【摘 要】
:
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global convergence.For the
【机 构】
:
Fujian Institute of Scientific and Technology Information,Fuzhou 350003,Fujian,China;Fujian Strait I
【出 处】
:
第六届中国可信计算与信息安全学术会议
论文部分内容阅读
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global convergence.For the sensor network deployed in a three-dimensional region,this paper proposes a localization method using stochastic particle swarm optimization.After measuring the distances between sensor nodes,the sensor nodes estimate their locations using stochastic particle swarm optimization,which guarantees the global convergence of the results.The simulation results show that the localization error of the proposed method is almost 40% of that of multilateration,and it uses about 120 iterations to reach the optimizing value,which is 80 less than the standard particle swarm optimization.
其他文献
Although there exist a few good schemes to protect the kernel hooks of operating systems,attackers are still able to circumvent existing defense mechanisms with spurious context information.To address
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequ
This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method wit
Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,and they can help program designers for evalu
It is difficult for security experts to generate polymorphic signatures by using traditional string mining and matching techniques.A semantic-aware method is presented to generate a kind of two-level
Nowadays,the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases.One of the challenges is that digital devices and applications are
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible w