[1] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[4] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[5] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[6] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[7] |
ZOU Shanhua, GAO Yi, PENG Li.
Research and Design of Event-Driven Control Strategy for Stochastic Systems
[J]. Computer Engineering and Applications, 2019, 55(17): 100-106.
|
[8] |
JI Xiaohui, SUN Zeyu, YAN Ben, LI Chuanfeng.
WSN Coverage Control Algorithm Based on Joint Node Behavior Strategy
[J]. Computer Engineering and Applications, 2019, 55(16): 99-107.
|
[9] |
HU Xiaohui, GONG Junhui, XU Ning, DU Yongwen.
Cross-Layer Optimized WSN Energy Balanced Topology Game Algorithm
[J]. Computer Engineering and Applications, 2019, 55(14): 69-75.
|
[10] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[11] |
CHEN Yehai, ZHENG Rirong, XU Liang.
Improved Localization Algorithm of Multiple Communication Radius DV-Hop Based on Evolutionary Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 89-95.
|
[12] |
ZHAO Yihong, WANG Ze, ZHANG Haijuan.
Dynamic beacon spanning tree algorithm for sensor localization
[J]. Computer Engineering and Applications, 2018, 54(6): 68-74.
|
[13] |
ZHU Li1, LI Aiping1, DUAN Liguo1, LI Xiaowei2.
WSN data compression method based on spatial correlation and grey model
[J]. Computer Engineering and Applications, 2018, 54(20): 87-92.
|
[14] |
XU Yong, ZHA Qianming, KE Mengya, LIU Fen.
Phantom routing design for source location protection
[J]. Computer Engineering and Applications, 2018, 54(19): 88-93.
|
[15] |
LI Tengyu, YI Xiaomei, CHEN Shi.
RSSI based weighted centroid and GASA optimization of WSN localization algorithm
[J]. Computer Engineering and Applications, 2017, 53(6): 118-121.
|