期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
1
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
原文传递
Delay and Capacity Trade-offs in Mobile Wireless Networks with Infrastructure Support
2
作者 李卓 李文中 +2 位作者 郭嵩 陆桑璐 陈道蓄 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第2期328-340,共13页
In this paper,we investigate the trade-offs between delay and capacity in mobile wireless networks with infrastructure support.We consider three different mobility models,independent and identically distributed (i.i.... In this paper,we investigate the trade-offs between delay and capacity in mobile wireless networks with infrastructure support.We consider three different mobility models,independent and identically distributed (i.i.d) mobility model,random walk mobility model with constant speed and L'evy flight mobility model.For i.i.d mobility model and random walk mobility model with the speed θ(1/n~(1/2)),,we get the theoretical results of the average packet delay when capacityis θ(1),θ(1/n~(1/2)) individually,where n is the number of nodes.We find that the optimal average packet delay is achieved whencapacity λ(n) 〈(1/(2.n.log_2(1/((1-e)-(k/n))+1)),where K is the number of gateways.It is proved that average packet delay D(n) dividedby capacity λ(n) is bounded below by (n/(k·w)).When ω(n~(1/2))≤KO(n((1-η)·(α+1))/2)ln n) when K=o(n~η)(0≤η〈1).We also provethat when ω(1/2)≤K). 展开更多
关键词 mobile wireless networks capacity DELAY
原文传递
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks 被引量:1
3
作者 邓晓明 熊焰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期732-743,共12页
Wireless sensor networks (WSNs) are often deployed in harsh environments. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch ... Wireless sensor networks (WSNs) are often deployed in harsh environments. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed, yet they are not very suitable for the mobile wireless sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. In this protocol, polynomial-based pair-wise key pre-distribution scheme and Counting Bloom Filters are used to guarantee that the replicas can never lie about their real identifiers and collect the number of pair-wise keys established by each sensor node. Replicas are detected by looking at whether the number of pair-wise keys established by them exceeds the threshold. We also derive accurate closed form expression for the expected number of pair-wise keys established by each node, under commonly used random waypoint model. Analyses and simulations verify that the protocol accurately detects the replicas in the mobile WSNs and supports their removal. 展开更多
关键词 node replication attack network security mobile WSN wireless sensor network) random waypoint model
原文传递
Balanced energy-efficient relay selection scheme in wireless mobile relay networks 被引量:1
4
作者 Liu Wei Ji Hong Li Xi 《High Technology Letters》 EI CAS 2010年第3期235-240,共6页
In order to resolve the relay selection problem in wireless mobile relay networks (WMRNs), a novel balanced energy-efficient mobile relay selection scheme is proposed in this paper. Compared with traditional counter... In order to resolve the relay selection problem in wireless mobile relay networks (WMRNs), a novel balanced energy-efficient mobile relay selection scheme is proposed in this paper. Compared with traditional counter-based algorithm, distance and energy consumption are considered from network respect to provide a better network lifetime performance in the proposed scheme. Also, it performs well when nodes move freely at high speed. A random assessment delay (RAD) mechanism is added to avoid collisions and improve transmission efficiency. Simulation results reveal that, the proposed scheme has advantages in prolonging network lifetime, balancing energy compared with existing counter-based scheme. consumption and reducing the total energy consumption 展开更多
关键词 RELAY network lifetime ENERGY-EFFICIENT wireless mobile relay network (WMRN) random assessment delay(RAD)
在线阅读 下载PDF
Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network
5
作者 Eid Rehman Ibrahima Kalil Toure +5 位作者 Kashif Sultan Muhammad Asif Muhammad Habib Najam Ul Hasan Oh-Young Song Aaqif Afzaal Abbasi 《Computers, Materials & Continua》 SCIE EI 2022年第4期1695-1712,共18页
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile se... The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network.This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station.But this leads to a serious security breach and degrades the performance of any security protocol available in this domain.Most existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head.This increase communication cost and delay in such real time access information.To handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy extractor.In this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base station.The proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login phase.The presented scheme supports scalability for an increasing number of nodes using polynomials.The proposed scheme increases the life-time of the network by decreasing the key pool size. 展开更多
关键词 Fuzzy extractor user authentication key management cluster session key wireless mobile sensor network
在线阅读 下载PDF
New Blue Ocean of Wideband Wireless Mobile Internet:Modern Service
6
作者 Song Junde 《ZTE Communications》 2009年第4期16-20,共5页
Wideband Wireless Mobile Internet(WWMI)has become one of the most important technologies for Modern Service.The Modern Service information communication multi-access network can easily realize the new operation modes ... Wideband Wireless Mobile Internet(WWMI)has become one of the most important technologies for Modern Service.The Modern Service information communication multi-access network can easily realize the new operation modes formed by various Modern Service support systems.We think that under the new operation modes,the charges on calling and information will become more negligible,while the charge on services provided by the direct service support of various Modern Service platforms will turn into a major revenue source.It is suggested that the operators build an operation service support platform with common services to cooperate with thousands of information websites,help clients to transform information into profit and carry out operations and services. 展开更多
关键词 New Blue Ocean of Wideband wireless mobile Internet Modern Service WIMAX
在线阅读 下载PDF
Computer-based Test of Spoken English Translation Accuracy Evaluation System with Wireless Mobile Terminal
7
作者 GUO Fengxia 《International English Education Research》 2018年第1期17-20,共4页
In order to improve the accuracy of spoken English translation evaluation and artificial intelligence, the design of wireless mobile terminal lest of spoken English translation accuracy evaluation system is researched... In order to improve the accuracy of spoken English translation evaluation and artificial intelligence, the design of wireless mobile terminal lest of spoken English translation accuracy evaluation system is researched. The system uses four layer construction design as wireless information collection layer, the mobile terminal information fusion layer, network data transmission layer, human computer interactive application layer. The original collection of computer-based spoken English translation information is taken based on host computer communication sensing information processing technology, Bus data transmission of English translation accuracy evaluation system is taken based on B/S structure, the test design process and remote scheduling information fusion are constructed based on LabWindows/CVl and B/S structure mining system, information data processing and cross compiler operation of the spoken English translation test evaluation system are completed in application layer, in the embedded kernel and on the wireless mobile terminal, the evaluation system is developed. The test results show that the integrated scheduling ability of spoken English translation test information system designed in this paper is better than traditional method, the cost time is less, and the control quality of the system is high. 展开更多
关键词 wireless mobile terminal Spoken English translation Evaluation system B/S architecture
在线阅读 下载PDF
A study of user experience in Tsinghua Wireless and Mobile Digital Library System(TWIMS)
8
作者 Qian WANG Chengyu ZHANG 《Chinese Journal of Library and Information Science》 2011年第1期50-65,共16页
Tsinghua University Library recently launched Tsinghua Wireless and Mobile Digital Library System(TWIMS) to meet users’ need for wireless access to library services.A survey of user experience about TWIMS was carried... Tsinghua University Library recently launched Tsinghua Wireless and Mobile Digital Library System(TWIMS) to meet users’ need for wireless access to library services.A survey of user experience about TWIMS was carried out for the purpose of studying its users’ behavior and their level of satisfaction about the system design and its various performance indicators. Based on our research findings, we concluded our research paper with a set of evaluative comments and suggestions. Those remarks are aimed at furthering the TWIMS’ functionality and reconstructing a more sensible questionnaire survey appertaining to the system users’ experience as well in the next phase of our extended research. 展开更多
关键词 Tsinghua wireless and mobile Digital Library System(TWIMS) User experience Questionnaire survey about systems' user experience
原文传递
Detecting and adaptive responding mechanism for mobile WSN
9
作者 Zhao Min Qin Danyang +1 位作者 Guo Ruolin Xu Guangchao 《High Technology Letters》 EI CAS 2020年第3期323-334,共12页
Mobile wireless sensor network(WSN)composed by mobile terminals has a dynamic topology and can be widely used in various fields.However,the lack of centralized control,dynamic topology and limited energy supply make t... Mobile wireless sensor network(WSN)composed by mobile terminals has a dynamic topology and can be widely used in various fields.However,the lack of centralized control,dynamic topology and limited energy supply make the network layer of mobile WSN be vulnerable to multiple attacks,such as black hole(BH),gray hole(GH),flooding attacks(FA)and rushing attacks(RU).Existing researches on intrusion attacks against mobile WSN,currently,tend to focus on targeted detection of certain types of attacks.The defense methods also have clear directionality and is unable to deal with indeterminate intrusion attacks.Therefore,this work will design an indeterminate intrusion attack oriented detecting and adaptive responding mechanism for mobile WSN.The proposed mechanism first uses a test sliding window(TSW)to improve the detecting accuracy,then constructs parameter models of confidence on attack(COA),network performance degradation(NPD)and adaptive responding behaviors list,finally adaptively responds according to the decision table,so as to improve the universality and flexibility of the detecting and adaptive responding mechanism.The simulation results show that the proposed mechanism can achieve multiple types of intrusion detecting in multiple attack scenarios,and can achieve effective response under low network consumption. 展开更多
关键词 mobile wireless sensor network(WSN) network security intrusion detection adaptive response
在线阅读 下载PDF
5G High Mobility Wireless Communications: Challenges and Solutions 被引量:21
10
作者 Pingzhi Fan Jing Zhao Chih-Lin I 《China Communications》 SCIE CSCD 2016年第S2期1-13,共13页
The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of... The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of service(QoS) in terms of delay,reliability and security.Furthermore,the 5G network shall also incorporate high mobility requirements as an integral part,providing satisfactory service to users travelling at a speed up to 500 km/h.This paper provides a survey of potential high mobility wireless communication(HMWC) techniques for 5G network.After discussing the typical requirements and challenges of HMWC,key techniques to cope with the challenges are reviewed,including transmission techniques under the fast timevarying channels,network architecture with mobility support,and mobility management.Finally,future research directions on 5G high mobility communications are given. 展开更多
关键词 5G high mobility wireless communications fast time-varying channel network architecture mobility management
在线阅读 下载PDF
Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks 被引量:5
11
作者 Ahmad F.Subahi Youseef Alotaibi +1 位作者 Osamah Ibrahim Khalaf F.Ajesh 《Computers, Materials & Continua》 SCIE EI 2021年第2期2077-2086,共10页
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns... Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM). 展开更多
关键词 wireless and mobile ad hoc networks(WMANet) packet drop attack(PDA) ad hoc on-demand distance vector(AODV) dynamic source routing(DSR) packet drop battling mechanism(PDBM)
在线阅读 下载PDF
A Comparison of Mamdani and Sugeno Fuzzy Based Packet Scheduler for MANET with a Realistic Wireless Propagation Model 被引量:1
12
作者 Oche Alexander Egaji Alison Griffiths +1 位作者 Mohammad S.Hasan Hong-Nian Yu 《International Journal of Automation and computing》 EI CSCD 2015年第1期1-13,共13页
The mobile nature of the nodes in a wireless mobile ad-hoc network(MANET) and the error prone link connectivity between nodes pose many challenges. These include frequent route changes, high packet loss, etc. Such pro... The mobile nature of the nodes in a wireless mobile ad-hoc network(MANET) and the error prone link connectivity between nodes pose many challenges. These include frequent route changes, high packet loss, etc. Such problems increase the end-toend delay and decrease the throughput. This paper proposes two adaptive priority packet scheduling algorithms for MANET based on Mamdani and Sugeno fuzzy inference system. The fuzzy systems consist of three input variables: data rate, signal-to-noise ratio(SNR) and queue size. The fuzzy decision system has been optimised to improve its efficiency. Both fuzzy systems were verified using the Matlab fuzzy toolbox and the performance of both algorithms were evaluated using the riverbed modeler(formally known as OPNET modeler). The results were compared to an existing fuzzy scheduler under various network loads, for constant-bit-rate(CBR) and variable-bit-rate(VBR) traffic. The measuring metrics which form the basis for performance evaluation are end-to-end delay, throughput and packet delivery ratio. The proposed Mamdani and Sugeno scheduler perform better than the existing scheduler for CBR traffic. The end-to-end delay for Mamdani and Sugeno scheduler was reduced by an average of 52 % and 54 %, respectively.The performance of the throughput and packet delivery ratio for CBR traffic are very similar to the existing scheduler because of the characteristic of the traffic. The network was also at full capacity. The proposed schedulers also showed a better performance for VBR traffic. The end-to-end delay was reduced by an average of 38 % and 52 %, respectively. Both the throughput and packet delivery ratio(PDR) increased by an average of 53 % and 47 %, respectively. The Mamdani scheduler is more computationally complex than the Sugeno scheduler, even though they both showed similar network performance. Thus, the Sugeno scheduler is more suitable for real-time applications. 展开更多
关键词 Riverbed modeler variable-bit-rate(VBR) constant-bit-rate(CBR) signal-to noise ratio(SNR) wireless mobile ad-hoc network(MANET)
原文传递
Fuzzy adaptive Kalman filter for indoor mobile target positioning with INS/WSN integrated method 被引量:10
13
作者 杨海 李威 罗成名 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1324-1333,共10页
Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobil... Pure inertial navigation system(INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network(WSN) associated with the INS was applied to estimate the mobile target positioning. Taking traditional Kalman filter(KF) as the framework, the system equation of KF was established by the INS and the observation equation of position errors was built by the WSN. Meanwhile, the observation equation of velocity errors was established by the velocity difference between the INS and WSN, then the covariance matrix of Kalman filter measurement noise was adjusted with fuzzy inference system(FIS), and the fuzzy adaptive Kalman filter(FAKF) based on the INS/WSN was proposed. The simulation results show that the FAKF method has better accuracy and robustness than KF and EKF methods and shows good adaptive capacity with time-varying system noise. Finally, experimental results further prove that FAKF has the fast convergence error, in comparison with KF and EKF methods. 展开更多
关键词 inertial navigation system(INS) wireless sensor network(WSN) mobile target integrated positioning fuzzy adaptive Kalman filter
在线阅读 下载PDF
An Energy-Efficient Wireless Power Transmission-Based Forest Fire Detection System
14
作者 Arwa A.Mashat Niayesh Gharaei Aliaa M.Alabdali 《Computers, Materials & Continua》 SCIE EI 2022年第7期441-459,共19页
Compared with the traditional techniques of forest fires detection,wireless sensor network(WSN)is a very promising green technology in detecting efficiently the wildfires.However,the power constraint of sensor nodes i... Compared with the traditional techniques of forest fires detection,wireless sensor network(WSN)is a very promising green technology in detecting efficiently the wildfires.However,the power constraint of sensor nodes is one of the main design limitations of WSNs,which leads to limited operation time of nodes and late fire detection.In the past years,wireless power transfer(WPT)technology has been known as a proper solution to prolong the operation time of sensor nodes.In WPT-based mechanisms,wireless mobile chargers(WMC)are utilized to recharge the batteries of sensor nodes wirelessly.Likewise,the energy of WMC is provided using energy-harvesting or energy-scavenging techniques with employing huge,and expensive devices.However,the high price of energy-harvesting devices hinders the use of this technology in large and dense networks,as such networks require multiple WMCs to improve the quality of service to the sensor nodes.To solve this problem,multiple power banks can be employed instead of utilizing WMCs.Furthermore,the long waiting time of critical sensor nodes located outside the charging range of the energy transmitters is another limitation of the previous works.However,the sensor nodes are equipped with radio frequency(RF)technology,which allows them to exchange energy wirelessly.Consequently,critical sensor nodes located outside the charging range of the WMC can easily receive energy from neighboring nodes.Therefore,in this paper,an energy-efficient and cost-effective wireless power transmission(ECWPT)scheme is presented to improve the network lifetime and performance in forest fire detection-based systems.Simulation results exhibit that ECWPT scheme achieves improved network performance in terms of computational time(12.6%);network throughput(60.7%);data delivery ratio(20.9%);and network overhead(35%)as compared to previous related schemes.In conclusion,the proposed scheme significantly improves network energy efficiency for WSN. 展开更多
关键词 Forest fire detection rechargeable wireless sensor networks wireless mobile charger power constraint sustainable network lifetime
在线阅读 下载PDF
Mobile full-duplex wireless light communication
15
作者 Linning Wang Pengzhan Liu +4 位作者 Yingze Liang Ziqian Qi Zheng Shi Hongbo Zhu Yongjin Wang 《Chinese Optics Letters》 2025年第2期19-24,共6页
Integrating mobile nodes into wireless light communication networks requires overcoming the challenges of light alignment. Here, we use white and blue lights to establish an all-light communication network with mobile... Integrating mobile nodes into wireless light communication networks requires overcoming the challenges of light alignment. Here, we use white and blue lights to establish an all-light communication network with mobile light communication(MLC) links for diverse environments. The integration of visual tracking with a gimbal stabilizer enables tracking and pointing mobile nodes during motion. The MLC achieves a robust transmission control protocol(TCP) connection, maintaining a packet loss of 6.8% and a delay of 48 ms even when the gimbal rotates at speeds exceeding 91.6 deg/s. The network demonstrates full-duplex real-time video communication between mobile and fixed nodes. Furthermore, a minimum requirement for establishing a TCP-based MLC link is presented: the motion time over a given path should exceed the sum of the TCP transmission delay, visual tracking delay, and gimbal rotation time. The mobile all-light communication network holds significant potential for providing various services across diverse environments to different users simultaneously. 展开更多
关键词 all-light communication network full duplex mobile wireless light communication transmission control protocol connection.
原文传递
A Survey on Low Complexity Detectors for OTFS Systems 被引量:8
16
作者 ZHANG Zhengquan LIU Heng +1 位作者 WANG Qianli FAN Pingzhi 《ZTE Communications》 2021年第4期3-15,共13页
The newly emerging orthogonal time frequency space(OTFS)modulation can ob⁃tain delay-Doppler diversity gain to significantly improve the system performance in high mobility wireless communication scenarios such as veh... The newly emerging orthogonal time frequency space(OTFS)modulation can ob⁃tain delay-Doppler diversity gain to significantly improve the system performance in high mobility wireless communication scenarios such as vehicle-to-everything(V2X),high-speed railway and unmanned aerial vehicles(UAV),by employing inverse symplectic finite Fouri⁃er transform(ISFFT)and symplectic finite Fourier transform(SFFT).However,OTFS modu⁃lation will dramatically increase system complexity,especially at the receiver side.Thus,de⁃signing low complexity OTFS receiver is a key issue for OTFS modulation to be adopted by new-generation wireless communication systems.In this paper,we review low complexity OTFS detectors and provide some insights on future researches.We firstly present the OTFS system model and basic principles,followed by an overview of OTFS detector structures,classifications and comparative discussion.We also survey the principles of OTFS detection algorithms.Furthermore,we discuss the design of hybrid OTFS and orthogonal frequency di⁃vision multiplexing(OFDM)detectors in single user and multi-user multi-waveform commu⁃nication systems.Finally,we address the main challenges in designing low complexity OT⁃FS detectors and identify some future research directions. 展开更多
关键词 high mobility wireless communications OTFS ISFFT SFFT delay-Doppler di⁃versity iterative maximum ratio combining(MRC)detection message passing detection
在线阅读 下载PDF
QoS multicast routing protocol in hierarchical wireless MANET 被引量:2
17
作者 LI LaYuan LI ChunLin 《Science in China(Series F)》 2008年第2期196-212,共17页
A wireless MANET is a self-configurable network in which mobile, battery-powered devices dynamically create and change the network topology without relying on any intrastructure or administrative support. It offers un... A wireless MANET is a self-configurable network in which mobile, battery-powered devices dynamically create and change the network topology without relying on any intrastructure or administrative support. It offers unique benefits for certain environments, but there are still several open issues to be resolved before realizing these benefits, including QoS routing, multicasting, and mobility management. Specifically, an efficient QoS multicast routing protocol is needed, This paper presents a hierarchical QoS multicast routing protocol (QMRP) for mobile ad hoc networks. It can provide QoS-sensitive routes in a scalable and flexible way, in the network environment with mobility. In the proposed QMRP scheme, each local node only needs to maintain local multicast routing information and/or summary information of other clusters (or domains) but does not require any global ad hoc network states to be maintained. The QMRP also allows any ad hoc group member to join/leave the multicast group dynamically and supports multiple QoS constraints. This paper presents formal description and main procedures for realizing routing decision process of the QMRP and the proof of correctness and complexity analysis of the protocol. The performance measures of QMRP are evaluated using simulation. The simulation results verify the efficiency and availability of QMRP. 展开更多
关键词 wireless ad hoc networks QoS routing MULTICAST hierarchical routing mobile wireless networks
原文传递
Collaborative Mobile Charging and Coverage 被引量:2
18
作者 吴杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期550-561,共12页
Wireless energy charging using mobile vehicles has been a viable research topic recently in the area of wireless networks and mobile computing. This paper gives a short survey of recent research conducted in our resea... Wireless energy charging using mobile vehicles has been a viable research topic recently in the area of wireless networks and mobile computing. This paper gives a short survey of recent research conducted in our research group in the area of collaborative mobile charging. In collaborative mobile charging, multiple mobile chargers work together to accomplish a given set of ob jectives. These ob jectives include charging sensors at different frequencies with a minimum number of mobile chargers and reaching the farthest sensor for a given set of mobile chargers, subject to various constraints, including speed and energy limits of mobile chargers. Through the process of problem formulation, solution construction, and future work extension for problems related to collaborative mobile charging and coverage, we present three principles for good practice in conducting research. These principles can potentially be used for assisting graduate students in selecting a research problem for a term project, which can eventually be expanded to a thesis/dissertation topic. 展开更多
关键词 Internet of Things mobile charger optimal solution sensor wireless networks mobile computing
原文传递
Distributed Algorithms for Event Reporting in Mobile-Sink WSNs for Internet of Things 被引量:5
19
作者 Catalina Aranzazu-Suescun Mihaela Cardei 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期413-426,共14页
Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT... Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT)and participate in various tasks. WSNs play an important role monitoring and reporting environment information and collecting surrounding context. In this paper we consider a WSN deployed for an application such as environment monitoring, and a mobile sink which acts as the gateway between the Internet and the WSN. Data gathering is a challenging problem in WSNs and in the IoT because the information has to be available quickly and effectively without delays and redundancies. In this paper we propose several distributed algorithms for composite event detection and reporting to a mobile sink. Once data is collected by the sink, it can be shared using the IoT infrastructure. We analyze the performance of our algorithms using WSNet simulator, which is specially designed for event-based WSNs. We measure various metrics such as average residual energy, percentage of composite events processed successfully at the sink, and the average number of hops to reach the sink. 展开更多
关键词 composite events distributed algorithm energy efficiency event-based clustering Internet of Things mobile sink wireless sensor networks
原文传递
Some Issues on Computer Networks:Architecture and Key Technologies 被引量:2
20
作者 顾冠群 罗军舟 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期708-722,共15页
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high perfo... The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies. 展开更多
关键词 computer network tussle resource control network management SECURITY MIDDLEWARE wireless/mobile network modeling high availability network
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部