Computer Science ›› 2021, Vol. 48 ›› Issue (6): 268-275.doi: 10.11896/jsjkx.200500130
• Computer Network • Previous Articles Next Articles
SUN Yi-fan1, MI Zhi-chao1, WANG Hai1, ZHAO Ning2
CLC Number:
[1]WANG Z X.Cooperative operations between manned helicopters and unmanned aerial vehicles of the us military [J].Airborne Missiles,2014,44(7):61-66. [2]DONG Q J,ZHAO H T,ZHENG C T,et al.Typical scenario construction and routing protocol performance analysis of uav Ad-hoc network [J].Communications Technology,2019,52(9):2149-2155. [3]LADAS A,PAVLATOS N,WEERASINGHE N,et al.Mul-tipath routing approach to enhance resiliency and scalability in ad-hoc networks[C]//2016 IEEE International Conference on Communications (ICC).IEEE,2016:1-6. [4]VOORHAEN M,BLONDIA C.Analyzing the impact of neighbor sensing on the performance of the OLSR protocol[C]//International Symposium on Modeling & Optimizationin Mobile.IEEE,2006:1-6. [5]HELBIG M,HEIN M A,SCHWARZ U,et al.Investigation of OLSR Behavior for Different Hello Packets Intervals in a MANET Testbed[C]//IEEE International Conference on Advanced Information Networking & Applications.IEEE Computer Society,2013. [6]WANG Y B.Design and implementation of adaptive OLSR routing algorithm for wireless ad-hoc networks [D].Chengdu:University of Electronic Science and Technology of China,2015. [7]LARSEN E,FLATHAGE J,PHAM V C,et al.iOLSR:OLSR for WSN susing dynamic allya daptiveintervals[C]//Proceeding of the 5th International Conferenceon Sensor Technologiesand Applications.2011:20-23. [8]LIANG Q,THOMAS K.Adaptive MANET Routing:A Case Study[C]//International Conference on Ad-hoc Networks & Wireless.Berlin,Heidelberg:Springer,2008. [9]HARRAG N,REFOUFI A,HARRAG A.Neighbor discoveryusing novel DE-based adaptive hello messaging scheme improving OLSR routing protocolperformances[C]//International Conference on Systems & Control.2017. [10]BARKI O,GUENNOUN Z,ADDAIM A.Improving the selection of MPRs in OLSR protocol:a survey of methods and techniques[J].International Journal of Electrical & Computer Engineering,2020,10(1):288. [11]SUN Z,WANG K,WANG Y G.Multi-hop number and relay node optimization in clustering routing algorithm[J].Small Microcomputer System,2019,40(6):165-171. [12]ALAMSYAH A,PURNAMA I K E,SETIJADI E,et al.MPR selection to the OLSR quality of service in MANET using minmax algorithm[J].International Journal of Electrical and Computer Engineering,2019,9(1):417. [13]CHEN L.Research and implementation of OLSR routing protocol based on Linux system [D].Chongqing:Chongqing University of Posts and Telecommunications,2017. [14]GAO S Y,QIU J,ZHANG Y,et al.Scheduling based neighbor node detection algorithm for wireless Ad-hoc networks[J].Journal of Scientific Instrumentation,2014(5):221-226. [15]HARRAG N,REFOUFI A,HARRAG A.Neighbor discoveryusing novel DE-based adaptive hello messaging scheme improving OLSR routing protocol performances[C]//2017 6th International Conference on Systems and Control (ICSC).2017. [16]WANG C J.Research on energy-saving routing protocol in mobile self-organizing network [D].Shenyang:Liaoning University,2017. [17]JABBAR W A,ISMAIL M,NORDIN R.Performance Evaluation of MBA-OLSR Routing Protocol for MANETs[J].Journal of Computer Networks & Communications,2014,2014:1-10. [18]CHEN L.Research and improvement of OLSR routing protocol in wireless mesh network[D].Shenyang:Shenyang Jianzhu University,2015. [19]AI L.Distributed Unmanned Aerial Vehicles Formation Control with Nonlinear Dynamics[J].Journal of Chongqing University of Technology (Natural Science),2020,34(4):170-175. [20]YU G F,WANG Z H,LI Y,et al.Channel coding in the data link of unmanned aerial vehicle[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2014,26(6):845-849. |
[1] | CHEN Bo-chen, TANG Wen-bing, HUANG Hong-yun, DING Zuo-hua. Pop-up Obstacles Avoidance for UAV Formation Based on Improved Artificial Potential Field [J]. Computer Science, 2022, 49(6A): 686-693. |
[2] | ZHAO Geng, SONG Xin-yu, MA Ying-jie. Secure Data Link of Unmanned Aerial Vehicle Based on Chaotic Sub-carrier Modulation [J]. Computer Science, 2022, 49(3): 322-328. |
[3] | HUANG Xin-quan, LIU Ai-jun, LIANG Xiao-hu, WANG Heng. Load-balanced Geographic Routing Protocol in Aerial Sensor Network [J]. Computer Science, 2022, 49(2): 342-352. |
[4] | WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323. |
[5] | WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532. |
[6] | YANG Zhang-lin, XIE Jun, ZHANG Geng-qiang. Review of Directional Routing Protocols for Flying Ad-Hoc Networks Based on Directional Antennas [J]. Computer Science, 2021, 48(11): 334-344. |
[7] | ZHAO Xiao-wei, ZHU Xiao-jun, HAN Zhou-qing. Hover Location Selection and Flight Path Optimization for UAV for Localization Applications [J]. Computer Science, 2021, 48(11): 345-355. |
[8] | YOU Wen-jing, DONG Chao, WU Qi-hui. Survey of Layered Architecture in Large-scale FANETs [J]. Computer Science, 2020, 47(9): 226-231. |
[9] | FENG Jun, KONG Jian-shou and WANG Gang. Clustering Single-hop Routing Protocol Based on Energy Supply for Wireless Sensor Network [J]. Computer Science, 2020, 47(6A): 278-282. |
[10] | ZHAO Xue-yuan, ZHOU Shao-lei, WANG Shuai-lei and YAN Shi. Formation Containment Control of Multi-UAV System Under Switching Topology [J]. Computer Science, 2020, 47(6A): 577-582. |
[11] | ZHAO Min,DAI Feng-zhi. Anti-disturbance Control Algorithm of UAV Based on Pneumatic Parameter Regulation [J]. Computer Science, 2020, 47(3): 237-241. |
[12] | HUANG De-ling,YAN Yu-song,PENG Da-qin. Geographic Routing Protocol Based on Prediction for Urban Vehicular Ad Hoc Networks [J]. Computer Science, 2019, 46(7): 74-80. |
[13] | LIU Xiao-dong, WEI Hai-ping, CAO Yu. Modeling and Stability Analysis for SIRS Model with Network Topology Changes [J]. Computer Science, 2019, 46(6A): 375-379. |
[14] | LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347. |
[15] | SHAO Jin-da, YANG Shuai, CHENG Lin. UAV Image Matching Algorithm Based on Improved SIFT Algorithm and Two-stage Feature Matching [J]. Computer Science, 2019, 46(6): 316-321. |
|