期刊文献+
共找到2,532篇文章
< 1 2 127 >
每页显示 20 50 100
An immune-swarm intelligence based algorithm for deterministic coverage problems of wireless sensor networks 被引量:1
1
作者 刘继忠 王保磊 +1 位作者 敖俊宇 Q.M.Jonathan WU 《Journal of Central South University》 SCIE EI CAS 2012年第11期3154-3161,共8页
A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the... A novel immune-swarm intelligence (ISI) based algorithm for solving the deterministic coverage problems of wireless sensor networks was presented.It makes full use of information sharing and retains diversity from the principle of particle swarm optimization (PSO) and artificial immune system (AIS).The algorithm was analyzed in detail and proper swarm size,evolving generations,gene-exchange individual order,and gene-exchange proportion in molecule were obtained for better algorithm performances.According to the test results,the appropriate parameters are about 50 swarm individuals,over 3 000 evolving generations,20%-25% gene-exchange proportion in molecule with gene-exchange taking place between better fitness affinity individuals.The algorithm is practical and effective in maximizing the coverage probability with given number of sensors and minimizing sensor numbers with required coverage probability in sensor placement.It can reach a better result quickly,especially with the proper calculation parameters. 展开更多
关键词 wireless sensor network deterministic area coverage immune-swarm algorithm particle swarm optimization artificialimmune system
在线阅读 下载PDF
A utility-optimal backoff algorithm for wireless sensor networks
2
作者 廖盛斌 杨宗凯 +1 位作者 程文青 刘威 《Journal of Central South University》 SCIE EI CAS 2009年第4期635-639,共5页
A novel backoff algorithm in CSMA/CA-based medium access control (MAC) protocols for clustered sensor networks was proposed. The algorithm requires that all sensor nodes have the same value of contention window (CW) i... A novel backoff algorithm in CSMA/CA-based medium access control (MAC) protocols for clustered sensor networks was proposed. The algorithm requires that all sensor nodes have the same value of contention window (CW) in a cluster, which is revealed by formulating resource allocation as a network utility maximization problem. Then, by maximizing the total network utility with constrains of minimizing collision probability, the optimal value of CW (Wopt) can be computed according to the number of sensor nodes. The new backoff algorithm uses the common optimal value Wopt and leads to fewer collisions than binary exponential backoff algorithm. The simulation results show that the proposed algorithm outperforms standard 802.11 DCF and S-MAC in average collision times, packet delay, total energy consumption, and system throughput. 展开更多
关键词 wireless sensor networks network utility maximization backoff algorithm collision probability
在线阅读 下载PDF
Fuzzy adaptive Kalman filter for indoor mobile target positioning with INS/WSN integrated method 被引量:10
3
作者 杨海 李威 罗成名 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1324-1333,共10页
Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobil... Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobile target positioning. Taking traditional Kalman filter(KF) as the framework, the system equation of KF was established by the INS and the observation equation of position errors was built by the WSN. Meanwhile, the observation equation of velocity errors was established by the velocity difference between the INS and WSN, then the covariance matrix of Kalman filter measurement noise was adjusted with fuzzy inference system(FIS), and the fuzzy adaptive Kalman filter(FAKF) based on the INS/WSN was proposed. The simulation results show that the FAKF method has better accuracy and robustness than KF and EKF methods and shows good adaptive capacity with time-varying system noise. Finally, experimental results further prove that FAKF has the fast convergence error, in comparison with KF and EKF methods. 展开更多
关键词 inertial navigation system(INS) wireless sensor network(WSN) mobile target integrated positioning fuzzy adaptive Kalman filter
在线阅读 下载PDF
Prediction-based protocol for mobile target tracking in wireless sensor networks 被引量:3
4
作者 Liang Xue Zhixin Liu Xinping Guan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期347-352,共6页
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce... Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively. 展开更多
关键词 wireless sensor network target tracking protocol predictive algorithm recovery mechanism.
在线阅读 下载PDF
Impact of small-world topologies on broadcasting for wireless sensor networks 被引量:2
5
作者 Jiang Nan Yang Shuqun +1 位作者 Zhou Liang Ding Qiulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期192-196,共5页
Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial ... Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial graphs that have much more clustered and much high path-length characteristics. After considering energy- efficient broadcasting in such networks, by combining the small-world characteristic of WSNs and the properties of ant algorithm to quickly identify an optimal path, small-world power-aware broadcast algorithm is introduced and evaluated. Given different densities of network, simulation results show that our algorithm significantly improves life of networks and also reduces communication distances and power consumption. 展开更多
关键词 small world ant colony algorithm BROADCASTING wireless sensor networks.
在线阅读 下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
6
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
A new energy efficient management approach for wireless sensor networks in target tracking 被引量:1
7
作者 Ce Pang Gong-guo Xu +1 位作者 Gan-lin Shan Yun-pu Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第3期932-947,共16页
This paper mainly studied the problem of energy conserving in wireless sensor networks for target tracking in defensing combats. Firstly, the structures of wireless sensor nodes and networks were illustrated;Secondly,... This paper mainly studied the problem of energy conserving in wireless sensor networks for target tracking in defensing combats. Firstly, the structures of wireless sensor nodes and networks were illustrated;Secondly, the analysis of existing energy consuming in the sensing layer and its calculation method were provided to build the energy conserving objective function;What’s more, the other two indicators in target tracking, including target detection probability and tracking accuracy, were combined to be regarded as the constraints of the energy conserving objective function. Fourthly, the three energy conserving approaches, containing optimizing the management scheme, prolonging the time interval between two adjacent observations, and transmitting the observations selectively, were introduced;In addition, the improved lion algorithm combined with the Logistic chaos sequence was proposed to obtain sensor management schemes. Finally, simulations had been made to prove the effectiveness of the proposed methods and algorithm. 展开更多
关键词 wireless sensor networks Target searching Target tracking Energy efficiency Lion algorithm
在线阅读 下载PDF
A consensus time synchronization protocol in wireless sensor network
8
作者 CHEN Kesong ZHANG Yu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1465-1472,共8页
Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmissio... Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmission delay and packet loss.It compensates for transmission delay and packet loss firstly,and then,estimates clock skew and clock offset in two steps.Simulation and experiment results show that the proposed protocol can keep synchronization error below 2μs in the grid network of 10 nodes or the random network of 90 nodes.Moreover,the synchronization accuracy in the proposed protocol can keep constant when the WSN works up to a month. 展开更多
关键词 time synchronization consensus algorithm transmission delay packet loss wireless sensor network(WSN).
在线阅读 下载PDF
A Survey of Secure Routing in Wireless Sensor Networks
9
作者 LI Zhi-yuan WANG Ru-chuan 《南京邮电大学学报(自然科学版)》 2010年第1期77-87,共11页
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a... We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work. 展开更多
关键词 计算机网络 网络安全 网络协议 电子邮件
在线阅读 下载PDF
Distributed localization for anchor-free sensor networks 被引量:9
10
作者 Cui Xunxue Shan Zhiguan Liu Jianjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期405-418,共14页
Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their c... Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances. 展开更多
关键词 anchor-free localization distributed algorithm position estimation sensor networks.
在线阅读 下载PDF
面向无线传感网络安全的轻量级加密算法研究 被引量:1
11
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第1期168-173,共6页
轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分... 轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分簇模型,为簇首分配相应的对称密钥;利用TCDCP算法构建WSN线性回归模型,采集经过密钥分配处理后的感知数据;引入流密钥的轻量级同态加密算法,实现对感知数据的加密、解密处理,增强无线传感网络安全性能。仿真结果表明,所提算法的加密、解密时间分别为1.01 s、1.05 s,解密成功率平均值为97.0%,RAM空间、ROM空间占用字节数分别为770 kB、800 kB,能耗为82 mJ。所提方法能够有效地保护无线传感网络数据的机密性和完整性,降低资源消耗。 展开更多
关键词 无线传感网络 轻量级加密算法 分簇模型 线性回归模型 感知数据采集
在线阅读 下载PDF
三维无线传感器网络中虚拟力引导的鲸鱼覆盖优化算法 被引量:1
12
作者 侯华 周佳明 蔡剑平 《传感器与微系统》 北大核心 2025年第1期152-156,共5页
针对如何设计适用于现实物理世界的三维覆盖优化算法并最大化覆盖率问题,本文提出了一种虚拟力引导的鲸鱼覆盖优化算法(VFWOA)。利用Halton序列初始化生成均匀分布的鲸鱼种群,增强种群多样性以提升算法跳出局部最优解的能力;采用虚拟力... 针对如何设计适用于现实物理世界的三维覆盖优化算法并最大化覆盖率问题,本文提出了一种虚拟力引导的鲸鱼覆盖优化算法(VFWOA)。利用Halton序列初始化生成均匀分布的鲸鱼种群,增强种群多样性以提升算法跳出局部最优解的能力;采用虚拟力算法引导最优个体位置更新,加快算法寻优速度;引入多样性策略,控制种群的变化,提升算法寻优能力。仿真结果表明,与改进鲸鱼优化算法(WOA)、改进麻雀搜索算法和改进人工蜂群算法相比,本文所提算法提高了节点覆盖率并改善了网络的连通性。 展开更多
关键词 无线传感器网络 覆盖优化 鲸鱼优化算法 覆盖率
在线阅读 下载PDF
基于多目标优化策略的最佳无线传感器布置 被引量:1
13
作者 安葳鹏 刘镕飞 《小型微型计算机系统》 北大核心 2025年第3期751-758,共8页
无线传感网络消除了物理电缆,降低了结构健康监测系统收集信息的难度,但通常具有较低的带宽和有限的能量.为了使结构健康监测系统获得最有效的信息和最高的网络性能,将最佳无线传感器布置问题表述为一个多目标优化问题,其中信息有效性... 无线传感网络消除了物理电缆,降低了结构健康监测系统收集信息的难度,但通常具有较低的带宽和有限的能量.为了使结构健康监测系统获得最有效的信息和最高的网络性能,将最佳无线传感器布置问题表述为一个多目标优化问题,其中信息有效性被指定为模态保证准则,网络性能通过能量效率与网络连接性相结合来衡量.针对此问题,提出了一种多种群自动学习的鲸鱼优化算法,用整数编码代替二进制编码对解进行编码;采用多种群策略搜索最优解;最后通过自动学习机制加快寻找帕累托最优解集.数值实验表明,优化准则可以在信息有效性和网络性能之间进行权衡,算法能够有效解决最佳无线传感器布置问题,并且优于常用的非支配排序遗传算法. 展开更多
关键词 无线传感网络 结构健康监测 鲸鱼优化算法 最佳传感器布置 多目标优化
在线阅读 下载PDF
基于多代理深度强化学习的战术无线网络安全路由算法研究
14
作者 谢英辉 刘亮 《传感技术学报》 北大核心 2025年第8期1482-1490,共9页
由于应用场景的特殊性,战术无线网络更易遭受干扰攻击,这破坏了数据通信,阻碍了数据包的传输。为此,提出基于多代理深度强化学习的安全路由(Multi-agent Deep Reinforcement Learning-based Secure Routing,MRSR)。MRSR路由将节点作为代... 由于应用场景的特殊性,战术无线网络更易遭受干扰攻击,这破坏了数据通信,阻碍了数据包的传输。为此,提出基于多代理深度强化学习的安全路由(Multi-agent Deep Reinforcement Learning-based Secure Routing,MRSR)。MRSR路由将节点作为代理,它们通过深度神经网络学习决策路由。将跳数、一跳时延、数据包丢失率和能量消耗信息关联到奖励函数,使得代理能够选择时延低、可靠性高的转发节点,进而克服干扰攻击。仿真结果表明,提出的MRSR路由提高了数据包传递率和能量效率。 展开更多
关键词 战术无线网络 安全路由 干扰攻击 多代理深度强化学习 奖励函数
在线阅读 下载PDF
基于TF-IDF算法的无线传感网络攻击流量检测方法研究 被引量:1
15
作者 王晨 刘鑫 《传感技术学报》 北大核心 2025年第4期744-748,共5页
无线传感网络攻击流量类型较多,攻击流量检测方法难以满足多类型的流量数据,导致检测精度较差,为此提出基于TF-IDF算法的无线传感网络攻击流量检测方法。首先划分无线传感网络流量为连续型和离散型两类,采用独热编码处理连续型流量,归... 无线传感网络攻击流量类型较多,攻击流量检测方法难以满足多类型的流量数据,导致检测精度较差,为此提出基于TF-IDF算法的无线传感网络攻击流量检测方法。首先划分无线传感网络流量为连续型和离散型两类,采用独热编码处理连续型流量,归一化处理离散型流量;然后通过TF-IDF算法提取无线传感网络流量特征,利用特征向量集训练多通道自编码器,利用TF-IDF算法计算待检测的攻击流量数据特征在无线传感网络流量内出现的频率,以此对攻击流量进行排序;最后通过Softmax分类器输出最终流量类型检测结果。仿真结果表明,所提方法的检测精确度最低值为97.05%,虚警率最高值为2.01%、测试时间平均值为20.1 s,证明所提方法能高效、精确地实现无线传感网络攻击流量检测。 展开更多
关键词 无线传感网络 攻击流量检测 TF-IDF算法 多通道自编码器
在线阅读 下载PDF
基于多策略改进的蜉蝣算法在WSN定位中的应用 被引量:1
16
作者 宋湘钰 任秀丽 《传感技术学报》 北大核心 2025年第2期348-355,共8页
针对无线传感器网络中使用到达时间差定位技术存在计算效率低和精度差的问题,提出一种将改进的蜉蝣算法(Improved Mayfly Algorithm,IMA)与Chan算法相结合的定位算法(Chan-IMA)。该算法主要利用Chan算法计算出待测节点的初始定位坐标,... 针对无线传感器网络中使用到达时间差定位技术存在计算效率低和精度差的问题,提出一种将改进的蜉蝣算法(Improved Mayfly Algorithm,IMA)与Chan算法相结合的定位算法(Chan-IMA)。该算法主要利用Chan算法计算出待测节点的初始定位坐标,以限制IMA算法的搜索区域,从而提高IMA算法的搜索效率。针对蜉蝣算法,首先,采用Tent映射和反向学习策略对种群进行初始化以增强初始种群的多样性;其次,设计了一种自适应惯性权重,用于均衡全局搜索能力与局部搜索能力;最后,提出了一种可变步长的莱维飞行策略,对全局最优位置进行扰动变异,使用贪婪算法择优保留全局最优解,从而提高算法跳出局部最优解的能力。通过仿真实验,Chan-IMA算法与Chan-ISSA、Chan-CPSO、Chan-IAGA算法相比,其定位精度分别提升了17.6%、30.7%和37.5%、收敛速度分别提升了22.5%、26.2%和31.1%。实验结果表明,所提出的算法具有更高的定位精度和更快地收敛速度。 展开更多
关键词 无线传感器网络 到达时间差 蜉蝣算法 自适应惯性权重 莱维飞行
在线阅读 下载PDF
基于加权DV-Hop算法的无线传感器物联网节点三维定位
17
作者 王显轩 刘炜 +1 位作者 陈洁萍 覃贵礼 《传感技术学报》 北大核心 2025年第6期1122-1126,共5页
为了更快、更准确地对无线传感器物联网节点展开定位,提出基于加权DV-Hop算法的无线传感器物联网节点三维定位的方法。采用DV-Hop算法计算无线传感器物联网节点每跳距离均值;利用加权因子和极大似然法对节点位置进行估算;并使用三维修... 为了更快、更准确地对无线传感器物联网节点展开定位,提出基于加权DV-Hop算法的无线传感器物联网节点三维定位的方法。采用DV-Hop算法计算无线传感器物联网节点每跳距离均值;利用加权因子和极大似然法对节点位置进行估算;并使用三维修正定位方法对估算的节点位置进行修正和优化,实现节点三维定位。实验结果表明,所提方法对于定位无线传感器物联网节点的平均定位误差低于0.25,归一化平均定位误差低于0.07,定位时间低于0.31 ms,定位的精度和效率较高,适用于无线传感器物联网节点定位。 展开更多
关键词 无线传感器 三维定位 加权DV-Hop算法 极大似然值 三维修正定位方法
在线阅读 下载PDF
混沌累积差异增强的小龙虾优化算法
18
作者 李宏宇 钱谦 +3 位作者 潘家文 张晓丽 冯勇 李英娜 《小型微型计算机系统》 北大核心 2025年第7期1606-1615,共10页
小龙虾优化算法(COA)是2023年提出的一种新型群智能优化算法,通过模拟小龙虾行为和温度调控来寻优.然而,COA存在多样性退化、探索能力不足、易陷入局部最优和寻优精度低等缺陷,为了解决这些问题,本研究提出了一种混沌累积差异增强的小... 小龙虾优化算法(COA)是2023年提出的一种新型群智能优化算法,通过模拟小龙虾行为和温度调控来寻优.然而,COA存在多样性退化、探索能力不足、易陷入局部最优和寻优精度低等缺陷,为了解决这些问题,本研究提出了一种混沌累积差异增强的小龙虾优化算法(CE-COA).首先,通过引入Piecewise混沌映射初始化种群的位置,增加种群的多元性;其次,在避暑和竞争洞穴阶段,引入精英洞穴群体以避免算法陷入局部最优,并提升其寻找潜在解的能力;然后,在觅食阶段通过累积差异进食策略,充分考虑个体与食物的维度信息差异,进一步提高算法的寻优精度.在实验分析阶段通过使用CEC2022测试集和CEC2017的部分测试函数进行验证,使用定性分析、Wilcoxon秩和检验和Friedman检验评估算法性能,并在2个工程设计问题和无线传感器网络(WSN)节点覆盖问题上进行了算法的实效性验证.实验结果表明,CE-COA算法均取得了更好的实验效果. 展开更多
关键词 小龙虾优化算法 混沌映射 累积差异 精英群体 无线传感器网络
在线阅读 下载PDF
一种无线传感器网络冗余节点定位方法
19
作者 王梦晓 刘学军 朱林 《传感技术学报》 北大核心 2025年第2期340-347,共8页
由于传统的无线传感器网络冗余节点识别方法忽略了节点的方向性,单纯依靠拓扑结构的关联规则进行节点定位,存在节点定位误差较大、节点识别精度较低的问题,提出基于TOPSIS算法的无线传感器网络冗余节点定位方法。该算法首先建立网络节... 由于传统的无线传感器网络冗余节点识别方法忽略了节点的方向性,单纯依靠拓扑结构的关联规则进行节点定位,存在节点定位误差较大、节点识别精度较低的问题,提出基于TOPSIS算法的无线传感器网络冗余节点定位方法。该算法首先建立网络节点的方向虚拟坐标,通过拓扑保留图确定所有节点在图中的坐标;其次建立无线传感器网络冗余节点判断指标体系;最后利用TOPSIS算法判断节点冗余度,确定节点在拓扑保留图中的位置,完成无线传感网络中冗余节点定位方法的设计。仿真分析表明,应用所提方法对无线传感网络中冗余节点进行识别的逼近度最高为0.98,冗余节点定位准确率为95%,真阳性率为98%,假阳性率为2%,说明所提方法对于网络冗余节点的识别精度较高,识别效果较好。 展开更多
关键词 无线传感器网络 冗余节点定位 TOPSIS算法 拓扑保留图 节点冗余度
在线阅读 下载PDF
单纯形法引导的自适应沙猫群优化算法及应用
20
作者 罗文涛 钱谦 +3 位作者 潘家文 张晓丽 冯勇 李英娜 《小型微型计算机系统》 北大核心 2025年第8期1869-1877,共9页
为了克服沙猫优化算法(SCSO)在高维优化问题上,易陷入局部最优和收敛精度差的问题,提出了一种单纯形法引导的自适应沙猫群优化算法(SASCSO).首先,采用了一种自适应围捕策略,使沙猫个体随机出现在自适应控制的算法搜索边界内,帮助算法逃... 为了克服沙猫优化算法(SCSO)在高维优化问题上,易陷入局部最优和收敛精度差的问题,提出了一种单纯形法引导的自适应沙猫群优化算法(SASCSO).首先,采用了一种自适应围捕策略,使沙猫个体随机出现在自适应控制的算法搜索边界内,帮助算法逃逸局部陷阱.其次,利用单纯形法引导较差个体构建几何搜索路径以提升算法的搜索能力.与其他对比算法相比,SASCSO在100维度的CEC2017基准函数测试集的综合优胜率为75.86%,结合非参数分析表明该算法是解决高维复杂优化问题的可行方法.此外,将SASCSO应用于三维无线传感器网络覆盖和复杂环境下无人机航径优化问题,结果显示SASCSO在两个实际问题上均提供了最优的方案,验证了SASCSO在实际优化中的适用性和优越性. 展开更多
关键词 沙猫群优化算法 自适应围捕策略 单纯形法 无线传感器网络覆盖 无人机航径优化
在线阅读 下载PDF
上一页 1 2 127 下一页 到第
使用帮助 返回顶部