Computer Science ›› 2019, Vol. 46 ›› Issue (5): 67-72.doi: 10.11896/j.issn.1002-137X.2019.05.010
Previous Articles Next Articles
JIANG Yi-bo, HE Cheng-long, MEI Jia-dong, WANG Nian-hua
CLC Number:
[1]LIU X.A Survey on Wireless Camera Sensor Networks.Lecture Notes in Electrical Engineering,2014,269:1085-1094. [2]ZHOU W,SHI W R,ZHANG H D,et al.Study on distributed target tracking in wireless sensor networks.Chinese Journal of Scientific Instrument,2013,34(7):1485-1491.(in Chinese)周伟,石为人,张洪德,等.无线传感器网络的分布式目标跟踪研究.仪器仪表学报,2013,34(7):1485-1491. [3]ZHANG J G,LI W B,YIN Z X,et al.Forest fire detection system based on wireless sensor network∥Conference on Industrial Electronics and Applications.New York:IEEE Press,2009:520-523. [4]ZHAO X M,WANG W L,LI Y F,et al.Research on Dynamic Response of Temperature Sensor during the Test of Flame’s Temperature Flied.Chinese Journal of Sensors and Actuators,2016,29(3):368-372.(in Chinese)赵学敏,王文廉,李岩峰,等.火焰温度场测试中的传感器动态响应研究.传感技术学报,2016,29(3):368-372. [5]XIONG Z L,HAN L S,XU X B,et al.Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory.Computer Science,2017,44(S1):326-332.(in Chinese)熊自立,韩兰胜,徐行波,等.基于博弈的无线传感器网络入侵检测模型.计算机科学,2017,44(S1):326-332. [6]ÖZDAČR.The solution of the k-coverage problem in Wireless Sensor Networks∥Proceedings of Signal Processing and Communications Applications Conference.New York:IEEE,2016:873-876. [7]ADLAKHA S,SRIVASTAVA M.Critical density thresholdsfor coverage in wireless sensor networks∥Wireless Communications &Networking.New York:IEEE Press,2003:1615-1620. [8]KUMAR S,LAI T H,BALOGH J.On k-coverage in a mostly sleeping sensor network∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.New York:ACM,2004:144-158. [9]YU J,REN S,WAN S,et al.A Stochastic-Coverage Scheduling Algorithm in Wireless Sensor Networks.International Journal of Distributed Sensor Networks,2014,2012:178-193. [10]CHAKRABARTY K,IYENGAR S S,QI H,et al.Grid Covera-ge for Surveillance and Target Location in Distributed Sensor Networks.IEEE Transactions on Computers,2003,51(12):1448-1453. [11]HEFEEDA M,BAGHERI M.Randomized k-Coverage Algo-rithms For Dense Sensor Networks∥IEEE Infocom-ieee International Conference on Computer Communications.New York:IEEE Press,2007:2376-2380. [12]SLIJEPCEVIC S,Potkonjak M.Power efficient organization of wireless sensor networks∥IEEE International Conference on Communications.New York:IEEE Press,2001:472-476. [13]AMMARI H M,DAS S K.Centralized and Clustered k-Cove-rage Protocols for Wireless Sensor Networks.IEEE Transactions on Computers,2012,61(1):118-133. [14]YU J,WAN S,CHENG X,et al.Coverage Contribution Area based k-Coverage for Wireless Sensor Networks.IEEE Transactions on Vehicular Technology,2017,66(9):8510-8523. |
[1] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[2] | YANG Tao-yu, XU Yuan-yuan, TAN Zeng-jie. Tile Partition Optimized Omnidirectional Video Coding for 6G Network [J]. Computer Science, 2022, 49(6): 66-72. |
[3] | HUANG Xin-quan, LIU Ai-jun, LIANG Xiao-hu, WANG Heng. Load-balanced Geographic Routing Protocol in Aerial Sensor Network [J]. Computer Science, 2022, 49(2): 342-352. |
[4] | TIAN Ye, CHEN Hong-wei, WANG Fa-sheng, CHEN Xing-wen. Overview of SLAM Algorithms for Mobile Robots [J]. Computer Science, 2021, 48(9): 223-234. |
[5] | LIU Liang, PU Hao-yang. Real-time LSTM-based Multi-dimensional Features Gesture Recognition [J]. Computer Science, 2021, 48(8): 328-333. |
[6] | WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316. |
[7] | HONG Chang-jian, GAO Yang, ZHANG Fan, ZHANG Lei. Reliable Transmission Strategy for Underwater Wireless Sensor Networks [J]. Computer Science, 2021, 48(6A): 410-413. |
[8] | ZHONG Yue, FANG Hu-sheng, ZHANG Guo-yu, WANG Zhao, ZHU Jing-wei. Method of CNN Flag Movement Recognition Based on 9-axis Attitude Sensor [J]. Computer Science, 2021, 48(6): 153-158. |
[9] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[10] | RAN Meng-yuan, LIU Li, LI Yan-de, WANG Shan-shan. Deaf Sign Language Recognition Based on Inertial Sensor Fusion Control Algorithm [J]. Computer Science, 2021, 48(2): 231-237. |
[11] | JIAO Dong-lai, WANG Hao-xiang, LYU Hai-yang, XU Ke. Road Surface Object Detection from Mobile Phone Based Sensor Trajectories [J]. Computer Science, 2021, 48(11A): 283-289. |
[12] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[13] | ZHANG Jun, WANG Yang, LI Kun-hao, LI Chang, ZHAO Chuan-xin. Multi-source Sensor Body Area Network Data Fusion Model Based on Manifold Learning [J]. Computer Science, 2020, 47(8): 323-328. |
[14] | QI Wei, YU Hui-qun, FAN Gui-sheng, CHEN Liang. WSN Coverage Optimization Based on Adaptive Particle Swarm Optimization [J]. Computer Science, 2020, 47(7): 243-249. |
[15] | GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313. |
|