• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Hongjun, Bu Yanlong, Xue Han, Li Xun, and Ma Hongxu. Path Planning for Mobile Anchor Node in Localization for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(1): 129-136.
Citation: Li Hongjun, Bu Yanlong, Xue Han, Li Xun, and Ma Hongxu. Path Planning for Mobile Anchor Node in Localization for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(1): 129-136.

Path Planning for Mobile Anchor Node in Localization for Wireless Sensor Networks

More Information
  • Published Date: January 14, 2009
  • Localization is a key technology in wireless sensor networks (WSN). Many applications and middleware of WSN require the sensor nodes to obtain their locations. The accuracy of collected data can significantly be affected by an imprecise positioning of the event of interest. The main idea in most localization methods has been that some nodes with known coordinates (e.g., GPS-equipped nodes) transmit beacons with their coordinates in order to help other nodes to localize themselves. In this case, a fundamental research issue is the planning of the path that the mobile anchor should travel along. In this paper the authors study the path planning of the mobile anchor in localization for wireless sensor networks. Considering the graph theory, wireless sensor network is regarded as a connected undirected graph and then the path planning problem is translated into having a spanning tree and traversing graph. Breadth-first (BRF) and backtracking greedy (BTG) algorithms for spanning tree are proposed. The differences in performance between the two algorithms are analyzed. The BRF and BTG algorithms are effective and realistic algorithms that work in actual implementation. The simulations and real experiments show that these algorithms obtain higher localization precision and are robust in localization for the randomly deployment of the sensor nodes.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (875) PDF downloads (631) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return