期刊文献+
共找到357篇文章
< 1 2 18 >
每页显示 20 50 100
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks
1
作者 Yang Zhao Jingmin An +1 位作者 Hao Li Saru Kumari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期555-575,共21页
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance. 展开更多
关键词 Aggregate signcryption FAULT-TOLERANT heterogeneous equality test vehicular sensor network
下载PDF
Cluster Head Selection and Multipath Routing Based Energy Efficient Wireless Sensor Network
2
作者 T.Shanmugapriya Dr.K.Kousalya 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期879-894,共16页
The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst themselves.There is an increase in the prominence of WSN adaptability to emerging applications like t... The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst themselves.There is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things(IoT)and Cyber-Physical Systems(CPS).Data secur-ity,detection of faults,management of energy,collection and distribution of data,network protocol,network coverage,mobility of nodes,and network heterogene-ity are some of the issues confronted by WSNs.There is not much published information on issues related to node mobility and management of energy at the time of aggregation of data.Towards the goal of boosting the mobility-based WSNs’network performance and energy,data aggregation protocols such as the presently-used Mobility Low-Energy Adaptive Clustering Hierarchy(LEACH-M)and Energy Efficient Heterogeneous Clustered(EEHC)scheme have been exam-ined in this work.A novel Artificial Bee Colony(ABC)algorithm is proposed in this work for effective election of CHs and multipath routing in WSNs so as to enable effective data transfer to the Base Station(BS)with least energy utilization.There is avoidance of the local optima problem at the time of solution space search in this proposed technique.Experimentations have been conducted on a large WSN network that has issues with mobility of nodes. 展开更多
关键词 Wireless sensor network ROUTING clustering MOBILITY low-energy adaptive clustering hierarchy energy efficient heterogeneous clustered artificial bee colony
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
3
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key heterogeneous MOBILITY wireless sensor network WEIGHT
下载PDF
Design of maximizing homogeneous and heterogeneous clustered sensor network lifetime 被引量:1
4
作者 金彦亮 蒋轶凡 +1 位作者 陈惠民 刘海涛 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期789-798,共10页
Aimed at the problem of unbalanced energy existed in sensor networks, the clustered method is employed to enhance the efficient utilization of limited energy resources of the deployed sensor nodes. In this paper, we d... Aimed at the problem of unbalanced energy existed in sensor networks, the clustered method is employed to enhance the efficient utilization of limited energy resources of the deployed sensor nodes. In this paper, we describe the network lifetime as a function of the communication and data aggregation energy consumption and analyze the lifetime of different transmission schemes in the homogeneous and heterogeneous sensor networks. The analysis carried out in this paper can provide the guidelines for network deployment and protocol design in the future applications. 展开更多
关键词 network lifetime sensor network HOMOGENEOUS heterogeneous
下载PDF
A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks 被引量:7
5
作者 Zhen Hong Rui Wang Xile Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期68-77,共10页
How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology ... How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for saving energy and ensuring network load balancing, while considering the link quality, packet loss rate, etc. In CTEF, the average energy of the network is accurately predicted per round (the lifetime of the network is denoted by rounds) in terms of the difference between the ideal and actual average residual energy using central limit theorem and normal distribution mechanism, simultaneously. On this basis, cluster heads are selected by cost function (including the energy, link quality and packet loss rate) and their distance. The non-cluster heads are determined to join the cluster through the energy, distance and link quality. Furthermore, several non-cluster heads in each cluster are chosen as the relay nodes for transmitting data through multi-hop communication to decrease the load of each cluster-head and prolong the lifetime of the network. The simulation results show the efficiency of CTEF. Compared with low-energy adaptive clustering hierarchy (LEACH), energy dissipation forecast and clustering management (EDFCM) and efficient and dynamic clustering scheme (EDCS) protocols, CTEF has longer network lifetime and receives more data packets at base station. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS Clustering algorithms Cost functions Energy dissipation Energy efficiency Forecasting Information management Low power electronics network management Normal distribution Packet loss Quality control Telecommunication networks TOPOLOGY Trees (mathematics)
下载PDF
Energy-Efficient Area Coverage in Heterogeneous Energy Wireless Sensor Networks 被引量:1
6
作者 Yingchi Mao Xiaofang Li Feng Xu 《Wireless Sensor Network》 2010年第10期768-776,共9页
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large ext... Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering idea, ACHE selects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation demonstrates that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications with the great heterogeneous energy capacities in the sensor networks, as well as effectively reduce the control overhead. 展开更多
关键词 WIRELESS sensor networkS Area COVERAGE heterogeneous Energy Location-Independent
下载PDF
Novel routing protocol for heterogeneous wireless sensor networks
7
作者 李晓阳 Henry ShiLi 宋玮 《Journal of Beijing Institute of Technology》 EI CAS 2011年第3期403-409,共7页
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head... An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes. 展开更多
关键词 heterogeneous wireless sensor network ROUTING pairwise key ENERGY SECURITY
下载PDF
Study on key management scheme for heterogeneous wireless sensor networks
8
作者 Qin Danyang Ma Jingya +3 位作者 Zhang Yan Yang Songxiang Ji Ping Feng Pan 《High Technology Letters》 EI CAS 2018年第4期343-350,共8页
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b... Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently. 展开更多
关键词 heterogeneous WIRELESS sensor network(HWSN) KEY management AUTHENTICATION network security STORAGE space
下载PDF
A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network
9
作者 Masoume Jabbarifar Alireza Shameli Sendi +2 位作者 Alireza Sadighian Naser Ezzati Jivan Michel Dagenais 《Wireless Sensor Network》 2010年第12期910-918,共9页
L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for th... L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques reduce cluster overlapping, resulting in the routing algorithm requiring fewer hops to move from one cluster to another remote cluster. Even though L-SYNC offers higher precision compared to other algorithms, it does not support heterogeneous topologies and its synchronization algorithm can be influenced by unreliable data. In this paper, we present the L-SYNCng (L-SYNC next generation) protocol, working in heterogeneous topologies. Our proposed protocol is scalable in unreliable and noisy environments. Simulation results illustrate that L-SYNCng has better precision in synchronization and scalability. 展开更多
关键词 Wireless sensor network SYNCHRONIZATION CLUSTERING heterogeneous CONVEX HULL
下载PDF
Optimal Control of Heterogeneous-Susceptible-Exposed-Infectious-Recovered-Susceptible Malware Propagation Model in Heterogeneous Degree-Based Wireless Sensor Networks
10
作者 ZHANG Hong SHEN Shigen +2 位作者 WU Guowen CAO Qiying XU Hongyun 《Journal of Donghua University(English Edition)》 CAS 2022年第3期220-230,共11页
Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malwar... Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost. 展开更多
关键词 heterogeneous wireless sensor network(HWSN) malware propagation optimal control Pontryagin’s minimum principle
下载PDF
Energy Proficient Reliable Rim Routing Technique for Wireless Heterogeneous Sensor Networks Lifespan Fortification
11
作者 S. G. Susila J. Arputhavijayaselvi 《Circuits and Systems》 2016年第8期1751-1759,共9页
Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended a... Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime. 展开更多
关键词 Cluster Cluster Head heterogeneous Rim Layer Node Deployment Technique Wireless sensor network
下载PDF
Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability
12
作者 Qian Sun Fengbo Yang +6 位作者 Xiaoyi Wang Jiping Xu Huiyan Zhang Li Wang Jiabin Yu Xiao Peng Ruichao Wang 《Computers, Materials & Continua》 SCIE EI 2022年第11期3081-3097,共17页
Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy co... Wireless sensor networks(WSN)can be used in many fields.In wireless sensor networks,sensor nodes transmit data in multi hop mode.The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network,which greatly affects the invulnerability of the network.Therefore,an optimal deployment of heterogeneous nodes(ODHN)algorithm is proposed to enhance the invulnerability of the wireless sensor networks.The algorithm combines the advantages of DEEC(design of distributed energy efficient clustering)clustering algorithm and BAS(beetle antenna search)optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes.Then,establish a shortcut to communicate with sink nodes through heterogeneous nodes.Besides,considering the practical deployment operation,we set the threshold of the mobile location of heterogeneous nodes,which greatly simplifies the deployment difficulty.Simulation results show that compared with traditional routing protocols,the proposed algorithm can make the network load more evenly,and effectively improve energy-utilization and the fault tolerance of the whole network,which can greatly improve the invulnerability of the wireless sensor networks. 展开更多
关键词 Wireless sensor networks INVULNERABILITY small world characteristic heterogeneous node DEPLOYMENT
下载PDF
Fuzzy Based BEENISH Protocol for Wireless Sensor Network
13
作者 A. Devasena B. Sowmya 《Circuits and Systems》 2016年第8期1893-1905,共13页
The main parameter to be considered in the wireless sensor network is the amount of energy that is available in each sensor node. The lifetime of the sensor node (SN) depends on it. As the SNs are deployed in remote l... The main parameter to be considered in the wireless sensor network is the amount of energy that is available in each sensor node. The lifetime of the sensor node (SN) depends on it. As the SNs are deployed in remote locations, if the entire energy is consumed, it would be very difficult to replace or recharge the energy source immediately. Hence the energy consumed by each node is very important. If individual SNs send information directly to the base station (BS), then the availability of energy in such SN decreases very fast. This will lead to reduction in the life time of the SN. Instead, the SNs can send the data to the cluster head (CH), then the CH consolidates the received data. The CH sends it to the BS periodically. In this way, utilizing CH for sending the information to the BS increases the lifetime of the SN. The cluster head selection is very crucial in such networks. This paper proposes a novel fuzzy based BEENSIH protocol for CH selection. 展开更多
关键词 sensor Nodes CLUSTER Energy Level heterogeneous sensor network Fuzzy Logic BEENISH
下载PDF
数据引流下异构传感器网络能量空洞防护算法
14
作者 王宗意 王玥 刘杨平 《计算机仿真》 2024年第4期368-372,共5页
异构传感器网络在工作时,靠近传感器基站位置的节点会由于接收转发次数较多而出现能量空洞现象。为有效对此现象实施防护,保障网络安全运行,提出数据引流下异构传感器网络能量空洞防护算法。构建网络节点部署模型,对传感器网络节点实施... 异构传感器网络在工作时,靠近传感器基站位置的节点会由于接收转发次数较多而出现能量空洞现象。为有效对此现象实施防护,保障网络安全运行,提出数据引流下异构传感器网络能量空洞防护算法。构建网络节点部署模型,对传感器网络节点实施节点优化部署;计算网络节点能耗对网络实施能量均衡控制,获取异构传感器网络节点的簇内传输跳数;结合获取的节点簇内跳数以及能量均衡结果开展节点接收数据的的引流分配,平衡传感器网络层内节点能量消耗,实现传感器网络的能量空洞防护。实验结果表明,使用上述方法开展传感器网络能量空洞防护时,数据转发接收能耗较低,防护方法性能高,防护效果好。 展开更多
关键词 数据引流 异构传感器网络 能量空洞 防护算法 节点部署优化
下载PDF
面向无线异构传感器网络的三维覆盖研究
15
作者 黄德昌 蔡芳龙 +1 位作者 黄招娣 吴章 《华东交通大学学报》 2024年第3期82-89,共8页
【目的】为达到增强无线异构传感器网络(HWSN)三维覆盖能力的目的,提出了一种基于改进蜜獾优化算法(IHBA)的无线异构传感器网络三维部署方法。【方法】首先,结合自适应果蝇优化算法,增强算法的随机搜索性,便于算法得到全局最优解,然后... 【目的】为达到增强无线异构传感器网络(HWSN)三维覆盖能力的目的,提出了一种基于改进蜜獾优化算法(IHBA)的无线异构传感器网络三维部署方法。【方法】首先,结合自适应果蝇优化算法,增强算法的随机搜索性,便于算法得到全局最优解,然后引入替换最差个体策略,避免适应度过低的个体占据种群位置,提高算法收敛速度,同时引入新个体提高种群多样性,避免算法个体早熟。【结果】将该算法应用于无线异构传感器网络的覆盖优化,相比标准蜜獾算法,其网络覆盖率提升18.1%。【结论】仿真结果表明,该算法收敛速度更快,可以有效提高无线异构传感器的网络覆盖能力,整个网络的节点分布也更加均匀。 展开更多
关键词 无线异构传感器网络 蜜獾算法 自适应果蝇优化算法 替换最差个体策略
下载PDF
基于半马尔可夫过程的异质WSNs可用度评估
16
作者 杨淑敏 吴国文 +2 位作者 张红 沈士根 曹奇英 《计算机应用与软件》 北大核心 2024年第3期124-129,133,共7页
为评估异质无线传感器网络(HWSNs)的可用性,提出一种异质传感器节点状态更契合实际情况的SEQIRD(Susceptible Exposed Quarantined Infected Recovered Dead)新模型。使用半马尔可夫过程描述节点各状态之间的动态转换过程,得到各个状态... 为评估异质无线传感器网络(HWSNs)的可用性,提出一种异质传感器节点状态更契合实际情况的SEQIRD(Susceptible Exposed Quarantined Infected Recovered Dead)新模型。使用半马尔可夫过程描述节点各状态之间的动态转换过程,得到各个状态的稳态概率,并计算得出不同拓扑结构下整个HWSNs稳态可用度。最后进行数值分析,以验证初始感染率、感染变化率和恢复率对HWSNs稳态可用度的影响。 展开更多
关键词 无线传感器网络 半马尔可夫过程 异质 可用度
下载PDF
基于微分博弈的异质无线传感器网络恶意程序传播研究与分析
17
作者 汤梦晨 吴国文 +2 位作者 张红 沈士根 曹奇英 《计算机应用与软件》 北大核心 2024年第7期100-105,共6页
为抑制异质无线传感器网络(Heterogeneous Wireless Sensor Networks,HWSNs)恶意程序的传播,考虑节点能量和计算能力差异,提出一种HWSNs攻防博弈模型。通过计算得到攻防双方的混合纳什均衡,再结合微分博弈建立攻防双方节点转换微分方程... 为抑制异质无线传感器网络(Heterogeneous Wireless Sensor Networks,HWSNs)恶意程序的传播,考虑节点能量和计算能力差异,提出一种HWSNs攻防博弈模型。通过计算得到攻防双方的混合纳什均衡,再结合微分博弈建立攻防双方节点转换微分方程,分析得到恶意节点比例动态演化规律。结合数值实验分析,验证有效抑制HWSNs恶意程序传播的方式。 展开更多
关键词 异质无线传感器网络 微分博弈 恶意程序 入侵检测
下载PDF
HetGNN-3D:基于异构图神经网络的3D目标检测优化模型
18
作者 汪明明 陈庆奎 付直兵 《小型微型计算机系统》 CSCD 北大核心 2024年第2期438-445,共8页
3D感知是自动驾驶场景的核心问题,传感器融合可以综合利用激光雷达和摄像机的优点以达到更高的3D目标检测准确率.传感器融合涉及点云到图像对准问题,预先对传感器标定可以得到点到图像位置的投影关系,然而这种对准方式受传感器相对位置... 3D感知是自动驾驶场景的核心问题,传感器融合可以综合利用激光雷达和摄像机的优点以达到更高的3D目标检测准确率.传感器融合涉及点云到图像对准问题,预先对传感器标定可以得到点到图像位置的投影关系,然而这种对准方式受传感器相对位置偏移与采集时间偏移影响而在干扰下对模型产生负面影响.针对该问题,本文把场景中实体在各个传感器下的不同表达作为不同对象,以对象为节点建立包含两类节点与三类边的异构图描述该场景,并提出了基于该异构图的3D目标检测优化模型HetGNN-3D.该模型通过图结构捕获对象间潜在联系并找到点云对象节点与图像对象节点间对应关系,从而减弱干扰带来的影响.HetGNN-3D包含图初始化、消息传递、图读出三大模块.图初始化模块使用基于点云的3D目标检测模型的输出和基于图像的2D目标检测模型的输出建立对象级异构图.消息传递模块针对异构图特性分类聚合与更新消息.图读出包含用于对象关系预测的边读出与属于同一实体的对象子图读出,然后基于对象子图得到3D目标检测结果.在nuScenes数据集的实验表明,HetGNN-3D有效融合点云信息与图像信息优化了3D目标检测结果,此外,基于对象级异构图的边关系预测使融合过程与预先标定得到的传感器映射矩阵解耦合,从而提升了融合模型的容错性与鲁棒性. 展开更多
关键词 传感器融合 异构图 图神经网络 3D目标检测 自动驾驶
下载PDF
物联网开放环境多源异构传感数据低能耗采集
19
作者 刘海鸥 马青云 《传感技术学报》 CAS CSCD 北大核心 2024年第3期539-544,共6页
物联网开放环境存在大规模异构数据,增加了传感数据采集的能耗,且容易导致采集误差。为此,提出了物联网开放环境多源异构传感数据低能耗采集。利用数据采集时间、负载均衡度和数据采集过程中的能量损耗为评价函数。并在此基础上构建数... 物联网开放环境存在大规模异构数据,增加了传感数据采集的能耗,且容易导致采集误差。为此,提出了物联网开放环境多源异构传感数据低能耗采集。利用数据采集时间、负载均衡度和数据采集过程中的能量损耗为评价函数。并在此基础上构建数据采集分配模型,之后布置相关传感网络节点,收集数据信息。构建传感器节点优化部署模型,优化网络信道分配,降低数据采集能耗,以此达到低能耗数据采集的目的。实验验证表明,使用该方法对数据实施采集,当丢包率达到15%时,数据采集误差为0.03 m。平均能量消耗为5.24 J,平均节点存活数量为141个,平均采集数据量为2.18×10~3 bit,该方法优化了数据采集误差和网络信道的分配性能,有效降低了传感数据的采集能耗。 展开更多
关键词 传感器网络 数据低能耗采集 物联网 负载均衡度 多源异构传感
下载PDF
基于改进GWO和贪婪算法的覆盖优化方法
20
作者 苟平章 郭保永 郭苗 《传感技术学报》 CAS CSCD 北大核心 2024年第9期1602-1612,共11页
针对能量异构无线传感器网络中节点随机部署时,节点冗余造成覆盖率低的问题,提出一种基于改进灰狼优化和贪婪算法的两阶段覆盖优化方法IGWO-GA。首先,将静态节点和移动节点随机部署在目标区域内;其次,根据网络的覆盖率、节点的能量和虚... 针对能量异构无线传感器网络中节点随机部署时,节点冗余造成覆盖率低的问题,提出一种基于改进灰狼优化和贪婪算法的两阶段覆盖优化方法IGWO-GA。首先,将静态节点和移动节点随机部署在目标区域内;其次,根据网络的覆盖率、节点的能量和虚拟移动距离建立多因素协同适应度函数,将灰狼包围策略划分为内层包围和外层包围,并提出猎物权重因子动态分配策略,确定移动节点的初选位置序列;最后,在终选位置优化阶段,提出贪婪算法确定节点与初选位置的最优匹配,重新进行节点部署,从而完成覆盖优化。仿真结果表明,相较于DPSO、IPSO-IRCD、GWO、GRDSA,IGWO-GA能够有效提高网络覆盖率,降低节点能耗,延长网络生命周期。 展开更多
关键词 异构无线传感器网络 覆盖优化 灰狼优化算法 多因素协同 包围策略 动态权重 贪婪算法
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部