Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 339-344.doi: 10.11896/jsjkx.200100109
• Computer Network • Previous Articles Next Articles
HUANG Ting-ting, FENG Feng
CLC Number:
[1] ZOU P H.Research on wireless sensor network security and data fusion technology [D].Beijing:Beijing Jiaotong University,2018. [2] LIU X Z,ZHU R B,ANJUM A,et al.Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks[J].Future Generation Computer Systems,2020,104:1-14. [3] QIU L D,LIU T J,LIN N,et al.Data fusion algorithm of wireless sensor network based on deep learning model [J].Journal of Sensor Technology,2014,27(12):1704-1709. [4] ZHANG F,ZHENG H Y,DING Q L.Data fusion model of wireless sensor networks based on trust and weight [J].Computer Science,2017,44(5):37-41,60. [5] SU F J,DU K Y.An energy-saving opportunity routing algorithm based on trust in WSNs [J].Computer Science,2020,47(2):300-305. [6] LIANG S,DENG X Y,JIANG W.Optimal data fusion based on information quality function[J].Applied Intelligence,2019,49(11). [7] YE Z W,WEN T,LIU Z Y,et al.Wsns secure data fusion algorithm based on trust model [J].Journal of Northeastern University (Natural Science Edition),2019,40(6):789-794. [8] GAO B B,HU G G,GAO S S,et al.Multi-Sensor Optimal Data Fusion Based on the Adaptive Fading Unscented Kalman Filter[J].Sensors,2018,18(2). [9] MASCHI LUIS F C,PINTO ALEX S R,MENEGUETTE R I,et al.Data Summarization in the Node by Parameters (DSNP): Local Data Fusion in an IoT Environment[J].Sensors,2018,18(3). [10] SUN G L,ZHANG Z Y,ZHENG B W,et al.Multi-Sensor Data Fusion Algorithm Based on Trust Degree and Improved Gene-tics[J].Sensors,2019,19(9). [11] DAS S,BARANI S,WAGH S,et al.Extending lifetime of wireless sensor networks using multi-sensor data fusion[J].Sādhanā,2017,4:1083-1090. [12] GAO Y Q.Research on key technologies of data aggregation in the Internet of things environment [D].Beijing:Beijing University of Posts and Telecommunications,2019. [13] YIN N.Research on Trust Security Related Technologies inWireless Sensor Networks [D].Nanjing:Nanjing University of Posts and Telecommunications,2018. [14] ALPER AKCA M,ÖNDER E.Multiple Model Kalman and Particle Filters and Applications:A Survey[J].IFAC-Papers OnLine,2019,52(3):73-78. [15] YANG F,ZHENG L T,WANG J Q,et al.Double-layer unscentedkalman filter [J].Journal of Automatic Chemistry,2019,45(7):1386-1391. [16] CUI L L,WANG X,XU Y G,et al.A novel Switching Unscented Kalman Filter method for remaining useful life prediction of rolling bearing[J].Measurement,2019,135:678-684. [17] WANG G Q,ZHANG Y G,WANG X D.Iterated maximum correntropy unscented Kalman filters for non-Gaussian systems[J].Signal Processing,2019,163:87-94. [18] WANG Y J,CHEN Z H.A framework for state-of-charge and remaining discharge time prediction using unscented particle filter[J].Applied Energy,2020,260. [19] LI X M,ZHAO C S,ZHANG L K.Adaptive square root untracked particle filtering algorithm and its application [J].Bulletin of Surveying and Mapping,2018(12):6-9,14. [20] ZHANG K,TAO J F,HE S S.Improved particle filtering algorithm based on ukf and optimal combination strategy[J].Computer Engineering and Science,2017,39(8):1483-1488. |
[1] | WANG Bing-zhou, WANG Hui-bin, SHEN Jie, ZHANG Li-li. FastSLAM Algorithm Based on Adaptive Fading Unscented Kalman Filter [J]. Computer Science, 2020, 47(9): 213-218. |
[2] | QU Guang-qiang, SUN Bin. Study on Trustworthy Backtracking Mechanism of Experimental Teaching Fund Based on Blockchain [J]. Computer Science, 2019, 46(11A): 553-556. |
[3] | LIU Jian-sheng, YOU Zhen-xu, YUE Guang-xue, WANG Jie-tai, LIU Jian-hua. Research Progress of Network Trust [J]. Computer Science, 2018, 45(11): 13-28. |
[4] | LIU Kai-yang. AP-I:An Index to Quickly Answer Predictive Queries for Moving Objects [J]. Computer Science, 2017, 44(Z6): 314-318. |
[5] | CHEN Xiao-qing, LU Hui-juan, GUAN Wei and ZHENG Wen-bin. Wavelet Kernel Extreme Learning Machine Algorithm Based on Detecting Particle Swarm Optimization [J]. Computer Science, 2016, 43(Z6): 77-80. |
[6] | XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong. Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model [J]. Computer Science, 2016, 43(9): 169-174. |
[7] | SHU Jian and LIANG Chang-yong. Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment [J]. Computer Science, 2016, 43(8): 105-109. |
[8] | SONG Yuan-zhang. P2P Botnet Detection Based on Permutation Entropy and Multi-sensor Data Fusion on Decision Level [J]. Computer Science, 2016, 43(7): 141-146. |
[9] | CHEN Hao and HUANG Hai-ping. Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes [J]. Computer Science, 2015, 42(Z6): 395-398. |
[10] | MENG Fan-xi,QU Hong and HOU Meng-shu. Method of Short-term Load Forecasting Based on GA and SVM [J]. Computer Science, 2014, 41(Z6): 91-93. |
[11] | ZHANG Kang-jie and WANG Qi-zhi. Application of Unscented Kalman Filter in Rotary Table Tennis Trajectory Prediction [J]. Computer Science, 2014, 41(1): 83-87. |
[12] | LIU Kai-yang. Improved Construction Algorithm for K-Reach Index [J]. Computer Science, 2013, 40(Z6): 299-301. |
[13] | LI Jun,XUE Wei and GAN Xu-yang. Improved Trust Mechanism Based on EigenRep Trust Model [J]. Computer Science, 2013, 40(7): 113-115. |
[14] | SUN Tao,ZHAO Guo-sheng and WANG Bin. Trust Optimization Search p2p Node Localization Algorithm [J]. Computer Science, 2013, 40(7): 71-73. |
[15] | . Trust Measuring Model Based on Social Factors of Users and their Behavior [J]. Computer Science, 2013, 40(1): 127-131. |
|