期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
面向移动点的稳健动态Delaunay三角剖分技术 被引量:5
1
作者 苏志刚 王争 吴仁彪 《系统工程与电子技术》 EI CSCD 北大核心 2013年第8期1764-1768,共5页
动态Delaunay三角剖分(Delaunay triangulation,DT)技术可应用于空中目标冲突检测领域,从而有效降低检测算法的计算复杂度。针对计算复杂度降低带来的检测可信度问题,提出一种面向移动点的Delaunay网格拓扑动态维护算法,通过实时维护网... 动态Delaunay三角剖分(Delaunay triangulation,DT)技术可应用于空中目标冲突检测领域,从而有效降低检测算法的计算复杂度。针对计算复杂度降低带来的检测可信度问题,提出一种面向移动点的Delaunay网格拓扑动态维护算法,通过实时维护网络拓扑结构确保检测可靠性,并利用局部优化技术(local optimization procedure,LOP)进一步降低计算复杂度。理论分析和实验结果都表明,算法有效地兼顾了计算复杂度和检测可靠性,是一种稳健的动态Delaunay三角剖分技术。 展开更多
关键词 DELAUNAY三角剖分 动态维护 移动点集 飞行冲突检测
下载PDF
基于动态三角剖分的潜在冲突筛选方法 被引量:1
2
作者 苏志刚 符笑娴 郝敬堂 《系统工程与电子技术》 EI CSCD 北大核心 2016年第6期1456-1461,共6页
围绕动态Delaunay三角剖分(dynamic delaunay triangulation,DDT)方法难以对空域动态三角剖分中产生的反转三角形实现稳定局部更新问题,提出以顺序的点删除与点增加的局部更新方式替代反转三角形的局部更新方式的改进方法。实验结果表明... 围绕动态Delaunay三角剖分(dynamic delaunay triangulation,DDT)方法难以对空域动态三角剖分中产生的反转三角形实现稳定局部更新问题,提出以顺序的点删除与点增加的局部更新方式替代反转三角形的局部更新方式的改进方法。实验结果表明,改进的DDT方法获得的潜在冲突航空器数目与空域内航空器密度无关,且具有更低的局部更新时间复杂度和稳健性。改进的DDT方法更稳健,更适用于空管指挥系统的潜在冲突筛选任务。 展开更多
关键词 空中交通管理 冲突检测 动态Delaunay三角剖分 移动点集 动态更新
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
3
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部