• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Kezhong, Chen Weibo, Zhan Zhen, Zhang Jinfen, Fu Qin. Beacon Dynamic Movement Strategy in Node Localization for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(11): 2494-2500.
Citation: Liu Kezhong, Chen Weibo, Zhan Zhen, Zhang Jinfen, Fu Qin. Beacon Dynamic Movement Strategy in Node Localization for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(11): 2494-2500.

Beacon Dynamic Movement Strategy in Node Localization for Wireless Sensor Networks

More Information
  • Published Date: November 14, 2012
  • During the node localization based on mobile beacon in WSNs, the mobile paths of beacon directly affect the efficiency and accuracy of node localization. Considering the limitations of the communication and computational power about the network nodes, a revised virtual gravitation model for beacon movement in node localization is particularly proposed. In the model, the beacon selects its neighbors and gathers the parameters, such as the distance from effective nodes and the number of neighbor nodes and so on. On this basis, a virtual gravitation model for mobile beacon is built, which makes the beacon movements have higher adaptability. Furthermore, for the potential problems of zero gravitation and redundant traversal of these beacons, the model is revised with the method of adding near factors and curve fitting of the located area boundary. Simulation results show that, compared with the typical traditional path planning algorithms, the proposed method shortens the path length of beacon traversal network for 20% to 30%, and greatly saves the energy consumption.
  • Related Articles

    [1]Pei Songwen, Qian Yihuan, Ye Xiaochun, Liu Haikun, Kong Linghe. DRAM-Based Victim Cache for Page Migration Mechanism on Heterogeneous Main Memory[J]. Journal of Computer Research and Development, 2022, 59(3): 568-581. DOI: 10.7544/issn1000-1239.20210567
    [2]Miao Xinliang, Jiang Liehui, Chang Rui. Survey of Access-Driven Cache-Based Side Channel Attack[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581
    [3]Su Wen, Zhang Longbing, Gao Xiang, Su Menghao. A Cache Locking and Direct Cache Access Based Network Processing Optimization Method[J]. Journal of Computer Research and Development, 2014, 51(3): 681-690.
    [4]Tang Yixuan, Wu Junmin, Chen Guoliang, Sui Xiufeng, Huang Jing. A Utility Based Cache Optimization Mechanism for Multi-Thread Workloads[J]. Journal of Computer Research and Development, 2013, 50(1): 170-180.
    [5]Jia Yaocang, Wu Chenggang, Zhang Zhaoqing. Program’s Performance Profiling Optimization for Guiding Static Cache Partitioning[J]. Journal of Computer Research and Development, 2012, 49(1): 93-102.
    [6]Wu Junjie, Yang Xuejun, Zeng Kun, Zhang Baida, Feng Quanyou, Liu Guanghui, and Tang Yuhua. DOOC: A Software/Hardware Co-managed Cache Architecture for Reducing Cache Thrashing[J]. Journal of Computer Research and Development, 2008, 45(12): 2020-2032.
    [7]Zhou Hongwei, Zhang Chengyi, and Zhang Minxuan. A Method of Statistics-Based Cache Leakage Power Estimation[J]. Journal of Computer Research and Development, 2008, 45(2): 367-374.
    [8]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low Power Data Cache Design Based on Very Narrow-Width Value[J]. Journal of Computer Research and Development, 2007, 44(5): 775-781.
    [9]Zhou Xuehai, Yu Jie, Li Xi, and Wand Zhigang. Research on Reliability Evaluation of Cache Based on Instruction Behavior[J]. Journal of Computer Research and Development, 2007, 44(4): 553-559.
    [10]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low-Power Instruction Cache Design Based on Record Buffer[J]. Journal of Computer Research and Development, 2006, 43(4): 744-751.

Catalog

    Article views (921) PDF downloads (521) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return