期刊文献+

一种基于虚拟力的智能目标穿越WSNs区域算法

A path-finding algorithm of intelligent target traversing WSNs region based on virtual forces
下载PDF
导出
摘要 提出一种基于虚拟力的智能目标穿越无线传感器随机布置区域的算法,算法将区域中的每只传感器看做一个场源,目标行进中受到场源产生的2个虚拟力,在虚拟力的作用下,目标能改变前进方向智能地朝终点行进。通过仿真实验看出:该算法具有可行性和高效性。 A path-finding algorithm of intelligent target traversing wireless sensor networks(WSNs) region based on virtual forces is presented. Many sensors are deployed randomly in the region and each sensor is taken as a power source that can generate two virtual forces to the target when traversing. Under the forces, the target changes its moving direction towards destination intelligently. The simulation experiment shows that the algorithm is feasible and efficient.
出处 《传感器与微系统》 CSCD 北大核心 2010年第11期132-134,共3页 Transducer and Microsystem Technologies
关键词 无线传感器网络 智能目标 虚拟力 穿越 wireless sensor networks(WSNs) intelligent target virtual forces traversing
  • 相关文献

参考文献6

  • 1Aurenhanmler F. Voronoi diagrams--A survey of a fundamental georuetric data structure [ J ]. ACM Computing Surveys, 1991,2?,(3) : 345 -405.
  • 2谭浪,任庆生.智能目标穿越传感区域的改进算法[J].计算机仿真,2007,24(8):141-144. 被引量:1
  • 3Clouqueur T, Ramanathan P, Saluja K K, Analysis of exposure of target activities in a sensor network with obstacles [ C ]//SenSys, 2003.
  • 4张文哲,李明禄,伍民友.一种基于局部Voronoi图的目标穿越算法[J].软件学报,2007,18(5):1246-1253. 被引量:12
  • 5Zhang Wenzhe, Li Minglu. Anti-detection:How does a target traverse a sensing field. [ C ]//ICESS' 05,2005:400 -406.
  • 6Meguerdichian S, Koushanfar F, Potkonjak M, et al. Coverage problems in wireless Ad Hoc sensor networks[ C ]//Sengupta B, Ed Proc of the IEEE INFOCOM. Anchorage: IEEE Press,2001 : 1380 --1387.

二级参考文献21

  • 1Mainwaring A,Polastre J,Szewczyk R,Culler D,Anderson J.Wireless sensor networks for habitat monitoring.In:Raghavendra CS,Sivalingam KM,eds.Proc.of the ACM Int'l Workshop on Wireless Sensor Networks and Applications (WSNA).Atlanta:ACM Press,2002.88-97.
  • 2Wood AD,Stankovic JA.Denial of service in sensor networks.IEEE Trans.on Computers,2002,35(10):54-62.
  • 3Phipatanasuphorn V,Ramanathan P.Vulnerability of sensor networks to unauthorized traversal and monitoring.IEEE Trans.on Computers,2004,53(3):364-369.
  • 4Veltri G,Huang Q,Qu G,Potkonjak M.Minimal and maximal exposure path algorithms for wireless embedded sensor networks.In:Akyildiz IF,Estion D,eds.Proc.of the ACM Int'l Conf.on Embedded Networked Sensor Systems (SenSys).New York:ACM Press,2003.40-50.
  • 5Li XY,Wan PJ,Frieder O.Coverage in wireless ad hoc sensor networks.IEEE Trans.on Computers,2003,52(6):753-763.
  • 6Megerian S,Koushanfar F,Potkonjak M,Srivastava M.Worst and best-case coverage in sensor networks.IEEE Trans.on Mobile Computing,2005,4(1):84-92.
  • 7Meguerdichian S,Koushanfar F,Potkonjak M,Srivastava M.Coverage problems in wireless ad-hoc sensor networks.In:Sengupta B,ed.Proc.of the IEEE INFOCOM.Anchorage:IEEE Press,2001.1380-1387.
  • 8Meguerdichian S,Koushanfar F,Qu G,Potkonjak M.Exposure in wireless ad-hoc sensor networks.In:Proc.of the ACM MobiCom.Rome:ACM Press,2001.139-150.
  • 9Goldenberg DK,Krishnamurthy A,Maness WC,Yang YR,Young A,Morse AS,Savvides A,Anderson BDO.Network localization in partially localizable networks.In:Proc.of the Infocom.Miami:IEEE Press,2005.313-326.
  • 10Aurenhammer F.Voronoi diagrams-A survey of a fundamental geometric data structure.ACM Computing Surveys,1991,23(3):345-405.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部