期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
线状WSN中基于概率分流的负载均衡路由协议 被引量:1
1
作者 韩江洪 林飞 +2 位作者 袁晓靖 魏振春 韩东 《电信科学》 北大核心 2011年第4期87-90,共4页
针对线状无线传感器网络中节点能量消耗不均衡现象,本文提出基于概率分流的负载均衡路由协议,以一定规则建立多条路由路径,通过使负载较轻路径上的节点以一定概率分担负载较重路径上节点的数据传输任务,均衡网络中各个节点的负载。仿真... 针对线状无线传感器网络中节点能量消耗不均衡现象,本文提出基于概率分流的负载均衡路由协议,以一定规则建立多条路由路径,通过使负载较轻路径上的节点以一定概率分担负载较重路径上节点的数据传输任务,均衡网络中各个节点的负载。仿真结果表明,本协议能有效地改善各个节点能量消耗的均衡性,延长网络生存时间。 展开更多
关键词 线状无线传感器网络 概率分流 负载均衡 能量消耗
在线阅读 下载PDF
基于RFID的高校资产管理系统应用分析 被引量:7
2
作者 胡莹 唐文枝 《实验技术与管理》 CAS 北大核心 2013年第11期126-129,共4页
固定资产是高校重要的经济资源,是进行教学科研活动的物质基础。一方面它是创造价值的基石,另一方面也是运行成本费用的重大开销。如何有效控制成本、充分提高资产的利用率,提升监管和维护水平,让资产产生更多的效益,是资产管理者深切... 固定资产是高校重要的经济资源,是进行教学科研活动的物质基础。一方面它是创造价值的基石,另一方面也是运行成本费用的重大开销。如何有效控制成本、充分提高资产的利用率,提升监管和维护水平,让资产产生更多的效益,是资产管理者深切关注的问题。通过基于RFID的资产管理系统的升级,有效地增强了资产实物和账目数据的联动,为管理人员带来工作便利的同时,也增强了管理工作的科学性和实效性。 展开更多
关键词 高校资产管理系统 射频识别 线传感器网络 智能感知
在线阅读 下载PDF
配电网中基于分簇定位的WSN节点故障定位研究 被引量:10
3
作者 崔坤利 郎朗 +1 位作者 陈孟元 杜乾 《传感技术学报》 CAS CSCD 北大核心 2017年第1期146-151,共6页
针对电网故障检测中使用的无线传感器网络节点定位精度较低,分簇不均问题,提出了一种基于DV-Hop算法改进均值粒子群算法(PSO),首先DV-Hop算法改进均值粒子群算法中粒子的速度与位移,使动态无线传感器网络重新定位簇头节点坐标更加接近... 针对电网故障检测中使用的无线传感器网络节点定位精度较低,分簇不均问题,提出了一种基于DV-Hop算法改进均值粒子群算法(PSO),首先DV-Hop算法改进均值粒子群算法中粒子的速度与位移,使动态无线传感器网络重新定位簇头节点坐标更加接近真实值;然后递归神经网络学习算法迭代值逼近最合适的惯性权重值,优化均值PSO粒子群算法使其达到最优搜索能力。最后由Sink节点对每一次动态分簇后网络节点进行数据采集后对电能耗尽的节点进行无线充电。仿真结果表明,改进后的PSO算法比PSO算法聚类分簇误差更小,节点定位配电网故障的精确度提高12.8%,有效地延长了网络生命周期。 展开更多
关键词 线传感器网络 配电网故障检测 改进均值粒子群算法 惯性权重值 最优搜索能力
在线阅读 下载PDF
Dynamic cluster member selection method for multi-target tracking in wireless sensor network 被引量:8
4
作者 蔡自兴 文莎 刘丽珏 《Journal of Central South University》 SCIE EI CAS 2014年第2期636-645,共10页
Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a s... Multi-target tracking(MTT) is a research hotspot of wireless sensor networks at present.A self-organized dynamic cluster task allocation scheme is used to implement collaborative task allocation for MTT in WSN and a special cluster member(CM) node selection method is put forward in the scheme.An energy efficiency model was proposed under consideration of both energy consumption and remaining energy balance in the network.A tracking accuracy model based on area-sum principle was also presented through analyzing the localization accuracy of triangulation.Then,the two models mentioned above were combined to establish dynamic cluster member selection model for MTT where a comprehensive performance index function was designed to guide the CM node selection.This selection was fulfilled using genetic algorithm.Simulation results show that this method keeps both energy efficiency and tracking quality in optimal state,and also indicate the validity of genetic algorithm in implementing CM node selection. 展开更多
关键词 wireless sensor networks multi-target tracking collaborative task allocation dynamic cluster comprehensive performance index function
在线阅读 下载PDF
A sink moving scheme based on local residual energy of nodes in wireless sensor networks 被引量:4
5
作者 谭长庚 许可 +1 位作者 王建新 陈松乔 《Journal of Central South University》 SCIE EI CAS 2009年第2期265-268,共4页
In the application of periodic data-gathering in sensor networks,sensor nodes located near the sink have to forward the data received from all other nodes to the sink,which depletes their energy very quickly.A moving ... In the application of periodic data-gathering in sensor networks,sensor nodes located near the sink have to forward the data received from all other nodes to the sink,which depletes their energy very quickly.A moving scheme for the sink based on local residual energy was proposed.In the scheme,the sink periodically moves to a new location with the highest stay-value defined by the average residual energy and the number of neighbors.The scheme can balance energy consumption and prevent nodes around sink from draining their energy very quickly in the networks.The simulation results show that the scheme can prolong the network lifetime by 26%-65%compared with the earlier schemes where the sink is static or moves randomly. 展开更多
关键词 wireless sensor network network lifetime moving scheme residual energy
在线阅读 下载PDF
Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs 被引量:3
6
作者 任炬 张尧学 刘康 《Journal of Central South University》 SCIE EI CAS 2014年第8期3155-3168,共14页
Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor&#... Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor's location.A multiple k-hop clusters based routing strategy(MHCR) is proposed to preserve source-location privacy as well as enhance energy efficiency for WSNs.Owing to the inherent characteristics of intra-cluster data aggregation,each sensor of the interference clusters is able to act as a fake source to confuse the adversary.Moreover,dummy traffic could be filtered efficiently by the cluster heads during the data aggregation,ensuring no energy consumption be burdened in the hotspot of the network.Through careful analysis and calculation on the distribution and the number of interference clusters,energy efficiency is significantly enhanced without reducing the network lifetime.Finally,the security and delay performance of MHCR scheme are theoretically analyzed.Extensive analysis and simulation results demonstrate that MHCR scheme can improve both the location privacy security and energy efficiency markedly,especially in large-scale WSNs. 展开更多
关键词 wireless sensor networks source-location privacy energy efficiency k-hop cluster circular routing
在线阅读 下载PDF
Prediction-based energy-efficient target tracking protocol in wireless sensor networks 被引量:3
7
作者 BHUIYAN M.Z.A. 王国军 +1 位作者 张力 彭勇 《Journal of Central South University》 SCIE EI CAS 2010年第2期340-348,共9页
A prediction based energy-efficient target tracking protocol in wireless sensor networks(PET) was proposed for tracking a mobile target in terms of sensing and communication energy consumption.In order to maximize the... A prediction based energy-efficient target tracking protocol in wireless sensor networks(PET) was proposed for tracking a mobile target in terms of sensing and communication energy consumption.In order to maximize the lifetime of a wireless sensor network(WSN),the volume of messages and the time for neighbor discovery operations were minimized.The target was followed in a special region known as a face obtained by planarization technique in face-aware routing.An election process was conducted to choose a minimal number of appropriate sensors that are the nearest to the target and a wakeup strategy was proposed to wakeup the appropriate sensors in advance to track the target.In addition,a tracking algorithm to track a target step by step was introduced.Performance analysis and simulation results show that the proposed protocol efficiently tracks a target in WSNs and outperforms some existing protocols of target tracking with energy saving under certain ideal situations. 展开更多
关键词 wireless sensor networks target tracking wakeup mechanism face-aware routing energy efficiency
在线阅读 下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
8
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 time out-medium access control (T-MAC) security vulnerability AUTHENTICATION SYNCHRONIZATION authenticationmasking code
在线阅读 下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
9
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
Energy efficient mechanism using flexible medium access control protocol for hybrid wireless sensor networks 被引量:2
10
作者 SUN Ning JEONG Yoon-su LEE Sang-ho 《Journal of Central South University》 SCIE EI CAS 2013年第8期2165-2174,共10页
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is rega... Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is regarded suitable for WSNs due to its good performance in energy conservation. In this work, an adequately flexible mechanism for clustering WSNs is designed, in which some creative or promotional metrics are utilized, such as cluster head selection algorithm, cluster optional reconstruction, interested data transmission, multiple path routing protocol. All these strategies were cooperated to maximize energy saving of whole system. An appropriate MAC protocol for this mechanism is proposed, by flexibly switching the status of diverse sensor nodes in different strategies. The simulation results show that the proposed MAC protocol is suitable for clustering WSNs and performs well in aspects of energy efficiency, flexibility and scalability. 展开更多
关键词 MAC protocol energy conservation FLEXIBILITY re-clustering wireless sensor network
在线阅读 下载PDF
Energy-constrained ferry route design for sparse wireless sensor networks 被引量:2
11
作者 王勇 彭伟 +1 位作者 窦强 龚正虎 《Journal of Central South University》 SCIE EI CAS 2013年第11期3142-3149,共8页
In recent years,using message ferries as mechanical carriers of data has been shown to be an effective way to collect information in sparse wireless sensor networks.As the sensors are far away from each other in such ... In recent years,using message ferries as mechanical carriers of data has been shown to be an effective way to collect information in sparse wireless sensor networks.As the sensors are far away from each other in such highly partitioned scenario,a message ferry needs to travel a long route to access all the sensors and carry the data collected from the sensors to the sink.Typically,practical constraints(e.g.,the energy)preclude a ferry from visiting all sensors in a single tour.In such case,the ferry can only access part of the sensors in each tour and move back to the sink to get the energy refilled.So,the energy-constrained ferry route design(ECFRD)problem is discussed,which leads to the optimization problem of minimizing the total route length of the ferry,while keeping the route length of each tour below a given constraint.The ECFRD problem is proved to be NP-hard problem,and the integer linear programming(ILP)formulation is given.After that,efficient heuristic algorithms are proposed to solve this problem.The experimental results show that the performances of the proposed algorithms are effective in practice compared to the optimal solution. 展开更多
关键词 message ferry energy-constrained route design integer linear programming wireless sensor networks
在线阅读 下载PDF
Node scattering manipulation based on trajectory model in wireless sensor network 被引量:2
12
作者 裴智强 徐昌庆 藤劲 《Journal of Central South University》 SCIE EI CAS 2010年第5期991-999,共9页
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ... To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced. 展开更多
关键词 WORK node scattering manipulation trajectory model energy consumption
在线阅读 下载PDF
Local adaptive transmit power assignment strategy for wireless sensor networks 被引量:1
13
作者 赵学健 庄毅 王进 《Journal of Central South University》 SCIE EI CAS 2012年第7期1909-1920,共12页
A distributed local adaptive transmit power assignment (LA-TPA) strategy was proposed to construct a topology with better performance according to the environment and application scenario and prolong the network lifet... A distributed local adaptive transmit power assignment (LA-TPA) strategy was proposed to construct a topology with better performance according to the environment and application scenario and prolong the network lifetime.It takes the path loss exponent and the energy control coefficient into consideration with the aim to accentuate the minimum covering district of each node more accurately and precisely according to various network application scenarios.Besides,a self-healing scheme that enhances the robustness of the network was provided.It makes the topology tolerate more dead nodes than existing algorithms.Simulation was done under OMNeT++ platform and the results show that the LA-TPA strategy is more effective in constructing a well-performance network topology based on various application scenarios and can prolong the network lifetime significantly. 展开更多
关键词 wireless sensor network topology control transmit power assignment range assignment path loss exponent energycontrol coefficient ROBUSTNESS network lifetime
在线阅读 下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
14
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
在线阅读 下载PDF
Hash-area-based data dissemination protocol in wireless sensor networks 被引量:1
15
作者 王田 王国军 +1 位作者 过敏意 贾维嘉 《Journal of Central South University of Technology》 EI 2008年第3期392-398,共7页
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se... HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks. 展开更多
关键词 wireless sensor networks Hash function data dissemination query processing mobile sinks
在线阅读 下载PDF
Energy-balanced clustering protocol for data gathering in wireless sensor networks with unbalanced traffic load 被引量:1
16
作者 奎晓燕 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3180-3187,共8页
Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering pr... Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering protocol (DSCP) was proposed to solve the data gathering problem in this scenario.In DSCP,a node evaluates the potential lifetime of the network (from its local point of view) assuming that it acts as the cluster head,and claims to be a tentative cluster head if it maximizes the potential lifetime.When evaluating the potential lifetime of the network,a node considers not only its remaining energy,but also other factors including its traffic load,the number of its neighbors,and the traffic loads of its neighbors.A tentative cluster head becomes a final cluster head with a probability inversely proportional to the number of tentative cluster heads that cover its neighbors.The protocol can terminate in O(n/lg n) steps,and its total message complexity is O(n2/lg n).Simulation results show that DSCP can effectively prolong the lifetime of the network in multi-hop networks with unbalanced traffic load.Compared with EECT,the network lifetime is prolonged by 56.6% in average. 展开更多
关键词 ENERGY-BALANCE CLUSTERING data gathering wireless sensor networks unbalanced traffic load
在线阅读 下载PDF
An immune-swarm intelligence based algorithm for deterministic coverage problems of wireless sensor networks 被引量:1
17
作者 刘继忠 王保磊 +1 位作者 敖俊宇 Q.M.Jonathan WU 《Journal of Central South University》 SCIE EI CAS 2012年第11期3154-3161,共8页
A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the... A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the principle of particle swarm optimization (PSO) and artificial immune system (AIS).The algorithm was analyzed in detail and proper swarm size,evolving generations,gene-exchange individual order,and gene-exchange proportion in molecule were obtained for better algorithm performances.According to the test results,the appropriate parameters are about 50 swarm individuals,over 3 000 evolving generations,20%-25% gene-exchange proportion in molecule with gene-exchange taking place between better fitness affinity individuals.The algorithm is practical and effective in maximizing the coverage probability with given number of sensors and minimizing sensor numbers with required coverage probability in sensor placement.It can reach a better result quickly,especially with the proper calculation parameters. 展开更多
关键词 wireless sensor network deterministic area coverage immune-swarm algorithm particle swarm optimization artificialimmune system
在线阅读 下载PDF
Delay optimization for planar wireless sensor network with N-policy 被引量:1
18
作者 陈志刚 张德宇 陈龙 《Journal of Central South University》 SCIE EI CAS 2014年第12期4537-4543,共7页
In N-policy, the nodes attempt to seize the channel when the number of packets in the buffer approaches N. The performance of N-policy on the energy efficiency is widely studied in the past years. And it is presented ... In N-policy, the nodes attempt to seize the channel when the number of packets in the buffer approaches N. The performance of N-policy on the energy efficiency is widely studied in the past years. And it is presented that there exists one optimal N to minimize the energy consumption. However, it is noticed that the delay raised by N-policy receives little attention. This work mathematically proves the delay to monotonically increase with increasing N in the collision-unfree channel. For planar network where the near-to-sink nodes burden heavier traffic than the external ones, the data stemming from the latter undergo longer delay.The various-N algorithm is proposed to address this phenomenon by decreasing the threshold N of outer nodes. Without the impacting on the network longevity, the maximum delay among the network has decreased 62.9% by the algorithm. Extensive simulations are given to verify the effectiveness and correctness of our analysis. 展开更多
关键词 wireless sensor network N-policy delay energy-efficiency M/M/1
在线阅读 下载PDF
REA-MAC:A low latency routing-enhanced asynchronous duty-cycle MAC protocol for wireless sensor networks
19
作者 唐宏伟 曹建农 +1 位作者 孙彩霞 卢凯 《Journal of Central South University》 SCIE EI CAS 2013年第3期678-687,共10页
Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during th... Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during the operational cycle,which results in the packet delivery latency increased significantly on the multiple hops path.To reduce the packet delivery latency on multi-hop path and energy waste of the sender's idle listening,a new low latency routing-enhanced asynchronous duty-cycle MAC protocol was presented,called REA-MAC.In REA-MAC,each sensor node decided when it waked up to send the beacon based on cross-layer routing information.Furthermore,the sender adaptively waked up based on the relationship between the transmission request time and the wakeup time of its next hop node.The simulation results show that REA-MAC reduces delivery latency by 60% compared to RI-MAC and reduces 8.77% power consumption on average.Under heavy traffic,REA-MAC's throughput is 1.48 times of RI-MAC's. 展开更多
关键词 wireless sensor networks ASYNCHRONOUS duty-cycle media access control protocol idle listening low latency
在线阅读 下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
20
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部