• Volume 23,Issue zk1,2012 Table of Contents
    Select All
    Display Type: |
    • Localization in Wireless Sensor Network with Heuristic Mobile Beacons

      2012, 23(zk1):1-8. CSTR:

      Abstract (3619) HTML (0) PDF 697.68 K (6239) Comment (0) Favorites

      Abstract:Moving the path of the beacon has an important impact on the localization performance in a wireless sensor network with mobile beacons; however, without full consideration of the influences of the distribution and density unknown nodes’ when planning beacon’s moving path, most of existing localization methods have lower efficiency. In this paper, the beacon model is first presented according to the theory of equal distance 3-optimal-coverage. Next, a heuristic path planning method is proposed for the ROI in which unknown nodes are distributed randomly, and the node density is limited by using the location mechanism of RSSI to locate range-free, unknown nodes. Simulation results show that the given method is effective.

    • Normal Score Test Data Fusion Method Based on Sliding Window for Wireless Sensor Networks

      2012, 23(zk1):9-16. CSTR:

      Abstract (3214) HTML (0) PDF 659.26 K (5116) Comment (0) Favorites

      Abstract:Due to the declining accuracy caused by noise in wireless sensor networks, a data fusion method called normal score test, based on sliding window, is proposed. With this method, a measured data sample in a cycle is taken as a sliding window, and a double sample normal score test is employed into samples. Furthermore, a relationship matrix is created to maximize the adjacent subgraph. An estimated fusion value is achieved in terms of weighting and averaging its vertices. To some extent, this method makes good use of the character of a normal score test and restrains the impact noise on fusion. Simulation results demonstrate the effectiveness of proposed method.

    • Multi-Hop Routing Protocol Based on Double Cluster Head Alternation and Compressed Sensing for Wireless Sensor Networks

      2012, 23(zk1):17-24. CSTR:

      Abstract (3904) HTML (0) PDF 703.87 K (6097) Comment (0) Favorites

      Abstract:A multi-hop routing protocol, based on double cluster head alternation and compressed sensing (DCHACS), is proposed to improve network’s performance in wireless sensor networks. In DCHACS, a distributed algorithm is adopted to select temporary cluster heads, and the temporary cluster heads use a neighbor cluster optimization algorithm to dynamically adjust the size of the cluster through local information. After optimization, temporary cluster heads re-selects better cluster heads by residual energy and location information of member nodes. In the data transmission phase, the double cluster head alternation mechanism is adopted to reduce the burden of cluster head, and cluster heads use compressed sensing theory to aggregate data and route the packets to the next hop. The cluster head replacement mechanism is adopted to replace old cluster head with the new one under certain conditions. The simulation results show that the proposed protocol is able to enhance the clustering performance, make the distribution of cluster’s size more uniform, and significantly reduces the number of lost packets that are due to the death of cluster head to balance the energy consumption of the network and extend the network’s lifetime.

    • Dynamic Cloud Resources Allocation Based on SMDP

      2012, 23(zk1):25-37. CSTR:

      Abstract (4315) HTML (0) PDF 883.38 K (6338) Comment (0) Favorites

      Abstract:With mobile cloud computing system architecture gradually replacing the traditional Client-Server model, one of the most critical issues that needs to be addressed is the resource allocation deciding problem to resolve how a cloud could efficiently handle the cloud resources to satisfy the requirements of mobile device for cloud services. Simoultaneously, this is in effort to obtain the maximal utilization rate of cloud resources and system rewards of cloud. The study first proposes a novel cloud computing resource allocation model based on semi-Markov decision process (SMDP) to achieve the optimal resource allocation scheme in terms of maximal system reward, cloud resource utilization, and the QoS of mobile device while capturing the dynamics of resource request arrivals and departures. Finally, the performance of the proposed model is evaluated by the simulation results, which show that the obtained theoretic results are consistent with this simulation results.

    • Deploying Airborne MSNs Based on Charged Particle Swarms Model

      2012, 23(zk1):38-48. CSTR:

      Abstract (3718) HTML (0) PDF 993.23 K (5891) Comment (0) Favorites

      Abstract:With the development of small scale unmanned aerial vehicles, researchers are paying more and more attention to airborne mobile sensor networks (MSNs) which are potentially used in various application areas. However, existing deployment strategies are not suitable to this new style of networks. On one hand, aerial nodes are free of movement in the three-dimensional space. Collision prevention has to be implemented, while flocking together as a whole also needs to be done first. On the other hand, against concrete coverage objectives, a key area should be multiply treated and an average region should be generally served. Therefore, the research first looks for new algorithms and models for specific airborne characteristics. Based on the idea of charged particle swarms, this paper chooses the fitness function as the breakthrough and uses fuzzy measure as the performance evaluation index of candidate solutions. Simulation results witness the effectiveness of charged swarm strategy to traditional particle swarm and virtual forces strategies.

    • Method for Identifying Node Dissemination Capability in Opportunistic Social Networks

      2012, 23(zk1):49-58. CSTR:

      Abstract (4366) HTML (0) PDF 2.84 M (7506) Comment (0) Favorites

      Abstract:Although socially aware opportunistic communication paradigms are considered to have broad potential applications, very little is known about how the dynamic networks evolve and which nodes are more important both in sustaining the network topology and in forwarding or disseminating messages. Through the concept of walk and the adjacent matrix product of static graph theory, this paper extends a measurement, Katz Centrality (KC) that originated from Social Networks Analysis (SNA), to dynamic evolving opportunistic mobile networks. This is done in effort to examine the dissemination capabilities of different mobile nodes. The cornerstone of this method is the dynamics of an opportunistic contact network can be expressed through time-split observations, which result in a sequence of snapshots. By simply multiplying the adjacent matrix of each snapshot along the direction of time, the resulting matrix, in which the spatial and temporal dependency of the network are fully captured, can be obtained, so as to evaluate the relative information dissemination capability of each mobile node. The research uses two typical contact trace datasets for validation and the results show that several mobile nodes with the highest communicability identified by this method are more efficient in information dissemination than others in the whole network and can be chosen as good candidates when some interventions, such as accelerating or suppressing the speed of message dissemination in network, are required to be made on network.

    • Deployment Algorithm for Wireless Sensor Network with Irregular Sensing Range

      2012, 23(zk1):59-68. CSTR:

      Abstract (3702) HTML (0) PDF 1.32 M (6101) Comment (0) Favorites

      Abstract:For irregular sensing range of sensor nodes, the paper proposes a randomly deployment wireless sensor network algorithm based on the Delaunay triangulation and grid. In the deployment algorithm, sensor nodes that have already been started are grouped by Delaunay triangulation, which then calculates the target point TP by the TPM algorithm and chooses the TP as a reference point to start a new node. This algorithm adjusts TP in accordance with grid coverage around nodes and the distance between nodes. The paper also proposes a “border reinforcement mechanism” and “obtuse triangle TP-point optimization strategy” to improve coverage effectively. Experimental results show that the proposed deployment algorithm can effectively use randomly deployed sensor nodes. It can quickly raise coverage to 90% or more and has the feature that makes the redundant cover region less, the coverage rate growing fast, and small amount of nodes can achieve high coverage.

    • Cross Layer Based Energy-Efficient MAC Protocol for Wireless Sensor Network

      2012, 23(zk1):69-76. CSTR:

      Abstract (3093) HTML (0) PDF 632.96 K (6024) Comment (0) Favorites

      Abstract:The MAC (medium access contro1) protocol of traditional wireless sensor network has a problem with the high energy consumption of nodes. This paper proposes a CLEE-MAC (cross layer based energy-efficient MAC) protocol using the thought of cross-layer design, based on adaptive S-MAC (sensor MAC) protocol. The CLEEMAC protocol changes the format of control packets of S-MAC protocol with the information coming from a routing layer. It makes the most and reduces the overhearing listening, and at the same time, simplifies the control overhead of multi-hop transmission, improves the utilization of nodes energy, and reduces the delay of data transmission.

    • Modeling of Burstiness for IEEE 802.15.4 Radio Link and Optimizing for Retransmission Mechanism in Industrial Environments

      2012, 23(zk1):77-86. CSTR:

      Abstract (3919) HTML (0) PDF 860.00 K (5700) Comment (0) Favorites

      Abstract:For the applications of wireless sensor networks in typical industrial environments, the wireless link quality of IEEE 802.15.4 has a certain degree of fluctuation and packets loss appear bursty. In this paper, a data-trace-driven modeling method and statistical inference is adopted for the statistical analysis of the loss interval in link-layer packet transmission traces. The study finds that the loss interval follows Pareto distribution and the distribution parameter reflects the distribution characteristics of loss interval under a different packet loss rate. Take the Dα, namely correlation distance, which is the difference between the sample distribution parameter and that of the independent identical distribution under the same packet loss rate, as the indicator to characterize burstiness of packet loss. Through analysis and experiments, it is indicated that the retransmission independence distance (RID) in the link-layer has an approximate linear relation to the correlation distance. The study designs an optimal data retransmission mechanism using the indicator Dα in single-hop links, which can improve data retransmission reliability. Finally, it is verified by experiments that the average of reliability improvement is 6.3% with the maximum 14.5%, which is relative to the fixed time-slot retransmission mechanism that does not consider the packets loss burstiness.

    • City Bus Arrival Time Prediction Based on Similarity of Road Conditions

      2012, 23(zk1):87-99. CSTR:

      Abstract (3994) HTML (0) PDF 1.48 M (8980) Comment (0) Favorites

      Abstract:Currently, bus arrival time prediction studies have not yielded the best results under complex road conditions. A bus arrival time prediction mechanism based on the similarity of road conditions is proposed in this paper. By analyzing the past trip records of the bus, the historical traffic condition of each road section was estimated. The road condition for each trip records was extracted. In the operational phase, each road section’s traffic condition was estimated by gathering bus locations continually. The mechanism predicted bus arrival time for the rest bus station by the most similar historical which was searched by the time, distance, and real-time road conditions. The evaluation result using historical data of real bus trips shows that the arrival time prediction of the mechanism is accurate—with an absolute percentage error around 5%.

    • Improved GPSR Routing Algorithm in Hybrid VANET Environment

      2012, 23(zk1):100-107. CSTR:

      Abstract (4100) HTML (0) PDF 1.07 M (7608) Comment (0) Favorites

      Abstract:The rapid movement of vehicles which result in frequent changes in the position and speed of the vehicle usually leads to the wrong packet forwarding decisions in VANET. Combining V2V (vehicle to vehicle) and V2I (vehicle to infrastructure), a routing protocol named TGPSR-WI (traffic information aware algorithm based on GPSR with infrastructure) algorithm is proposed. This algorithm works on the principle that when static infrastructural nodes exist in a neighboring list, the neighbor which is closest to the destination will be selected as the next hop; otherwise, the moving direction and “lifetime” are used to filter hopeless candidates. Next, incorporate speed, vehicular density, etc. to select the optimal next hop node. Key data structures are designed and MOVE (mobility model generator for vehicular network) is used to construct typical Grid map urban simulation scenario. The protocol is simulated in NS-2 under the urban scenario and compared with GPSR-L and GPSR routing protocols. Experimental results indicate that the improved GPSR routing protocol performs better when packet delivery rate, average end-to-end delay are used as the performance metrics, and is better for VANET (vehicular ad hoc network) under urban scenarios.

    • Approximate Aggregation Algorithm for Weighted Data in Wireless Sensor Networks

      2012, 23(zk1):108-119. CSTR:

      Abstract (3365) HTML (0) PDF 1.15 M (5230) Comment (0) Favorites

      Abstract:In wireless sensor networks, a weighted aggregation is an important method for the users to obtain the information when monitoring the environment. This method enforces the objectivity of the aggregation result by assigning different weights to different nodes or sensed data. On the other hand, the WSNs are both energy constraint and unstable, so it is better to do the approximate data aggregation if one can ensure the error-bound is tolerable for the users. A group-based sampling algorithm for approximate weighted aggregation is proposed. The theoretical analysis demonstrates that the proposed algorithm can reach arbitrary precision. Furthermore, the proposed algorithm is scalable, and it can adapt to large-scale dynamic sensor networks, and support the modification of the precision during the processing of a query. Experimental results show the correctness of the proposed algorithm and demonstrates the high performance of the proposed algorithm by comparing it with previous algorithms.

    • Differentiated Priority Queue Management in Event-Driven Wireless Sensor Networks

      2012, 23(zk1):120-125. CSTR:

      Abstract (2945) HTML (0) PDF 1.22 M (5255) Comment (0) Favorites

      Abstract:In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking this transport property into account, a differentiated priority queue management scheme is presented, in which the packets with same event identification are prioritized according to their arrival sequence, and scheduled differentially. The queue model, packet prioritization strategy and event table maintaining methods are examined in detail. Simulation results show that the queue management scheme can improve event reliability of event-driven sensor networks in terms of event detection ratio, accuracy ratio, and event delay efficiently.

    • Fault-Tolerant Time Synchronization Protocol for Wireless Sensor Networks

      2012, 23(zk1):126-133. CSTR:

      Abstract (3707) HTML (0) PDF 631.55 K (5713) Comment (0) Favorites

      Abstract:Time synchronization protocol is an important part of wireless sensor networks. Many applications and communication protocols of wireless sensor networks are built on the basis of an accurate synchronized timing. The previous time synchronization protocol for wireless sensor networks focuses on how to improve the accuracy and reduce related energy consumption, but now the security problem of time synchronization protocol in wireless sensor networks is catching people’s attention. This paper designs a new fault-tolerant time synchronization protocol (FTTSP) for wireless sensor networks with random weighting estimation, based on the analysis for the attack to time synchronization protocol for wireless sensor networks. Simulation results show that the protocol has good intrusion detection capability and fault tolerance to malicious synchronization information.

    • Multi-Sensor Data Fusion Algorithm Based on Optimal Fusion Set

      2012, 23(zk1):134-140. CSTR:

      Abstract (3754) HTML (0) PDF 625.41 K (10598) Comment (0) Favorites

      Abstract:By focusing on the multi-sensors’ measurement on the same characteristic index from different directions, a multi-sensor data fusion algorithm based on optimal fusion set is proposed. The optimal fusion set is defined to obtain the valid observation data, in which the consistent fusion degree and the distribution degree of sensors are measured by using an optimal fusion degree matrix set. Next, the weights of the valid observation data in the fusion process are reasonably assigned. The final expression of data fusion and estimation is obtained. The data fusion results show that this method demonstrates higher fusion precision, and also excellent.

    • Position-Based and Connectivity Aware Routing Algorithm in Vehicular Ad Hoc Networks

      2012, 23(zk1):141-148. CSTR:

      Abstract (2929) HTML (0) PDF 553.80 K (5347) Comment (0) Favorites

      Abstract:Based on the analysis of proposed routing protocols in vehicular ad hoc networks (VANETs), this paper gives a new algorithm PCAR(position-based and connectivity aware routing) by combining the position information and the network connectivity. The algorithm also takes advantage of the vehicle density information to estimate the network connectivity and selects anchor nodes and the routing based on the weight of the road. Next it gives the extended greedy forwarding strategy based on the velocity and direction of vehicles. Compared to the GPSR and GSR, the simulations show that PCAR is good for VANETs in the city scenario and has a more efficitn delivery rate and transmission delay.

    • GM(1,1) Based Target Tracking Algorithm in Wireless Sensor Networks

      2012, 23(zk1):149-158. CSTR:

      Abstract (3554) HTML (0) PDF 562.26 K (6272) Comment (0) Favorites

      Abstract:To help resolve the deficiency of existing target tracking algorithm in sensor networks, a GM(1,1) based target tracking algorithm (GMTT) is proposed in this paper. GMTT treats the target tracking issue in sensor networks as a state prediction problem of inadequate-information system and applies the gray theory to deal with this issue. It makes use of the GM(1,1) model to predict the region where the target may arrive in the next moment, and forwards tracking messages to this predicted region to detect and track the target with dense nodes. Simulations demonstrate that GMTT processes good merits in tracking probability, tracking precision and tracking delay.

    • Intention Oriented Itinerary Recommendation by Bridging Physical Trajectories and Online Social Networks

      2012, 23(zk1):159-168. CSTR:

      Abstract (4196) HTML (0) PDF 1.04 M (7736) Comment (0) Favorites

      Abstract:Human itineraries are often initiated by some general intentions and will be optimized after considering all kinds of constraints and available information. This paper proposes a category-based itinerary recommendation framework to help the user transfer from intentions to itinerary planning, which join physical trajectories and information of location based social networks. The main contributions are: (1) Build the category based activity scheduling model; (2) Design and implement the category tree based POI (point or interest) query strategy and algorithm; (3) Propose the Voronoi graph based GPS trajectory analysis method to build traffic information networks; (4) Combine social networks with traffic information networks to implement category based recommendation by ant colony algorithm. The study conducts experiments on datasets from FourSquare and GeoLife project. A test on satisfaction of recommended items is also performed. Results show that the satisfaction reaches 80% in average.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063