[1] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[4] |
TAN Chaoqun, LIU Fei.
Event-Triggered Control for Piecewise Affine System with Parameter Perturbation and Time-Delays
[J]. Computer Engineering and Applications, 2020, 56(1): 232-237.
|
[5] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[6] |
Event-Triggered Output Feedback H∞ Control for Networked Markov Type Systems.
Event-Triggered Output Feedback H∞ Control for Networked Markov Type Systems
[J]. Computer Engineering and Applications, 2019, 55(6): 231-236.
|
[7] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[8] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[9] |
ZOU Shanhua, GAO Yi, PENG Li.
Research and Design of Event-Driven Control Strategy for Stochastic Systems
[J]. Computer Engineering and Applications, 2019, 55(17): 100-106.
|
[10] |
JI Xiaohui, SUN Zeyu, YAN Ben, LI Chuanfeng.
WSN Coverage Control Algorithm Based on Joint Node Behavior Strategy
[J]. Computer Engineering and Applications, 2019, 55(16): 99-107.
|
[11] |
HU Xiaohui, GONG Junhui, XU Ning, DU Yongwen.
Cross-Layer Optimized WSN Energy Balanced Topology Game Algorithm
[J]. Computer Engineering and Applications, 2019, 55(14): 69-75.
|
[12] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[13] |
CHEN Yehai, ZHENG Rirong, XU Liang.
Improved Localization Algorithm of Multiple Communication Radius DV-Hop Based on Evolutionary Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 89-95.
|
[14] |
WANG Jianfeng, JIANG Shun, PAN Feng.
Class of network control systems with non-fragile dissipative filter design
[J]. Computer Engineering and Applications, 2018, 54(7): 114-120.
|
[15] |
ZHAO Yihong, WANG Ze, ZHANG Haijuan.
Dynamic beacon spanning tree algorithm for sensor localization
[J]. Computer Engineering and Applications, 2018, 54(6): 68-74.
|