期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于GLR-NT的显著误差检测与数据协调 被引量:6
1
作者 蒋余厂 刘爱伦 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第4期502-508,共7页
提出了一种广义似然比法(Generalized Likelihood Ratio,GLR)与节点检测法(NodalTest,NT)组合的显著误差检测和稳态数据协调方法。该方法充分发挥了GLR法和NT法的优点,采用逐次侦破、补偿校正的策略,避免了传统显著误差侦破方法中系数... 提出了一种广义似然比法(Generalized Likelihood Ratio,GLR)与节点检测法(NodalTest,NT)组合的显著误差检测和稳态数据协调方法。该方法充分发挥了GLR法和NT法的优点,采用逐次侦破、补偿校正的策略,避免了传统显著误差侦破方法中系数矩阵降秩问题,并且融入了测量变量的上、下限约束,最终实现显著误差的侦破、识别、处理和测量数据的协调。仿真结果显示:该方法对多显著误差特别是误差幅度较小或出现节点大显著误差相互抵消的情况具有较好的性能,优于单独的GLR法和NT-MT法。一个实例验证了该算法的有效性。 展开更多
关键词 广义似然比法 节点检测法 显著误差检测 数据协调
下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
2
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
3
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
下载PDF
Approximate Discovery of Service Nodes by Duplicate Detection in Flows
4
作者 Zhou Changling Xiao Jianguo +2 位作者 Cui Jian Zhang Bei Li Feng 《China Communications》 SCIE CSCD 2012年第5期75-89,共15页
Discovery of service nodes in flows is a challenging task, especially in large ISPs or campus networks where the amount of traffic across net-work is rmssive. We propose an effective data structure called Round-robin ... Discovery of service nodes in flows is a challenging task, especially in large ISPs or campus networks where the amount of traffic across net-work is rmssive. We propose an effective data structure called Round-robin Buddy Bloom Filters (RBBF) to detect duplicate elements in flows. A two-stage approximate algorithm based on RBBF which can be used for detecting service nodes from NetFlow data is also given and the perfonmnce of the algorithm is analyzed. In our case, the proposed algorithm uses about 1% memory of hash table with false positive error rate less than 5%. A proto-type system, which is compatible with both IPv4 and IPv6, using the proposed data structure and al-gorithm is introduced. Some real world case studies based on the prototype system are discussed. 展开更多
关键词 duplicate detection service nodes dis-covery buddy bloom filter round-robin schema NETFLOW
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部