• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
Citation: Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.

Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network

More Information
  • Published Date: December 14, 2005
  • The Random Waypoint model is a commonly used mobility model in the field of ad hoc network. The spatial probabilistic distribution of this mobility model is deeply studied, and the exact spatial distribution function of the generalized model with pause time and velocity randomly chosen has been obtained both in 1D and 2D region. Simulation results have also validated the distribution functions. Through the exact function it could be seen how pause time and velocity affect the node spatial distribution. The research results provide theoretical foundations for derivations and proofs of ad hoc theories based on the Random Waypoint mobility model. Also the exact distribution is of practical significance in conducting the simulations of performance evaluation based on the Random Waypoint model.
  • Related Articles

    [1]Jiao Pengfei, Chen Shuxin, Guo Xuan, He Dongxiao, Liu Dong. Survey on Graph Neural Ordinary Differential Equations[J]. Journal of Computer Research and Development, 2024, 61(8): 2045-2066. DOI: 10.7544/issn1000-1239.202440192
    [2]Han Songshen, Guo Songhui, Xu Kaiyong, Yang Bo, Yu Miao. Perturbation Analysis of the Vital Region in Speech Adversarial Example Based on Frame Structure[J]. Journal of Computer Research and Development, 2024, 61(3): 685-700. DOI: 10.7544/issn1000-1239.202221034
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [7]Cui Zhen, Shan Shiguang, Chen Xilin. Structured Sparse Linear Discriminant Analysis[J]. Journal of Computer Research and Development, 2014, 51(10): 2295-2301. DOI: 10.7544/issn1000-1239.2014.20130188
    [8]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [9]Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation[J]. Journal of Computer Research and Development, 2010, 47(9): 1654-1662.
    [10]Wu Jiying and Ruan Qiuqi. A Curvature-Driven Image Inpainting Model Based on Helmholtz Vorticity Equation[J]. Journal of Computer Research and Development, 2007, 44(5): 860-866.

Catalog

    Article views (879) PDF downloads (885) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return