共查询到20条相似文献,搜索用时 93 毫秒
1.
针对无线传感器网络的较大测距误差严重影响定位算法精度和鲁棒性的问题,利用节点均匀部署网络的拓扑特征,提出了一种基于局部网络拓扑特征的鲁棒节点定位算法(LFLS算法).该算法通过构建节点测距高估粗差阈值参数和测距低估粗差阈值参数,在对未知节点1跳测距数据集进行粗差识别及剔除等预处理滤波的基础上,使用高斯加权最小二乘定位算法实现节点定位.仿真结果表明,基于局部网络拓扑特征的鲁棒节点定位算法的定位精度明显优于未采用局部网络拓扑特征进行粗差预处理的加权最小二乘定位算法,其中粗差测距直接相关节点的定位精度改进尤为明显. 相似文献
2.
3.
介绍了无线传感器网络中DV-Hop定位算法的原理,分析了其误差产生的主要原因.针对传统DV-Hop算法在定位过程中求出的平均每跳距离值误差较大以及最终定位结果精确度不高的问题,提出了一种改进型DV-Hop定位算法.在改进算法中,信标节点通过计算一次误差修正了平均每跳距离值,通过计算二次误差修正了信标节点定位误差区域,从而使最终计算出的节点坐标更接近于真实值.仿真结果表明,改进算法在无需额外增加硬件开销的前提下,可以有效地提高定位精度. 相似文献
4.
为解决稀疏无线传感器网络的现有MCB移动节点定位算法存在定位精度低和无法定位的节点的数量多的问题,对MCB算法进行了改进,进而提出了一种新的移动节点定位算法MCBP,该算法把已定位的节点作为其它未定位节点的参考点(准信标节点),利用准信标节点的位置信息参与后续定位过程,使更多的节点可以定位,并且提高了定位精度。仿真结果表明,MCBP移动节点定位算法比前人的类似算法的定位误差最大可减少22%,平均减少16%。无法定位的节点的数量最大可减少26%,平均减少12%。 相似文献
5.
一种低计算复杂度的无线传感器网络分簇定位算法 总被引:1,自引:0,他引:1
针对已有的集中式定位算法定位精度低,而分布式定位算法计算复杂度高、通信量大的问题,提出了一种适用于无线传感器网络的计算复杂度低的节点分簇定位算法.首先,提出满足最大连通度的多边界节点分簇算法,采用此算法把网络划分为若干个簇,各簇分别进行簇内节点定位;其次,各簇进行融合,最终实现全网节点的定位.仿真结果表明,这种分簇定位算法比分布式定位算法计算复杂度低、通信量小、定位精度相当或略差,比集中式定位算法计算复杂度低、通信量小、定位精度高.采用该算法可以降低传感器网络节点定位过程中的能耗,提高计算效率,延长网络寿命. 相似文献
6.
7.
8.
无线传感器网络定位求精方法 总被引:6,自引:0,他引:6
为了提高传感器节点定位精度,将多种节点坐标计算方案(如极大似然估计、基于泰勒展开的最小二乘法和加权最小二乘法等)应用于定位求精中,并分析和比较了它们的性能.为了解决实际定位过程中锚节点存在的自身位置偏差,设计了相应的坐标求精方法,如总体最小二乘法和约束总体最小二乘法,在此基础上针对无线传感器网络定位误差的特点推广了定位误差的估计下限(参数无偏估计的Cramer-Rao下限).仿真实验结果给出了不同求精方案各自的求精性能和适用场合.在锚节点无位置误差的情况下,在泰勒展开基础上形成的加权最小二乘法更有利于精度提高;在锚节点有位置误差的情况下,约束总体最小二乘法对提高定位精度更有效. 相似文献
9.
10.
针对无线传感器网络中DV-Hop经典算法定位精度低的不足,提出了一种改DV-Hop定位算法;改进后的算法对锚节点的选取进行了优化,并改进节点跳数,还采用平均计算方法计算节点平均每跳距离。仿真表明,改进的DV-Hop算法对未知节点的定位精度有显著提高。 相似文献
11.
Mobile Ad hoc Network (MANET) nodes exchange information using the multi-hop wireless communications without the need for any pre-existing infrastructure. Routing protocols of MANET are designed with an assumption that the nodes will cooperate in routing process. To achieve high throughput and reliable communication, the nodes are expected to cooperate with each other. Routing protocol plays a crucial role in an effective communication between nodes and operates on the assumption that the nodes are fully cooperative. Due to the open structure and limited battery-based energy in MANET, some nodes may not cooperate correctly or behave maliciously and such kind of misbehavior impacts the fairness, reliability and efficiency in MANET. Previous work addressed the ways to overcome these kinds of node misbehaviors and attacks. Most of the existing works need time to analyse the neighbor traffic and decide whether a neighbor is behaving maliciously or not. Further, the existing credit-based detection mechanisms may mark a genuine idle node as a malicious node. This work addresses a simple Neighbor Credit Value based AODV (NCV-AODV) routing algorithm for the detection of selfish behavior which avoids such false detection. The proposed idea is implemented in Ad hoc On Demand Distance Vector (AODV) routing protocol and an extensive analysis on the performance of the proposed detection mechanism against the selfish behavior of some MANET nodes are conducted. 相似文献
12.
提出一种基于信誉的恶意节点检测方法——RMDMN,在分簇的网络结构基础上,对节点的行为属性(如丢包率、转发率、位置匹配信息等)和网络攻击进行建模,结合阈值比较法动态地更新节点信誉值并进行恶意节点判断.实验仿真显示,该方法具有一定的恶意节点检测能力. 相似文献
13.
采用博弈论方法研究探讨了政府监管与医院、医生违规行为之间的关系问题.对医生与医院之间的博弈进行了简要分析,建立了政府与院方之间的博弈模型,并对模型的均衡进行了求解.根据求解结果,揭示了政府监管与院方违规行为之间的关系,并给出了降低医院与医生违规行为发生几率的方法. 相似文献
14.
Stone GE 《Journal of applied measurement》2006,7(2):160-169
A criterion-referenced standard is an important element of most successful professional testing programs. A growing body of evidence suggests that judge decisions are influenced by characteristics related to the normative experience of the individual judge (e.g. gender, age, etc.). This investigation used two health-care related boards to explore the effects of judge characteristics on the standards established. Two judge panels (composed of 26 and 30 members respectively) were used in a simplified Objective Standard Setting exercise to define examination cutoff points. Multi-faceted Rasch analyses were employed to detect and explore differences in judgment making. Significant but not necessarily consistent differences were found between panel judges on several examined characteristics. Results suggest that criterion-referenced standards defined by judge panels are inexorably connected to their normative experiences and are therefore wholly sample dependent. While stratification of judge panels is clearly an important element in defining standards, if they are ever to achieve the goals of Glaser (1963) and Majer (1962) including meaningful independence, more must be done to investigate these and other concerns. The case for the predictive validity of criterion-referenced standards has not thusfar been made in any convincing fashion. 相似文献
15.
In 2009, most of the gallium fixed-point cells in use in different INRIM laboratories were compared with Italy??s national standard. The comparison has uncovered problems with one of the commercial devices, realizing a temperature about 0.7 mK too low which initially was even changing linearly with time. An additional series of measurements was undertaken to find out the reason for this behavior, but not being allowed to open the cell, only a suspicion on the possible cause has remained. A way is suggested that might give users an indication of such misbehavior of their cell. The results underline the importance for those NMIs with only a single cell, for any fixed point, to undertake regular comparisons with another cell as a check on its behavior. 相似文献
16.
Security and privacy issues have become a rapidly growing problem with the fast
development of big data in public health. However, big data faces many ongoing serious
challenges in the process of collection, storage, and use. Among them, data security and
privacy problems have attracted extensive interest. In an effort to overcome this challenge,
this article aims to present a distributed privacy preservation approach based on smart
contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted
edge computing node, design data access module, data protection module, and data integrity
check module, to achieve hardware-enhanced data privacy protection. Then, we design a
smart contract framework to realize distributed data access control management in a big data
environment. The crucial role of the smart contract was revealed by designing multiple access
control contracts, register contracts, and history contracts. Access control contracts provide
access control methods for different users and enable static access verification and dynamic
access verification by checking the user’s properties and history behavior. Register contract
contains user property information, edge computing node information, the access control and
history smart contract information, and provides functions such as registration, update, and
deletion. History contract records the historical behavior information of malicious users,
receives the report information of malicious requestors from the access control contract,
implements a misbehavior check method to determines whether the requestor has
misbehavior, and returns the corresponding result. Finally, we design decentralized system
architecture, prove the security properties, and analysis to verify the feasibility of the system.
Results demonstrate that our method can effectively improve the timeliness of data, reduce
network latency, and ensure the security, reliability, and traceability of data. 相似文献
17.
18.
This study illustrates scientists’ referencing (mis)behavior by structuring the dissemination network of referencing errors. The sample set consists of 16,622 referencing errors of a highly cited paper published by Laemmli, UK in Nature in 1970. Dissemination networks of thirteen types of volume-page double errors and one type of page-only error are constructed and analyzed. Focusing on papers which carry the same volume-page double error, or the same page error, the citing-cited relationship between any two of them was identified and author bylines were compared to find common author(s). Our investigation results in three disseminating routes of referencing errors. Route 1: Citing a paper and copying its reference; Route 2: Copying a reference from another paper but without citing this paper; Route 3: Copying references from an earlier paper published by the author himself (herself) without rechecking the accuracy of the reference. The first two routes reflect scientists’ referencing misbehavior while the third calls attention to self-copying of references. 相似文献
19.
This paper addresses the evolution of the role of science and technology as a strategic national security advantage. From World War II and the Cold War to the present and projected future, this role has changed. Advances in digitized sensors, processors, storage, communications, and display have proliferated across the globe. The network connectivity enabled by this revolution has itself revolutionized almost all aspects of global life. The technology from which national security systems are derived is increasingly drawn from the vibrant, globalized industrial base that is the foundation of commercial and economic success. The desire for secrecy and technology control that is natural to the creation of national security capabilities is now in conflict with this globalized and open commercial marketplace. Contending pressures for cooperation among nations and the need to protect against misbehavior by some of those same nations makes managing national security technologies increasingly challenging. 相似文献
20.
火灾运行模式模拟计算中最复杂模式的确定 总被引:1,自引:1,他引:1
在地铁隧道通风设计中,有很多种模式,其中有一种是最复杂的,由最复杂的这种模式就可以判断在最不利情况下设备的配置是否能满足火灾要求。本文讲述了最简单的几种最不利工况的判断方法。 相似文献