邹增辉,龚学余,邓贤君,唐祖君.无线传感网可信信息覆盖空洞检测策略研究[J].南华大学学报(自然科学版),2017,31(1):32~38.[ZOU Zeng-hui,GONG Xue-yu,DENG Xian-jun,TANG Zu-jun.A Coverage Hole Detection Algorithm in Wireless Sensor NetworksBased on the Confident Information Coverage Model[J].Journal of University of South China(Science and Technology),2017,31(1):32~38.]
无线传感网可信信息覆盖空洞检测策略研究
A Coverage Hole Detection Algorithm in Wireless Sensor NetworksBased on the Confident Information Coverage Model
投稿时间:2016-12-21  
DOI:
中文关键词:  无线传感器网络  可信信息覆盖模型  覆盖空洞  空间相关性
英文关键词:wireless sensor networks  confident information coverage model  coveragehole  spatial correlationl
基金项目:国家自然科学基金资助项目(61401193);湖南省教育厅资助项目(14C0970;15C1195);南华大学博士科研启动基金资助项目(2014XQD31);湖南省研究生科研创新项目(CX2016B444)
作者单位E-mail
邹增辉 南华大学 电气工程学院,湖南 衡阳 421001 zouzh11@qq.com 
龚学余 南华大学 电气工程学院,湖南 衡阳 421001
南华大学 核科学技术学院,湖南 衡阳 421001 
 
邓贤君 南华大学 电气工程学院,湖南 衡阳 421001  
唐祖君 南华大学 电气工程学院,湖南 衡阳 421001  
摘要点击次数: 957
全文下载次数: 768
中文摘要:
      针对静止无线传感器网络运行过程中的覆盖空洞问题,研究并设计了一种基于可信信息覆盖模型的覆盖空洞检测策略.该策略挖掘和利用感测环境变量的空间相关性,通过栅格化将感测区域划分为多个方格,采用贪婪式策略对方格逐个计算其可信信息覆盖度,将其与可信信息覆盖阈值进行比较,进而判断可信信息覆盖空洞的数目和位置,最大可能地检测出所有可信信息覆盖空洞,并利用图像处理方法提取空洞边界.仿真实验结果表明所设计策略可有效确定可信信息覆盖空洞数目和边界信息.
英文摘要:
      Coverage hole in wireless sensor networks may greatly reduce the network performance.Based on the proposed confident information coverage model,a greedy confident information coverage hole detection algorithm is designed.The algorithm firstly makes full use of the spatial correlation of the monitoring environmental attributes and divides the monitoring area into a series of grids.By greedily calculating the root mean square error of each grid,which is the measure of the confident information coverage,and comparing the calculated value with a given threshold,the algorithm then judges whether the grid is a confident information coverage hole or not.After obtaining the confident information coverage status of each grid,the algorithm extracts the coverage holes’ boundary by image processing methods.Simulation results show that the proposed algorithm can effectively detect the number and the edge of the confident information coverage holes.
查看全文  查看/发表评论  下载PDF阅读器
关闭