期刊文献+
共找到1,926篇文章
< 1 2 97 >
每页显示 20 50 100
Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT 被引量:6
1
作者 Wugedele Bao Celimuge Wu +3 位作者 Siri Guleng Jiefang Zhang Kok-Lim Alvin Yau Yusheng Ji 《China Communications》 SCIE CSCD 2021年第6期39-52,共14页
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ... In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning. 展开更多
关键词 vehicular IoT federated learning client selection networking scheme
下载PDF
SEMANTIC NETWORK PRESENTATION OF MECHANICAL MOTION SCHEME AND ITS MECHANISM TYPES SELECTION METHOD 被引量:2
2
作者 Ye Zhigang Zou Huijun +1 位作者 Zhang Qing Tian Yongli School of Mechanical Engineering,Shanghai Jiaotong University,Shanghai 200030, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第2期253-256,共4页
The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mecha... The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mechanism level and relationships among them. Computeraided motion cycle chart exploration can be realized by the representation and revision of timecoordination of mechanism actions and their effect on the design scheme. The uncertain reasoningtechnology based on semantic network is applied in the mechanism types selection of the needledriving mechanism of industrial sewing mechanism, and the application indicated it is correct,useful and advance. 展开更多
关键词 Semantic network scheme design Closeness degree Motion cycle chart Mechanical motion scheme
下载PDF
CONTROL SCHEMES FOR CMAC NEURAL NETWORK-BASED VISUAL SERVOING 被引量:1
3
作者 Wang HuamingXi WenmingZhu JianyingDepartment of Mechanical andElectrical Engineering,Nanjing University of Aeronauticsand Astronautics,Nanjing 210016, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2003年第3期256-259,共4页
In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of im... In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of image Jacobian, CMAC (cerebellar model articulation controller) neural network is inserted into visual servo control loop to implement the nonlinear mapping. Two control schemes are used. Simulation results on two schemes are provided, which show a better tracking precision and stability can be achieved using scheme 2. 展开更多
关键词 CMAC Neural network Control scheme Visual servoing
下载PDF
A Transductive Scheme Based Inference Techniques for Network Forensic Analysis 被引量:1
4
作者 TIAN Zhihong JIANG Wei LI Yang 《China Communications》 SCIE CSCD 2015年第2期167-176,共10页
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th... Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert. 展开更多
关键词 network forensics transductive scheme security digital evidence
下载PDF
Neural Network Based Multi-level Fuzzy Evaluation Model for Mechanical Kinematic Scheme
5
作者 BO Ruifeng,LI Ruiqin (Department of Mechanical Engineering,North University of China,Taiyuan 030051,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期301-306,共6页
To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure ... To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure of evaluation model is constructed according to evaluation indicator system. Then evaluation samples are generated and provided to train this model. Thus it can reflect the relation between attributive value and evaluation result,as well as the weight of evaluation indicator. Once evaluation indicators of each candidate are fuzzily quantified and fed into the trained network model,the corresponding evaluation result is outputted and the best alternative can be selected. Under this model,expert knowledge can be effectively acquired and expressed,and the quantificational evaluation can be implemented for kinematic scheme with multi-level evaluation indicator system. Several key problems on this model are discussed and an illustration has demonstrated that this model is feasible and can be regarded as a new idea for solving kinematic scheme evaluation. 展开更多
关键词 NEURAL network mechanical KINEMATIC scheme MULTI-LEVEL evaluation model FUZZY
下载PDF
Defending Against Link Failure in Virtual Network Embedding Using a Hybrid Scheme 被引量:3
6
作者 Jianjian Ai Hongchang Chen +1 位作者 Zehua Guo Guozhen Cheng 《China Communications》 SCIE CSCD 2019年第1期129-138,共10页
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data l... Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data loss and are helpless to such attacks like data tampering.To offer high security level,in this paper,we first propose a multipath and decision-making(MD) scheme which applies multipath simultaneously delivery and decision-making for protecting the virtual network.Considering different security requirement for virtual link,we devise a hybrid scheme to protect the virtual links.For the critical links,MD scheme is adopted.For the other links,we adopt the Shared Backup Scheme.Our simulation results indicate the proposed scheme can significantly increase the security level of the critical link high in the loss of less acceptance ratio. 展开更多
关键词 network VIRTUALIZATION VIRTUAL LINK security MULTIPATH and DECISION-MAKING hybrid scheme
下载PDF
Development of Virtual Reference Station in Kinematic Schemes of Geodetic GPS Network Using the Method of Maximum Informative Zone
7
作者 Arif Shafayat Mehdiyev Ramiz Ahmed Eminov Hikmat Hamid Asadov 《Positioning》 2013年第4期267-270,共4页
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s... The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given. 展开更多
关键词 GPS Receiver Virtual Reference STATION KINEMATIC schemeS POSITIONING GEODETIC network
下载PDF
Performance Analysis of an Enhanced Load Balancing Scheme for Wireless Sensor Networks
8
作者 Adeniran Oluwaranti Dauda Ayanda 《Wireless Sensor Network》 2011年第8期275-282,共8页
Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, rou... Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into protocols for WSNs is very important. Hence, we propose an improved scalable clustering-based load balancing scheme (SCLB) in this paper. In SCLB scheme, scalability is achieved by dividing the network into overlapping multihop clusters each with its own cluster head node. Simulation results show that the proposed scheme achieves longer network lifetime with desirable reliability at the initial state compare with the existing multihop load balancing approach. 展开更多
关键词 Wireless Sensor networks Energy CONSUMPTION SCALABLE Clustering-Based LOAD Balancing scheme Reliability
下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
9
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks Ad HOC security
下载PDF
A Dual-Channel Secure Transmission Scheme for Internet-Based Networked Control Systems
10
作者 田德振 戴亚平 +1 位作者 胡敬炉 平泽宏太郎 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期183-190,共8页
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc... Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%. 展开更多
关键词 Internet-based networked control system (INCS) networked control protocol(NCP) dual-channel secure transmission scheme(DCSTS)
下载PDF
Two-Phase Bidirectional Dual-Relay Selection Strategy for Wireless Relay Networks 被引量:1
11
作者 Samer Alabed Issam Maaz Mohammad Al-Rabayah 《Computers, Materials & Continua》 SCIE EI 2021年第10期539-553,共15页
In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes ... In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER,based on the suggested algorithm which checks if the selected relays using the maxmin criterion are the best ones.In the second step,the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals,leading to a significant improvement in the achievable coding and diversity gain.To further improve the overall system performance,the selected relay-nodes apply also a digital network coding scheme.Furthermore,this paper discusses the analytical approximation of the BER performance of the proposed strategy,where we prove that the analytical results match almost perfectly the simulated ones.Finally,our simulation results show that the proposed strategy outperforms the current state-of-the-art ones. 展开更多
关键词 Two-way wireless relay networks cooperative diversity techniques distributed space-time coding relay selection strategies network coding schemes
下载PDF
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:2
12
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 ATTRIBUTE-BASED re-encryption scheme standard model network storage
下载PDF
Protection Strategies against Cascading Failure for Power Systems of Ring Network 被引量:1
13
作者 Arun Kumar Hnin Yu Shwe Peter Han Joo Chong 《Communications and Network》 2016年第2期67-78,共12页
Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be model... Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined. 展开更多
关键词 Electric Power Grid Cascading Failure Protection schemes networkS
下载PDF
A Beamforming Technique Using Rotman Lens Antenna for Wireless Relay Networks
14
作者 Samer Alabed Mohammad Al-Rabayah Wael Hosny Fouad Aly 《Computers, Materials & Continua》 SCIE EI 2022年第12期5641-5653,共13页
Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports... Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations. 展开更多
关键词 Performance analysis smart antenna Rotman lens antenna multiantenna systems wireless relay networks cooperative diversity schemes digital network coding relay selection schemes
下载PDF
A Comprehensive Review of Protection Schemes for Distributed Generation 被引量:1
15
作者 Umair Shahzad Sohrab Asgarpoor 《Energy and Power Engineering》 2017年第8期430-463,共34页
Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new tech... Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new technology comes new challenges, the introduction of DG into the conventional power system brings various challenges;one of the major challenges is system protection under DG sources. These sources pose a significant challenge due to bidirectional flows from DGs as well as lower fault current contribution from inverter interfaced DGs. This paper reviews existing protection schemes that have been suggested for active distribution networks. Most of these protection strategies apply only to smaller distribution systems implying that they may need to be extended to larger systems with a much higher penetration of distributed generation. In the end, a potential protection scheme has also been recommended as a future work. 展开更多
关键词 Distributed GENERATION (DG) Energy PROTECTION schemeS ACTIVE Distribution networks
下载PDF
Synchronization of impulsively coupled complex networks
16
作者 孙文 陈忠 陈士华 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第5期126-132,共7页
We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is... We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is proposed for complex dynamical networks to achieve synchronization.The proposed scheme not only takes into account the influence of all nodes to network synchronization,which depends on the weight of each node in the network,but also provides us with a flexible method to select the synchronized state of the network.In addition,it is unnecessary for the impulsive coupling matrix to be symmetrical.Finally,the proposed control scheme is applied to a chaotic Lorenz network and Chua's circuit network.Numerical simulations are used to illustrate the validity of this control scheme. 展开更多
关键词 complex network impulsive control scheme SYNCHRONIZATION
下载PDF
Determination of Effective Load Shedding Schemes in Electric Power Plants 被引量:1
17
作者 Godwin Effiong Priye Kenneth Ainah Jackson Karniliyus 《Energy and Power Engineering》 2020年第10期555-567,共13页
The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the syste... The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the system. The study analyzed load shedding scheme through the use of empirical measurement tools and load-flow simulation techniques. It was geared towards determining effective load shedding strategies to reduce unnecessary overload in order to achieve dynamic stability of the electric power network in the Export Free Trade Zone, Calabar, Nigeria. From the tests and the measurements taken, it was observed that the real and reactive powers from the generator and the mechanical power from the turbine engine were stable when the load shedding controller was switched on, as compared to when it was off. The engine speed, the bus-bar frequency and the output voltage of the generator stabilized within a shorter time (about 8 seconds) when the controller was switched on than when it was on the off condition. Also, there were noticeable fluctuations in the speed of the remaining two generators. It became stable at about 12 seconds after the loss. The variations were 0.3 per cent of the nominal speed value. The excitation voltage fluctuated from 1.2 (pu) to 4.5 (pu) when the bus voltage dipped as a result of additional load. It then came down and stabilized at 1.8 (pu) after few swings. This confirmed that the stability of power system is much enhanced when load shedding controllers are effectively configured on the network. 展开更多
关键词 Power System Transient Stability Load Shedding scheme Electric Power network
下载PDF
WORST SUBCARRIER AVOIDING WATER-FILLING SUBCARRIER ALLOCATION SCHEME FOR OFDM-BASED CRN 被引量:3
18
作者 Zhang Jianwu Chi Jingxiu Xu Xiaorong 《Journal of Electronics(China)》 2012年第3期204-210,共7页
Efficient and reliable subcarrier power joint allocation is served as a promising problem in cognitive OFDM-based Cognitive Radio Networks (CRN). This paper focuses on optimal subcarrier allocation for OFDM-based CRN.... Efficient and reliable subcarrier power joint allocation is served as a promising problem in cognitive OFDM-based Cognitive Radio Networks (CRN). This paper focuses on optimal subcarrier allocation for OFDM-based CRN. We mainly propose subcarrier allocation scheme denoted as Worst Subcarrier Avoiding Water-filling (WSAW), which is based on Rate Adaptive (RA) criterion and three constraints are considered in CRN. The algorithm divides the assignment procedure into two phases. The first phase is an initial subcarrier allocation based on the idea of avoiding selecting the worst subcarrier in order to maximize the transmission rate; while the second phase is an iterative adjustment process which is realized by swapping pairs of subcarriers between arbitrary users. The proposed scheme could assign subcarriers in accordance with channel coherence time. Hence, real time subcarrier allocation could be implemented. Simulation results show that, comparing with the similar existing algorithms, the proposed scheme could achieve larger capacity and a near-optimal BER performance. 展开更多
关键词 Subcarrier OFDM-based Cognitive Radio networks (CRN) Subcarrier allocation scheme Worst Avoiding Water-filling (WSAW) Rate Adaptive (RA) criterion
下载PDF
Pyramid scheme model for consumption rebate frauds
19
作者 Yong Shi Bo Li Wen Long 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第7期549-556,共8页
There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the world.We propose a pyramid scheme model which has the principal characters of many pyramid schemes that hav... There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the world.We propose a pyramid scheme model which has the principal characters of many pyramid schemes that have appeared in recent years: promising high returns, rewarding the participants for recruiting the next generation of participants, and the organizer takes all of the money away when they find that the money from the new participants is not enough to pay the previous participants interest and rewards.We assume that the pyramid scheme is carried out in the tree network, Erd?s–Réney(ER) random network, Strogatz–Watts(SW) small-world network, or Barabasi–Albert(BA) scale-free network.We then give the analytical results of the generations that the pyramid scheme can last in these cases.We also use our model to analyze a pyramid scheme in the real world and we find that the connections between participants in the pyramid scheme may constitute a SW small-world network. 展开更多
关键词 PYRAMID scheme complex networkS SMALL-WORLD networkS
下载PDF
A Practical Target Tracking Technique in Sensor Network Using Clustering Algorithm
20
作者 Luke K. Wang Chien-Chang Wu 《Wireless Sensor Network》 2012年第11期264-272,共9页
Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online wit... Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online with less complexity algorithm and computational burden is our ultimate goal. Particle filtering (PF) technique, augmenting handoff and K-means classification of measurement data, is proposed to tackle the tracking mission in a sensor network. The handoff decision, an alternative to multi-hop transmission, is implemented for switching between clusters of sensor nodes through received signal strength indication (RSSI) measurements. The measurements being used in particle filter processing are RSSI and time of arrival (TOA). While non-line-of-sight (NLOS) is the dominant bias in tracking estimation/accuracy, it can be easily resolved simply by incorporating K-means classification method in PF processing without any priori identification of LOS/NLOS. Simulation using clusters of sensor nodes in a sensor network is conducted. The dependency of tracking performance with computational cost versus number of particles used in PF processing is also investigated. 展开更多
关键词 Sensor network HANDOFF scheme Particle Filter K-MEANS Clustering NLOS
下载PDF
上一页 1 2 97 下一页 到第
使用帮助 返回顶部