverage机制在真实场景中的性能,提出了一种基于聚类的Sweep Coverage机制(cluste-ring-based sweep coverage,CBSC),该机制引入一种自适应的聚类算法A-means(self-adaptiveK-means algotithm)来控制节点的移动。实验结... 为了改进Sweep Coverage机制在真实场景中的性能,提出了一种基于聚类的Sweep Coverage机制(cluste-ring-based sweep coverage,CBSC),该机制引入一种自适应的聚类算法A-means(self-adaptiveK-means algotithm)来控制节点的移动。实验结果表明,在真实的监控场景中,CBSC机制较以往的覆盖机制取得了更好的性能表现。 展开更多
关键词 无线传感器网络 覆盖机制 扫描覆盖 移动控制 聚类 K-均值
在线阅读 下载PDF
Sensor Networking: Concepts, Applications, and Challenges 被引量:8
8
作者 YAO Kung 《自动化学报》 EI CSCD 北大核心 2006年第6期839-845,共7页
Sensor network has experienced world-wide explosive interests in recent years. It combines the technology of modern microelectronic sensors, embedded computational processing systems, and modern computer and wireless ... Sensor network has experienced world-wide explosive interests in recent years. It combines the technology of modern microelectronic sensors, embedded computational processing systems, and modern computer and wireless networking methodologies. In this overview paper, we first provide some rationales for the growth of sensor networking. Then we discuss various basic concepts and hardware issues. Four basic application cases in the US. National Science Foundation funded Ceneter for Embedded Networked Sensing program at UCLA are presented. Finally, six challenging issues in sensor networks are discussed. Numerous references including relevant papers, books, and conferences that have appeared in recent years are given. 展开更多
关键词 sensor networks wireless communication embedded processing information processing environmental monitoring health care system ROBOTICS automated manufacturing
在线阅读 下载PDF
Optimization method of linear barrier coverage deployment for multistatic radar 被引量:2
9
作者 LI Haipeng FENG Dazheng WANG Xiaohui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第1期68-80,共13页
To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line ... To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line into two segments. By proving the characteristics of deployment patterns, an optimal deployment sequence consisting of multiple deployment patterns is proposed and exploited to cover each segment. The types and numbers of deployment patterns are determined by an algorithm that combines the integer linear programming(ILP)and exhaustive method(EM). In addition, to reduce the computation amount, a formula is introduced to calculate the upper threshold of receivers’ number in a deployment pattern. Furthermore, since the objective function is non-convex and non-analytic, the overall model is divided into two layers concerning two suboptimization problems. Subsequently, another algorithm that integrates the segments and layers is proposed to determine the deployment parameters, such as the minimum cost, parameters of the optimal deployment sequence, and the location of the split point. Simulation results demonstrate that the proposed method can effectively determine the optimal deployment parameters under the location restriction. 展开更多
关键词 multistatic radar linear barrier coverage minimum deployment cost deployment sequence wireless sensor networks(WSNs)
在线阅读 下载PDF
A new measure for evaluating spatially related properties of traffic information credibility 被引量:1
10
作者 李海舰 董宏辉 +2 位作者 贾利民 仁墨羽 秦勇 《Journal of Central South University》 SCIE EI CAS 2014年第6期2511-2519,共9页
With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The ... With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The heterogeneity of spatial distribution of information credibility from sensor networks is analyzed and a new measure,information credibility function(ICF),is proposed to describe this heterogeneity.Three possible functional forms of sensor ICF and their corresponding expressions are presented.Then,two feasible operations of spatial superposition of sensor ICFs are discussed.Finally,a numerical example is introduced to show the calibration method of sensor ICF and obtain the spatially related properties of expressway in Beijing.The results show that the sensor ICF of expressway in Beijing possesses a negative exponent property.The traffic information is more abundant at or near the locations of sensor,while with the distance away from the sensor increasing,the traffic information credibility will be declined by an exponential trend.The new measure provides theoretical bases for the optimal locations of traffic sensor networks and the mechanism research of spatial distribution of traffic information credibility. 展开更多
关键词 traffic engineering information credibility function traffic information credibility spatially related properties sensor networks
在线阅读 下载PDF
PIR-based data integrity verification method in sensor network
11
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
在线阅读 下载PDF
三维无线传感器网络中虚拟力引导的鲸鱼覆盖优化算法 被引量:1
12
作者 侯华 周佳明 蔡剑平 《传感器与微系统》 北大核心 2025年第1期152-156,共5页
针对如何设计适用于现实物理世界的三维覆盖优化算法并最大化覆盖率问题,本文提出了一种虚拟力引导的鲸鱼覆盖优化算法(VFWOA)。利用Halton序列初始化生成均匀分布的鲸鱼种群,增强种群多样性以提升算法跳出局部最优解的能力;采用虚拟力... 针对如何设计适用于现实物理世界的三维覆盖优化算法并最大化覆盖率问题,本文提出了一种虚拟力引导的鲸鱼覆盖优化算法(VFWOA)。利用Halton序列初始化生成均匀分布的鲸鱼种群,增强种群多样性以提升算法跳出局部最优解的能力;采用虚拟力算法引导最优个体位置更新,加快算法寻优速度;引入多样性策略,控制种群的变化,提升算法寻优能力。仿真结果表明,与改进鲸鱼优化算法(WOA)、改进麻雀搜索算法和改进人工蜂群算法相比,本文所提算法提高了节点覆盖率并改善了网络的连通性。 展开更多
关键词 无线传感器网络 覆盖优化 鲸鱼优化算法 覆盖率
在线阅读 下载PDF
改进元胞自动机的无线传感器网络协同覆盖 被引量:1
13
作者 滕志军 刘佳林 +1 位作者 付雨珊 皇甫泽南 《传感器与微系统》 北大核心 2025年第4期114-118,共5页
针对传统群智能覆盖优化算法在寻优过程中,节点移动距离过大,不能控制小区域的K重覆盖等问题。将元胞自动机模型融入无线传感器网络(WSNs)部署中,通过节点感知周围邻居的覆盖情况并结合可变搜索邻居,可提升覆盖率至100%。利用概率重构函... 针对传统群智能覆盖优化算法在寻优过程中,节点移动距离过大,不能控制小区域的K重覆盖等问题。将元胞自动机模型融入无线传感器网络(WSNs)部署中,通过节点感知周围邻居的覆盖情况并结合可变搜索邻居,可提升覆盖率至100%。利用概率重构函数,可实现精准控制各个元胞子空间的K重覆盖。将系统状态作为目标函数,建立节点与邻居节点协同机制,大大降低节点的移动距离。利用能量均衡机制,均衡各个节点能量,避免最低能量节点限制整个网络的生命周期。仿真实验结果表明:在三种抛洒场景下覆盖率都能达到100%,节点移动距离大大降低,能量分布也比较均匀。 展开更多
关键词 无线传感器网络 元胞自动机 K重覆盖 概率重构函数 群智能
在线阅读 下载PDF
基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方法
14
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第7期1303-1308,共6页
无线传感器网络中的节点通常具有有限的能量、处理能力和通信范围,使得它们在实现匿名通信方面受到限制。为保证网络源节点隐私信息通信的安全性,实现通信双方的匿名通信,提出基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方... 无线传感器网络中的节点通常具有有限的能量、处理能力和通信范围,使得它们在实现匿名通信方面受到限制。为保证网络源节点隐私信息通信的安全性,实现通信双方的匿名通信,提出基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方法。利用椭圆曲线构建密码机制,使网络模型中的节点可分配一个假名,节点通过假名完成通信,保证通信双方信息不被窃取;为待传输隐私信息生成对应的数字签名,只有在认证签名有效的前提下,才能获取隐私信息的明文信息,确保隐私信息的安全性,完成节点隐私信息匿名通信。仿真结果表明,所提方法的通信开销为101 bit,在可窃听范围为40 m时匿名度就达到了100%,完成一次隐私信息匿名通信所需的时间为8.9 ms。 展开更多
关键词 无线传感网络 隐私信息匿名通信 椭圆曲线加密 数字签名认证 哈希函数
在线阅读 下载PDF
无线传感网络高维时序数据状态估计算法研究
15
作者 邓俊华 屠敏 《传感技术学报》 北大核心 2025年第2期356-361,共6页
无线传感网络中数据量较大,准确估计存储节点中的数据状态,可以避免传感网络受高维度、冗余数据、网络状态等问题的干扰,进而提高传感网络的安全性。然而在传感网络中,对高维时序数据的状态估计一直是一个难点问题,为此,提出一种无线传... 无线传感网络中数据量较大,准确估计存储节点中的数据状态,可以避免传感网络受高维度、冗余数据、网络状态等问题的干扰,进而提高传感网络的安全性。然而在传感网络中,对高维时序数据的状态估计一直是一个难点问题,为此,提出一种无线传感网络高维时序数据状态估计算法。采用基于信息熵的PCA降维算法对传感节点中的高维时序数据进行降维处理,基于最优集成随机森林算法提取数据的特征,将提取的状态特征数据输入到贝叶斯估计模型中,并采用粒子滤波对模型求解,完成无线传感网络高维时序数据的状态估计。仿真结果表明:所提算法的估计时间始终在1.99 s以下,节点能耗小于22.1 J,估计结果与实际结果一致,具有良好的估计效果。 展开更多
关键词 无线传感网络 数据状态估计 贝叶斯估计模型 粒子滤波 高维时序数据 信息熵
在线阅读 下载PDF
异步移动边缘计算网络中的联合任务调度与计算资源分配优化策略
16
作者 王汝言 杨安琪 +2 位作者 吴大鹏 唐桐 祝志远 《电子与信息学报》 北大核心 2025年第2期470-479,共10页
移动边缘计算(MEC)通过将密集型任务从传感器卸载到附近边缘服务器,来增强本地的计算能力,延长其电池寿命。然而,在面向无线传感器网等时变环境中,任务之间的异构性可能会导致通信低效率、高时延等问题。为此,该文提出一种异步移动边缘... 移动边缘计算(MEC)通过将密集型任务从传感器卸载到附近边缘服务器,来增强本地的计算能力,延长其电池寿命。然而,在面向无线传感器网等时变环境中,任务之间的异构性可能会导致通信低效率、高时延等问题。为此,该文提出一种异步移动边缘计算网络中的联合任务调度与计算资源分配优化策略,该策略实时感知任务信息年龄和能耗,将异步边缘卸载问题数学建模为NP难(NP-hard problem)的混合整数规划问题,并提出基于混合动作优势演员-评论家(HA2C)强化学习算法的任务调度和计算资源分配方案解决该问题。仿真结果表明,该文方法能显著降低异步卸载网络的平均信息年龄和能耗,满足无线传感器网络对任务时效性的要求。 展开更多
关键词 异步移动边缘计算 无线传感器网络 平均信息年龄 平均能耗 混合动作强化学习
在线阅读 下载PDF
单纯形法引导的自适应沙猫群优化算法及应用
17
作者 罗文涛 钱谦 +3 位作者 潘家文 张晓丽 冯勇 李英娜 《小型微型计算机系统》 北大核心 2025年第8期1869-1877,共9页
为了克服沙猫优化算法(SCSO)在高维优化问题上,易陷入局部最优和收敛精度差的问题,提出了一种单纯形法引导的自适应沙猫群优化算法(SASCSO).首先,采用了一种自适应围捕策略,使沙猫个体随机出现在自适应控制的算法搜索边界内,帮助算法逃... 为了克服沙猫优化算法(SCSO)在高维优化问题上,易陷入局部最优和收敛精度差的问题,提出了一种单纯形法引导的自适应沙猫群优化算法(SASCSO).首先,采用了一种自适应围捕策略,使沙猫个体随机出现在自适应控制的算法搜索边界内,帮助算法逃逸局部陷阱.其次,利用单纯形法引导较差个体构建几何搜索路径以提升算法的搜索能力.与其他对比算法相比,SASCSO在100维度的CEC2017基准函数测试集的综合优胜率为75.86%,结合非参数分析表明该算法是解决高维复杂优化问题的可行方法.此外,将SASCSO应用于三维无线传感器网络覆盖和复杂环境下无人机航径优化问题,结果显示SASCSO在两个实际问题上均提供了最优的方案,验证了SASCSO在实际优化中的适用性和优越性. 展开更多
关键词 沙猫群优化算法 自适应围捕策略 单纯形法 无线传感器网络覆盖 无人机航径优化
在线阅读 下载PDF
基于孤立森林的传感器网络非线性异常数据点检测方法
18
作者 韦霞 熊志文 傅彦铭 《传感技术学报》 北大核心 2025年第8期1499-1504,共6页
检测传感器网络中的非线性异常数据点对于保证数据质量、提高数据安全性具有重要作用。为此,提出基于孤立森林的传感器网络非线性异常数据点检测方法。首先,联合小波变换、傅里叶变换和奇异谱分析法,分离出传感器网络非线性数据中的趋势... 检测传感器网络中的非线性异常数据点对于保证数据质量、提高数据安全性具有重要作用。为此,提出基于孤立森林的传感器网络非线性异常数据点检测方法。首先,联合小波变换、傅里叶变换和奇异谱分析法,分离出传感器网络非线性数据中的趋势项,更好地聚焦于局部数据点检测;然后,通过自动编码器重构的方式,突出数据的本质特征;最后,引入分裂准则和相对质量的概念优化孤立森林算法,根据孤立树节点的分值分析对应数据点存在异常的可能性,从而检测出非线性数据中的异常点。仿真结果表明,所提方法的AUC值始终保持在0.945以上,均方根误差低于0.073,虽然内存占用率存在微小波动,但在数值上始终处于0.25以下。 展开更多
关键词 信息与通信工程 异常数据点检测 孤立森林 传感器网络 小波变换 自动编码器
在线阅读 下载PDF
无线传感网络入侵干扰节点定位方法的优化设计
19
作者 贾仁祥 单鸿涛 《传感技术学报》 北大核心 2025年第8期1511-1518,共8页
为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统... 为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统思路,查询关键节点对象,并针对其定义攻击性判定Hash函数,联合相关攻击项,判定已标记对象入侵攻击等级。在无线传感网络中实施入侵信息的拟合处理,根据无线传感网络划分条件,定位入侵攻击项,完成无线传感网络入侵干扰节点定位。仿真结果表明,所提技术定位偏差在0.5~0.1之间,字段检测长度与真实长度的数值比保持在99%以上,检测时间低于30 s。符合检测无线传感网络攻击性信息的实际应用需求。 展开更多
关键词 无线传感网络 入侵干扰节点定位 粒子群算法 边界坐标 HASH函数 信息拟合 优化设计
在线阅读 下载PDF
基于对立竞争群优化器的WSN部署策略研究
20
作者 罗清波 朱星星 《传感技术学报》 北大核心 2025年第3期533-542,共10页
为提高无线传感器网络高覆盖率,降低无线传感器网络能耗,提出了一种基于对立竞争群优化器的WSN部署策略。首先,采用二进制传感器模型监测感知区域,为每个传感器节点生成一条避障路径,建立传感器覆盖模型和移动模型。其次,采用基于对立... 为提高无线传感器网络高覆盖率,降低无线传感器网络能耗,提出了一种基于对立竞争群优化器的WSN部署策略。首先,采用二进制传感器模型监测感知区域,为每个传感器节点生成一条避障路径,建立传感器覆盖模型和移动模型。其次,采用基于对立的学习改进竞争群优化器算法,将虚拟力算法与边界机制相结合开发了一种混合边界机制,并运用维诺图的分区能力分解每个传感器的感知区域,从而感知半径分配的网络信息。最后,选择了几种典型应用场景进行了仿真分析,并与其他四种方法进行了对比,验证所提方法的有效性。实验结果表明,所提方法能够在实现最大化覆盖区域的同时最小化网络能量消耗,且对于所测试场景,所提方法的移动距离与覆盖收敛速度均优于其他对比算法。 展开更多
关键词 无线传感器网络 节点部署 网络覆盖率 竞争群优化器 虚拟力算法
在线阅读 下载PDF
上一页 1 2 60 下一页 到第
使用帮助 返回顶部