Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2460-2463.DOI: 10.11772/j.issn.1001-9081.2014.09.2460
• Network and communications • Previous Articles Next Articles
REN Xiuli,AN Le
Received:
2014-03-17
Revised:
2014-04-17
Online:
2014-09-30
Published:
2014-09-01
Contact:
AN Le
任秀丽,安乐
通讯作者:
安乐
作者简介:
基金资助:
辽宁省自然科学基金资助项目
CLC Number:
REN Xiuli AN Le. Local cooperative localization algorithm for wireless sensor networks[J]. Journal of Computer Applications, 2014, 34(9): 2460-2463.
任秀丽 安乐. 无线传感器网络局部协同定位算法[J]. 计算机应用, 2014, 34(9): 2460-2463.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2460
[1]WAN Z, ZHANG X, XIONG X, et al.The application research of wireless sensor network in the prison monitoring system [C] // IITSI 2010: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. Piscataway: IEEE, 2010: 58-62.
[2]LI D, WONG K D, HU Y H, et al.Detection, classification, and tracking of targets [J]. IEEE Signal Processing Magazine, 2002, 19(2): 17-29.
[3]SUN H, SU N, KONG C, et al.Improved method of self-adaptive localization [J]. Computer Systems and Applications, 2013, 22(4): 190-194. (孙红,苏南,孔超宇,等.一种改进的自适应环境定位方法[J].计算机系统应用,2013,22(4):190-194.)
[4]LI J, LI Z, WANG Q, et al.An ellipse-centroid localization algorithm in wireless sensor networks [C]// WiCom'09: Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. Piscataway: IEEE, 2009: 1-4.
[5]NICULESCU D, NATH B. Ad Hoc Positioning System (APS) [C]// GLOBECOM'01: Proceedings of the 2001 IEEE Global Telecommunications Conference. Piscataway: IEEE, 2001, 5: 2926-2931.
[6]NAGPAL R, SHROBE H, BACHRACH J. Organizing a global coordinate system from local information on an Ad Hoc sensor network [C]// IPSN'03: Proceedings of the 2nd International Conference on Information Processing in Sensor Networks, LNCS 2634. Berlin: Springer-Verlag, 2003: 333-348.
[7]HAN B,XU C,YUAN H, et al.Improved APIT positioning algorithm in wireless sensor network [J].Computer Engineering and Applications, 2008, 44(4): 122-124. (韩彪,徐昌彪,袁海,等.无线传感器网络中一种改进的 APIT 定位算法[J].计算机工程与应用,2008,44(4):122-124.)
[8]ZHENG J, WU C, CHU H, et al.Localization algorithm based on RSSI and distance geometry constrain for wireless sensor network [C]// ICECE 2010: Proceedings of the 2010 International Conference on Electrical and Control Engineering. Piscataway: IEEE, 2010: 2836-2839.
[9]KIM S, JANG S-H, CHONG J-W. Hybrid RSS/TOA wireless positioning with a mobile anchor in wireless sensor networks [C]// ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. New York: ACM, 2012: Article No. 116.
[10]SHIN H-H, CHO C J, KO H, et al.Robust localization of moving object via fusion of TDOA and detection range measurements of acoustic sensors [C]// ICSPCC 2013: Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing. Piscataway: IEEE, 2013: 1-5.
[11]AL-JAZZAR S, GHOGHO M, MCLERNON D. A joint TOA/AOA constrained minimization method for locating wireless devices in non-line-of-sight environment [J]. IEEE Transactions on Vehicular Technology, 2009, 58(1): 468-472.
[12]WAN G, ZHONG J, YANG C. Improved algorithm of ranging and locating based on RSSI [J]. Application Research of Computers, 2012, 29(11): 4156-4158. (万国峰,钟俊,杨成慧.改进的RSSI测距和定位算法[J].计算机应用研究,2012,29(11):4156-4158.)
[13]XU K, LIU Y, XU C, et al.A cluster-based and range-free multidimensional scaling-MAP localization scheme in WSN [C]// CENet2013: Proceedings of the 2013 International Conference on Computer Engineering and Network, Lecture Notes in Electrical Engineering 277. Berlin: Springer Verlag, 2014: 1253-1262.
[14]SHA C, WANG R, SUN L, et al.A cooperating localization method based on beacon transfer in wireless sensor networks [J]. Acta Electronica Sinica, 2010, 38(11): 2625-2629. (沙超,王汝传,孙力娟,等.无线传感器网络中一种信标节点可迁移的协作定位方法 [J]. 电子学报, 2010,38(11):2625-2629.)
[15]LAMEHAMEDI H, SHENTU Z, SZYMANSKI B, et al.Simulation of dynamic data replication strategies in data grids [C]// IPDPS 2003: Proceedings of the 2003 International Parallel and Distributed Processing Symposium. Piscataway: IEEE, 2003: 1-10.
[16]GENTILE C, ALSINDI N, ALSINDI R, et al.Cooperative localization in wireless sensor networks: centralized algorithms [M]// Geolocation Techniques. Berlin: Springer Verlag, 2013: 161-185. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||