CN103338477B - A kind of intrusion target detection method based on road and system - Google Patents
A kind of intrusion target detection method based on road and system Download PDFInfo
- Publication number
- CN103338477B CN103338477B CN201310200502.4A CN201310200502A CN103338477B CN 103338477 B CN103338477 B CN 103338477B CN 201310200502 A CN201310200502 A CN 201310200502A CN 103338477 B CN103338477 B CN 103338477B
- Authority
- CN
- China
- Prior art keywords
- node
- road
- cycle
- network
- intrusion target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of intrusion target detection method based on road and system.Method includes: step one, within a network work cycle, according to by protecting point to the direction of entrance, wakes up the node on road successively up;Step 2, after node is waken up, work within a network work cycle node cycle, within a node cycle, node is alternately revived and sleeps k time respectively, in period of reviving, node has detected whether intrusion target in its detection region, and report testing result, during sleeping, node does not perform detection;Step 3, node, when the node end cycle of self, enters sleep state;Step 4, it is judged that whether node is last node on road, if all nodes then in network fully enter resting state, until the next network work cycle, otherwise, sequentially wakes up the next node of this node on road up, performs step 2.The present invention is effectively improved Network morals.
Description
Technical field
The present invention relates to wireless sensor network, particularly relate to a kind of intrusion target detection side based on road
Method and system.
Background technology
Conventional algorithm of target detection is the target of random movement, Ye Jikai in being the most only absorbed in detection region
Put the detection covering problem of two-dimensional space.Intrusion target test problems based on road is different from general mesh
Mark test problems has 2 points: (1) target is always along road, advance at limited speeds;(2) specific inspection
Road distribution situation etc. in the range of survey is typically readily available.When formulating algorithm, these premise information
In accordance with convention, human observer can be easy to grasp;And do not utilize the algorithm of target detection of these information front
State in road target detection scene and seem and inapplicable or inefficiency.And for high maneuverability or can
The consideration of transplantability, it is impossible to sensor node is positioned over simply entrance or mobile target destination, and
It it is the deployment way needing a system-wide net scope.J.Jeong et al. is studying low duty based on road
Ratio, on the basis of Sensor Network location algorithm, proposes one for this type of scene first and moves on restriction path
Algorithm of target detection VISA(Virtual Scanning Algorithm, virtual scan algorithm).
VISA takes full advantage of the information that human observer can be grasped, it is achieved thereby that WSN(Wireless Sensor
Network, wireless sensor network) being greatly improved of network lifetime.VISA algorithm) at a length of l
Detection section on, dispose n wireless sensor node.Intrusion target is from entrance (hereinafter referred to as E point)
To protection point (hereinafter referred to as P point) motion, (its maximal rate is vmax);And sensor node is just like void
Intend that scanning ripple is the same is reversely revived one by one to entrance E by protection point P and be monitored, in void along disposing road
Intend the whole network dormancy l/v after scanning completesmaxTime.VISA ensure target must be detected in the case of,
(Duty-Cycle) mode of reviving simultaneously than the whole network-sleep significantly reduces node dutycycle, improves
Network lifetime.If but VISA wants to continue to improve network lifetime, and it is only capable of relying on and continues to increase deployment
Interstitial content so that it is range of application is limited.And in the case of finite energy, improve nothing to greatest extent
The vital stage of line sensor network is a hot issue of great interest.
Summary of the invention
The technical problem to be solved is to provide a kind of intrusion target detection method based on road
And system, it is possible in the case of finite energy, improve the vital stage of wireless sensor network.
For solving above-mentioned technical problem, the present invention proposes a kind of intrusion target detection side based on road
Method, including:
Step one, within a network work cycle, according to by protecting point to the direction of entrance, calls out successively
Node on awake road;
Step 2, after described node is waken up, worked within a described network work cycle node
In the cycle, within a described node cycle, described node is alternately revived and sleeps k time respectively, k
For natural number, k value presets, and revives period described, and described node detects in its detection region
Whether having intrusion target, and report testing result, during described sleep, described node does not perform detection;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if then network
Interior all nodes fully enter resting state, until the next network work cycle, otherwise, suitable
Secondary wake up the next node of described node on described road up, perform step 2.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, road
The detection region of upper adjacent two nodes partly overlaps, and the sequence of reviving-sleep at two adjacent nodes is cut
Change the middle increase T length of one's sleepoverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent
The overlapping detection regions length of field of adjacent two nodes, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described
Node is alternately revived and sleeps respectively during k time, the length of one's sleep between reviving for adjacent twice
TintervalMaximum be 2r/vmax, wherein, r is the detection radius of node, vmaxFor intrusion target
Big movement velocity.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described
The mode that node is waken up is: is waken up up instruction triggers by receive and is revived, or, by presetting
Timer clock trigger and revive.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described
Node is when the node end cycle of self, before entering a sleep state, to next of its Way in
Individual node sends and wakes up instruction up, subsequently into sleep state.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, described
The lasting maximum duration of resting state is l/vmax, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detection method based on road also can have the characteristics that, in inspection
Initializing before survey, described initialization includes arranging detection parameter, and described detection parameter includes described
Network work cycle, described node cycle and node a network work cycle revive and sleep each
From number of times k.
For solving above-mentioned technical problem, the invention allows for the detection of a kind of intrusion target based on road is
System, including:
Wake module, within a network work cycle, puts to the direction of entrance according to by protection,
Wake up the node on road successively up;
The detection module setting number being arranged on network node, for being called out by described at its place node
Wake up after data bits, work within a described network work cycle node cycle, described in one
In the node cycle, alternately reviving and sleep k time respectively, k is natural number, and k value presets,
Revive period described, in its detection region, detected whether intrusion target, and report testing result,
During described sleep, do not perform detection;
Control module, for when the node end cycle of described node self, controls described node and enters
Sleep state;
Judge module, for judging whether described node is last node on described road, if
Then all nodes in network fully enter resting state, until the next network work cycle, no
Then, notify that described wake module sequentially wakes up the next node of described node on described road up.
Further, above-mentioned intrusion target detecting system based on road also can have the characteristics that, road
The detection region of upper adjacent two nodes partly overlaps, and described intrusion target detecting system based on road is also
Including increasing module, described increase module is for reviving-sleeping in sequence switching at two adjacent nodes
Between increase the length of one's sleep Toverlap, ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent two phases
Neighbors overlapping detection regions length of field, vmaxMaximum movement speed for intrusion target.
Further, above-mentioned intrusion target detecting system based on road also can have the characteristics that, also wraps
Including initialization module, described initialization module is arranged on the concentrator of network, for entering before testing
Row initializes, and described initialization includes arranging detection parameter, and described detection parameter includes described network work
Cycle, described node cycle and node are at the respective number of times k reviving and sleeping in a network work cycle.
The intrusion target detection method based on road of the present invention and system, in the case of finite energy,
By allowing a node alternately revive within a network work cycle and to sleep repeatedly, make node
Dutycycle is reduced, thus is effectively improved Network morals.Further, the present invention also enters one
Step utilizes the detection overlapping region between adjacent node to increase the length of one's sleep of node further, makes accounting for of node
The reduction further of empty ratio, thus improve Network morals to greatest extent.
Accompanying drawing explanation
Fig. 1 is the work schedule schematic diagram of each node when being k=3;
Fig. 2 is territory, adjacent node overlapping detection regions schematic diagram;
Fig. 3 is the structural representation of intrusion target detecting system based on road in the embodiment of the present invention.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, example is served only for explaining this
Invention, is not intended to limit the scope of the present invention.
The central scope of the present invention is: allow each node in network revive within a network work cycle
Awake-sleep (the most alternately revive and sleep) k time, thus reduce the dutycycle of node, improve network
Life cycle.Specifically, present invention intrusion target based on road detection method can include walking as follows
Rapid:
Step one, within a network work cycle, according to by protecting point to the direction of entrance, calls out successively
Node on awake road;
Step 2, after described node is waken up, worked within a described network work cycle node
In the cycle, within a described node cycle, described node is alternately revived and sleeps k time respectively, k
For natural number, k value presets, and revives period described, and described node detects in its detection region
Whether having intrusion target, and report testing result, during described sleep, described node does not perform detection;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if then network
Interior all nodes fully enter resting state, until the next network work cycle, otherwise, suitable
Secondary wake up the next node of described node on described road up, perform step 2.
Wherein, k value can improve ginseng according to the network lifetime that the energy content of battery of node and user to be reached
Number determines.
Further, the present invention also utilizes the detection overlapping region between adjacent node to increase sensor further
The length of one's sleep of node, reduce the dutycycle of node further, thus improve the Life Cycle of network further
Phase.
The present invention is applicable to all networks being monitored based on road, including wireless sensor network.Under
The principle of the present invention, as a example by wireless sensor network, is further illustrated most by face.Wireless sensor network
In " node " be sensor node.
The definition of the relevant parameter arrived referred to herein is as shown in table 1.
Table 1 relevant parameter definition table
In table 1, ToverlapMaximum not can exceed that Oi,i+1/vmax, i.e. Toverlap0 to Oi,i+1/vmaxIt
Between value can guarantee to detect target, and once ToverlapValue is more than Oi,i+1/vmaxThen it is likely to result in
Target missing inspection.Oi,i+1/vmaxIt is ToverlapOptimum value.Equally, TintervalMaximum not can exceed that
2r/vmax, say, that Tinterval0 to 2r/vmaxBetween value be all able to ensure that and intrusion target detected,
Exceed 2r/vmaxThen can cause missing inspection.2r/vmaxIt is TintervalOptimum value.
Below by embodiment, the principle of the present invention is described further.
Can first initialize before testing, initialize and include arranging detection parameter.Detection parameter
Including the network work cycle, node cycle and k value (i.e. node a network work cycle revive and
The respective number of times of sleep).Wherein, the network work cycle can open up according to the network of wireless sensor network
Flutter the network life that figure (can obtain at map vendors), every node energy content of battery and user to be reached
Parameter θ, every node minimum detection time that the life phase improves determine.
In embodiments of the present invention, if need not Reparametrization, then need not initialization procedure.
Assuming that node was revived k time in each network work cycle, each recovery time is w (Twork=w)。
When virtual scan ripple arrives node, node is made to revive and the T that worksworkTime, then dormancy TintervalTime
Between, live again work TworkTime, then secondary dormancy Tinterval... when this node is revived in kth time
TworkAfter, will scanning wave loops to next node, next node is revived T immediatelywork..., when
Scanning ripple is after P point is delivered to E point, namely terminates apart from the sensor node detection that link entry is nearest
After, the whole network dormancy Tsilent, then start next scan period (namely network work cycle).Wherein
The T length of one's sleep between reviving for twiceinterval, TintervalMaximum be taken as 2r/vmax, wherein, r is joint
The detection radius of point, vmaxMaximum movement speed for intrusion target.Even if this length of one's sleep is able to ensure that
Intrusion target passes through the detection region at node place with maximal rate, and node is still able to detect that invasion mesh
Mark.Fig. 1 illustrates the work schedule of each node.In Fig. 1, T is scanning resident at each node of ripple
Time.When the territory, overlapping detection regions considered between two adjacent nodes, PiNode revive (w) for the last time
And Pi+1First time revive T between (w), will be increasedoverlap, this will be further increased Network morals.
Except the scanning ripple triggering mode being mentioned above, in other embodiments of the present invention, wake up node up
Mode it may also is that wake up node up by waking up instruction triggers up, or, during by default timing
Clock triggers and wakes up node up.Sensor node, can be to its Way in when a node end cycle
Next sensor node send wake up instruction up, subsequently into sleep state.
In a scan period, the total time that any node is revived is kw, and the total time of sleep is
Tperiod-kw, then dutycycle DC of any node is expressed as formula (1):
In formula (1), w is the time span that node is revived every time, and n is node number total on road,
L is the length of road, and in complicated road topology, l is the E point shortest path length to P point, and k is node
At the wake up operations in each network work cycle, r is the detection radius of node, vmaxFor intrusion target
Big movement velocity.
From formula (1), during given k, n is the biggest, and dutycycle is the least, thus network lifetime adds
Long. and network lifetime and n value linearly proportional relationship.
When occurring without detection cavity, must have l≤2nr, a point situation is discussed below:
(2) when l=2 (n-1) r, dutycycle is unrelated with k value;
(3) at l, < during 2nr, the biggest then dutycycle of k value is the least, thus network lifetime is the longest.
Visible with k increase, the effect that dutycycle optimizes is the least.
In the present invention, calculate averagely with the pace of virtual scan ripple and the average speed of mobile target
The detection time.
Virtual scan ripple is at the time of staying T of each nodeseq=kw+(k-1)Tinterval, and each node is put down
All covering detection range is l/n, and the scanning pace of the most virtual ripple is l/(nTseq);Target is with arbitrarily speed
Degree is pointed out by E at any time and is sent to the movement of P point, it is assumed that the average speed of target is that v. can obtain target phase
Relative velocity for scanning ripple is l/ (nTseq)+v。
Assuming that the opportunity that mobile target enters network is random distribution, beg for the most respectively
Opinion:
(1) network is entered when virtual scan ripple scans when target:
Assume target t after scanning ripple startsaTime enters network, and now scanning ripple has travelled lta/(nTseq)
Time, then the time that target and scanning ripple meet is when target enters network when virtual ripple scans
Target detection time Dscan, DscanRepresent with formula (2).
Assume ta[0, nTseqIt is uniformly distributed in], then enters the mesh of network when virtual ripple scans when target
Mark detection time DscanExpected value be represented by formula (3).
(2) network is entered when the whole network is slept when target
Assume target t after the whole network sleep startsaTime enters, then it was advanced before scanning ripple scanning
L/vmax-taTime.After scanning starts, target with scanning ripple Encounter Time is
Thus can calculate when target enters the target detection time of network when the whole network is slept is formula
(4) shown in:
Assume ta[0, l/vmaxBe uniformly distributed in], then the expected value of target detection time is formula (5)
Shown in:
Aggregative formula (3) and formula (5), then the average criterion detection time is shown in formula (6):
Fig. 2 is territory, adjacent node overlapping detection regions schematic diagram.As in figure 2 it is shown, in the present invention, can be in order to
Use Oi,i+1Territory, overlapping detection regions, two adjacent nodes revive-sleep sequence switching in the middle of add sleep
Time Toverlap(i.e. at the node end cycle of a node, and the next node adjacent with this node
The node cycle, both switch in the middle of add the length of one's sleep), ToverlapMaximum be
Oi,i+1/vmax, wherein, Oi,i+1Represent two adjacent node overlapping detection regions length of fields, vmaxFor invasion mesh
Target maximum movement speed.Then the network work cycle is shown in formula (7):
Due to Oi,i+1=2r-di,i+1, substitute into abbreviation, then obtain node dutycycle as shown in Equation (8):
From formula (8), dutycycle is unrelated with k value.Contrast unknown node position, does not i.e. consider overlap
During detection region in the case of formula (1) indication, when k value infinity, the denominator of formula (1) becomes
nw+2nr/vmax, this has reformed into formula (8).Formula (8) represents a kind of ideal situation, i.e. phase
Overlapping region between neighbors is accurately known, and is maximized utilization, and its dutycycle is minimum, and network is raw
The life cycle is the longest.In formula (7), though overlapping region Oi,i+1It is unable to reach maximization, making of it
With length of one's sleep of sensor node still can be increased further, Network morals is made to extend.
The intrusion target detection method based on road of the present invention, in the case of finite energy, by allowing
One node is alternately revived within a network work cycle and sleeps the most repeatedly, makes accounting for of node
Empty ratio is reduced, thus is effectively improved Network morals.Further, the present invention is the most further
Utilize the detection overlapping region between adjacent node to increase the length of one's sleep of node further, make the duty of node
Than reducing further, thus improve Network morals to greatest extent.
The invention allows for a kind of intrusion target detecting system based on road, in order to perform above-mentioned base
Intrusion target detection method in road.
Fig. 3 is the structural representation of intrusion target detecting system based on road in the embodiment of the present invention.As
Shown in Fig. 3, present invention intrusion target based on road detecting system includes wake module 310, sets number
Purpose detection module 320, control module 330 and judge module 340.Wake module 310 is for one
In the individual network work cycle, according to by protecting point to the direction of entrance, wake up the node on road successively up.
Detection module 320 is for being waken up after module 310 wakes up up at its place node, a network work week
In one node cycle of work in phase, within a node cycle, alternately revive and sleep k time respectively,
K is natural number, and k value presets, and in period of reviving, has detected whether invasion in its detection region
Target, and report testing result, during sleeping, do not perform detection.Control module 330 is at joint
When putting the node end cycle of self, control this node and enter sleep state.Judge module 340 is used for sentencing
Whether this node disconnected is last node on road, if all nodes then in network fully enter
Resting state, until the next network work cycle, otherwise, notice wake module 310 is sequentially called out
The next node of this node on awake road.
Wherein, the wake-up mode that wake module 310 is taked may is that and calls out by waking up instruction triggers up
Wake up, or, triggered by default timer clock and wake up up.
The quantity of detection module 320 is equal to the quantity of node, say, that arrange one on a node
Detection module.
In embodiments of the present invention, on road, the detection region of adjacent two nodes can partly overlap, this
In the case of Zhong, present invention intrusion target based on road detecting system can also include increasing module.This increasing
Add module for increasing the T length of one's sleep in the middle of the sequence switching of reviving-sleep of two adjacent nodesoverlap,
ToverlapMaximum be Oi,i+1/vmax, wherein, Oi,i+1Represent that the territory, overlapping detection regions of two adjacent nodes is long
Degree, vmaxMaximum movement speed for intrusion target.
In embodiments of the present invention, at the beginning of intrusion target detecting system based on road can further include
Beginningization module.Initialization module is arranged on the concentrator of network.Initialization module is at detection module
Initializing before detecting, this initialization includes arranging detection parameter, wherein, detects parameter bag
Purse rope network working cycle, node cycle and node a network work cycle revive and sleep respective
Number of times k.
The intrusion target detecting system based on road of the present invention performs above-mentioned invasion mesh based on road
Mark detection method, in the case of finite energy, by allowing a node within a network work cycle
Revive-sleep repeatedly, make the dutycycle of node be reduced, thus be effectively improved the life of network
Cycle.Further, the present invention also increases joint further further with the detection overlapping region between adjacent node
The length of one's sleep of point, make the dutycycle of node reduce further, thus improve network to greatest extent
Life cycle.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the present invention
Spirit and principle within, any modification, equivalent substitution and improvement etc. made, should be included in this
Within bright protection domain.
Claims (10)
1. an intrusion target detection method based on road, it is characterised in that including:
Step one, within a network work cycle, puts to the direction of entrance according to by protection,
Wake up the node on road successively up;
Step 2, after described node is waken up, works one within a described network work cycle
In the individual node cycle, within a described node cycle, described node is alternately revived and sleeps
K time respectively, k is natural number, and k value presets, and revives period described, described node
In its detection region, detect whether intrusion target, and report testing result, in described sleep
Period, described node does not perform detection;K value is intended to reach according to the energy content of battery and the user of node
Network lifetime improve parameter determine;
Step 3, described node, when the node end cycle of self, enters sleep state;
Step 4, it is judged that whether described node is last node on described road, if
Then all nodes in network fully enter resting state, until the next network work cycle opens
Begin, otherwise, sequentially wake up the next node of described node on described road up, perform step 2.
Intrusion target detection method based on road the most according to claim 1, it is special
Levying and be, on road, the detection region of adjacent two nodes partly overlaps, at two adjacent nodes
Revive-sleep sequence switching in the middle of increase the length of one's sleep Toverlap, ToverlapMaximum be
Oi,i+1/vmax, wherein, Oi,i+1Represent the overlapping detection regions length of field of adjacent two nodes, vmax
Maximum movement speed for intrusion target.
Intrusion target detection method based on road the most according to claim 1, it is special
Levying and be, described node is alternately revived and sleeps respectively during k time, adjacent twice Soviet Union
The T length of one's sleep between XingingintervalMaximum be 2r/vmax, wherein, r is the detection of node
Radius, vmaxMaximum movement speed for intrusion target.
Intrusion target detection method based on road the most according to claim 1, it is special
Levy and be, described in the mode that wakes up up be: wake up up by waking up instruction triggers up, or, pass through
The timer clock preset triggers and wakes up up.
Intrusion target detection method based on road the most according to claim 1, it is special
Levying and be, described node is when the node end cycle of self, before entering a sleep state,
Send to the next node of its Way in and wake up instruction up, subsequently into sleep state.
Intrusion target detection method based on road the most according to claim 1, it is special
Levying and be, the lasting maximum duration of described resting state is l/vmax, vmaxFor intrusion target
Big movement velocity.
Intrusion target detection method based on road the most according to claim 1, it is special
Levying and be, initialize before testing, described initialization includes arranging detection parameter, institute
State detection parameter and include that described network work cycle, described node cycle and node are at a network
The respective number of times k reviving and sleeping of working cycle.
8. an intrusion target detecting system based on road, it is characterised in that including:
Wake module, within a network work cycle, according to by protecting point to entrance
Direction, wakes up the node on road successively up;
The detection module setting number being arranged on network node, at its place node quilt
After described wake module wakes up up, work within a described network work cycle node cycle,
Within a described node cycle, alternately reviving and sleep k time respectively, k is natural number,
K value presets, and revives period described, has detected whether invasion mesh in its detection region
Mark, and report testing result, during described sleep, do not perform detection;K value is according to node
The energy content of battery and the network lifetime to be reached of user improve parameter and determine;
Control module, for when the node end cycle of described node self, controls described joint
Click on into sleep state;
Judge module, for judging whether described node is last node on described road,
If all nodes then in network fully enter resting state, until next network work week
Phase, otherwise, notify that described wake module sequentially wakes up up on described road under described node
One node.
Intrusion target detecting system based on road the most according to claim 8, it is special
Levying and be, on road, the detection region of adjacent two nodes partly overlaps, described based on road
Intrusion target detecting system also includes increasing module, and described increase module is for two adjacent segments
The T length of one's sleep is increased in the middle of the sequence switching of reviving-sleep of pointoverlap, ToverlapMaximum be
Oi,i+1/vmax, wherein, Oi,i+1Represent two adjacent node overlapping detection regions length of fields, vmaxFor
The maximum movement speed of intrusion target.
Intrusion target detecting system based on road the most according to claim 8, it is special
Levy and be, also include that initialization module, described initialization module are arranged on the concentrator of network,
For initializing before testing, described initialization includes arranging detection parameter, described inspection
Survey parameter and include that described network work cycle, described node cycle and node are at a network work
The respective number of times k reviving and sleeping in cycle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310200502.4A CN103338477B (en) | 2013-05-27 | 2013-05-27 | A kind of intrusion target detection method based on road and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310200502.4A CN103338477B (en) | 2013-05-27 | 2013-05-27 | A kind of intrusion target detection method based on road and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103338477A CN103338477A (en) | 2013-10-02 |
CN103338477B true CN103338477B (en) | 2016-09-28 |
Family
ID=49246558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310200502.4A Expired - Fee Related CN103338477B (en) | 2013-05-27 | 2013-05-27 | A kind of intrusion target detection method based on road and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103338477B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3292717A4 (en) * | 2015-05-04 | 2018-04-18 | Telefonaktiebolaget LM Ericsson (publ) | Coordinated duty cycle assignment in mesh networks |
CN107240300A (en) * | 2017-07-27 | 2017-10-10 | 深圳暚光科技有限公司 | A kind of engineering truck collision-proof alarm method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101742544A (en) * | 2009-11-26 | 2010-06-16 | 上海大学 | Energy-saving MAC and routing cross-layer method for linear monitoring network |
CN101835178A (en) * | 2010-03-30 | 2010-09-15 | 北京必创科技有限公司 | Method for realizing remote wireless monitoring and wireless monitoring device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120242792A1 (en) * | 2009-12-09 | 2012-09-27 | Tao Zhang | Method and apparatus for distinguishing a 3d image from a 2d image and for identifying the presence of a 3d image format by image difference determination |
-
2013
- 2013-05-27 CN CN201310200502.4A patent/CN103338477B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101742544A (en) * | 2009-11-26 | 2010-06-16 | 上海大学 | Energy-saving MAC and routing cross-layer method for linear monitoring network |
CN101835178A (en) * | 2010-03-30 | 2010-09-15 | 北京必创科技有限公司 | Method for realizing remote wireless monitoring and wireless monitoring device |
Non-Patent Citations (2)
Title |
---|
Virtual Scanning Algorithm for Road Network Surveillance;Jaehoon Jeong,et.al.;《IEEE Transactions on Parallel and Distributed Systems》;20101231;第21卷(第12期);1734-1737,1742 * |
一种平衡无线传感器网络节点能耗的策略;卢丽鹏,等;《南方电网技术》;20120531;第6卷(第5期);57-61 * |
Also Published As
Publication number | Publication date |
---|---|
CN103338477A (en) | 2013-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gui et al. | Virtual patrol: a new power conservation design for surveillance using sensor networks | |
Kim et al. | Energy adaptive MAC protocol for wireless sensor networks with RF energy transfer | |
CN104426213B (en) | Monitoring system and method for storage battery | |
KR102455630B1 (en) | Communication system for sensor networks | |
Galzarano et al. | QL-MAC: A Q-learning based MAC for wireless sensor networks | |
CN103338477B (en) | A kind of intrusion target detection method based on road and system | |
CN106230645B (en) | Low-power-consumption wireless communication method used between monitoring node and convergence gateway | |
Yu et al. | Minimum-time aggregation scheduling in duty-cycled wireless sensor networks | |
CA3060659A1 (en) | Hail and acceptance for battery-powered devices | |
CN102083183A (en) | Low-energy consumption sleeping monitoring method synchronous relative to time of wireless sensor network | |
Rashid et al. | Improving energy conservation in wireless sensor networks using energy harvesting system | |
Galzarano et al. | A learning-based mac for energy efficient wireless sensor networks | |
CN109152100A (en) | Vehicle-mounted passive wireless sensor network ad hoc network method and device | |
CN202385302U (en) | Seat counting system based on ZigBee wireless technology | |
Chen et al. | An efficient power saving polling scheme in the internet of energy | |
Liendo et al. | Efficient bluetooth low energy operation for low duty cycle applications | |
CN105722180B (en) | Low duty ratio Sensor Network neighbor discovering method based on Length discrepancy revival time slot | |
Adamo et al. | Comparison of current sensors for power consumption assessment of wireless sensors network nodes | |
Park et al. | RIX-MAC: an energy-efficient receiver-initiated wakeup MAC protocol for WSNs | |
Kuo et al. | Design of long range low power sensor node for the last mile of IoT | |
CN103607732A (en) | Active diagnosis method based on information hiding technology in wireless sensor network | |
CN107809764B (en) | Markov chain-based multi-event detection method | |
CN102917467B (en) | Asynchronous reservation channel access method of wireless sensor network | |
CN107094286A (en) | A kind of super low-power consumption implementation method towards sparse flow wireless self-organization network | |
Qiu et al. | Dynamic duty cycle-based Wireless Sensor Network for underground pipeline monitoring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160928 Termination date: 20200527 |