Computer Science ›› 2017, Vol. 44 ›› Issue (4): 218-222.doi: 10.11896/j.issn.1002-137X.2017.04.047
Previous Articles Next Articles
XU Yin-xia, JIN Guo-xiang and TAO Yi-wei
[1] ZHAO G R,HAN X,DU W J,et al.Fusion estimator with stochastic sensor gain degradation for uncertain systems[J].Control and Decision,2016,31(8):1413-1418.(in Chinese) 赵国荣,韩旭,杜闻捷,等.具有传感器增益退化的不确定系统融合估计器[J].控制与决策,2016,31(8):1413-1418. [2] QIN N N ,YU Y H,WU D E.Autonomous Deployment Algorithm in Mobile Heterogeneous Networks[J].JEIT,2016,38(7):1838-1842.(in Chinese) 秦宁宁,余颖华,吴德恩.移动混合传感网中节点自主部署算法[J].电子与信息学报,2016,38(7):1838-1842. [3] DONG G L,RYU K S,BASHIR M,et al.Discovering medical knowledge using association rule mining in young adults with acute myocardial infarction[J].Journal of Medical Systems,2013,37(2):1-10. [4] KHALILI A,SAMI A.SysDetect:a systematic approach to cri-tical state determination for industrial intrusion detection systems using Apriori algorithm[J].Journal of Process Control,2015,27(6):154-160. [5] KASHI S S,SHARIFI M.Coverage rate calculation in wireless sensor networks[J].Computing,2012,94(11):833-856. [6] WANG J,LU J Z,ZENG X F.Data aggregation scheme forwireless sensor network to timely determine compromised nodes[J].Journal of Computer Applications,2016,36(9):2432-2437.(in Chinese) 王洁,卢建朱,曾小飞.可及时确定受攻击节点的无线传感器网络数据聚合方案[J].计算机应用,2016,36(9):2432-2437. [7] BOUDIA O R M,SENOUCI S M,FEHAM M.A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography[J].Ad Hoc Networks,2015,32(C):98-113. [8] CHEN S,WANG G,JIA W.Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph [J].Future Generation Computer Systems,2016,5(8):391-400. [9] SUN C,YANG C X,FAN S,et al.Energy Efficient Distributed Clustering Consensus Filtering Algorithm for Wireless Sensor Networks[J].Information and Control,2015,4(3):379-384.(in Chinese) 孙超,杨春曦,范莎,等.能量高效的无线传感器网络分布式分簇一致性滤波算法[J].信息与控制,2015,4(3):379-384. [10] CAO Y L,WANG X M,HE Z B.Optimal Security Strategy for Malware Propagation in Mobile Wireless Sensor Networks[J].Acta Electronica Sinica,2016,44(8):1851-1857.(in Chinese) 曹玉林,王小明,何早波.移动无线传感网中恶意软件传播的最优安全策略[J].电子学报,2016,44(8):1851-1857. [11] MAHBOUBI H.Distributed deployment algorithms for efficient coverage in a network of mobile sensors with nonidentical sen-sing Capabilities[J].IEEE Transactions on Vehicular Technology,2014,63(8):3998-4016. [12] FANG N P.Cross-Layer Energy Balanced Routing Protocol in Wireless Sensor Networks[J].Journal of Chongqing University of Technology(Natural Science),2016,0(10):122-128.(in Chinese) 房能沛.无线传感器网络跨层能耗均衡路由协议[J].重庆理工大学学报(自然科学),2016,0(10):122-128. |
No related articles found! |
|