[1] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[4] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[5] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[6] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[7] |
WU Hang, JIANG Hong.
Collaborative Filtering Recommendation Integrating Potential Social Trust Model
[J]. Computer Engineering and Applications, 2019, 55(20): 114-121.
|
[8] |
ZHANG Yuanyuan, WU Huafeng, XIAN Jiangfeng, MEI Xiaojun.
Adaptive Clustering Algorithm in Ocean Wireless Sensor Network Under Double Constraints
[J]. Computer Engineering and Applications, 2019, 55(19): 128-133.
|
[9] |
ZOU Shanhua, GAO Yi, PENG Li.
Research and Design of Event-Driven Control Strategy for Stochastic Systems
[J]. Computer Engineering and Applications, 2019, 55(17): 100-106.
|
[10] |
JI Xiaohui, SUN Zeyu, YAN Ben, LI Chuanfeng.
WSN Coverage Control Algorithm Based on Joint Node Behavior Strategy
[J]. Computer Engineering and Applications, 2019, 55(16): 99-107.
|
[11] |
HU Xiaohui, GONG Junhui, XU Ning, DU Yongwen.
Cross-Layer Optimized WSN Energy Balanced Topology Game Algorithm
[J]. Computer Engineering and Applications, 2019, 55(14): 69-75.
|
[12] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[13] |
CHEN Yehai, ZHENG Rirong, XU Liang.
Improved Localization Algorithm of Multiple Communication Radius DV-Hop Based on Evolutionary Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 89-95.
|
[14] |
ZHU Jie1, LU Yi2, ZHANG Huiming1.
Path replanning for UAV in emergent threats
[J]. Computer Engineering and Applications, 2018, 54(8): 255-259.
|
[15] |
ZHAO Yihong, WANG Ze, ZHANG Haijuan.
Dynamic beacon spanning tree algorithm for sensor localization
[J]. Computer Engineering and Applications, 2018, 54(6): 68-74.
|