CN106211256A - A kind of Unmanned Aerial Vehicle Data collection method based on data critical node - Google Patents

A kind of Unmanned Aerial Vehicle Data collection method based on data critical node Download PDF

Info

Publication number
CN106211256A
CN106211256A CN201610538537.2A CN201610538537A CN106211256A CN 106211256 A CN106211256 A CN 106211256A CN 201610538537 A CN201610538537 A CN 201610538537A CN 106211256 A CN106211256 A CN 106211256A
Authority
CN
China
Prior art keywords
node
data
sim
nodes
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610538537.2A
Other languages
Chinese (zh)
Other versions
CN106211256B (en
Inventor
房鼎益
梁思睿
王安文
徐丹
龚晓庆
李伟
肖云
陈晓江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwest University
Original Assignee
Northwest University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwest University filed Critical Northwest University
Priority to CN201610538537.2A priority Critical patent/CN106211256B/en
Publication of CN106211256A publication Critical patent/CN106211256A/en
Application granted granted Critical
Publication of CN106211256B publication Critical patent/CN106211256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/32Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The invention discloses a kind of Unmanned Aerial Vehicle Data collection method based on data critical node, by being mounted on unmanned plane by sink node, improve sink node motion limitation problem;By to the collection of some key node data in network, whole network data being carried out the completion of science, it is ensured that unmanned plane normally completes the collection work to whole network data situation under limited electricity, it is ensured that monitored area is long-term and effective data collection effort.The theory of the data gathered with the whole sensing node of data critical node on behalf that the present invention proposes, can not only be applied to Unmanned Aerial Vehicle Data collection aspect, can also well be applied under large-scale network environment, be played minimizing cost, be improved the effect of work efficiency.

Description

A kind of Unmanned Aerial Vehicle Data collection method based on data critical node
Technical field
The invention belongs to data collection techniques field, relate to a kind of Unmanned Aerial Vehicle Data based on data critical node and collect Method.
Background technology
Data collection is the most important task of Sensor Network, and it is to connect sensing layer and the bridge of application layer.Effective Method of data capture can reduce the live load of sensing node, it is to avoid network " regional dead ", extends the existence week of network Phase.
On the whole, whether fix according to sink node in Sensor Network, data main in current Sensor Network can be received Diversity method is divided into two classes: the first kind is method of data capture based on fixing sink node, and Equations of The Second Kind is based on mobile sink Method of data capture.Wherein data method based on mobile sink refers to that sink node according to certain rule or exists freely Move in monitored area, and collect the data that data perception node is gathered.This kind of method can avoid Energy volution to ask completely Topic, and then extend Network morals.
But this kind of method is discussion sink node moves in monitored area when, has all given tacit consent to sink node permissible Move freely in monitored area, and application itself can allow sink node to move in monitored area.But multiple In the environment of miscellaneous, existing method of data capture based on mobile sink node all have ignored " the mobile restricted problem of sink " and " application scenarios limitation problem ".Therefore, in actual environment the application of this kind of method by critical constraints.The hugest in network size In the case of great, sink node to move collection receipt at the whole network, and the time is all huge with the cost of energy, carries some For the mobile device of sink node, the hugest time energy cost, it may be difficult to bear, thus again limit such Method application in reality scene.
Summary of the invention
The problem existed for above-mentioned prior art or defect, it is an object of the invention to, it is provided that a kind of based on data pass The Unmanned Aerial Vehicle Data collection method of key node, by being mounted on unmanned plane by sink node, improves sink node motion Limitation problem;By to the collection of some key node data in network, whole network data being carried out the completion of science, it is ensured that Unmanned plane normally completes the collection work to whole network data situation under limited electricity, it is ensured that monitored area is long-term and effective Data collection effort.
To achieve these goals, the present invention adopts the following technical scheme that
A kind of Unmanned Aerial Vehicle Data collection method based on data critical node, comprises the following steps:
Step one: it is all that all nodes in acquisition radio sensing network are gathered in certain time period [t, t+ α] Data;
Step 2: judge any two node n in all nodesiAnd njThe most similar, obtain in radio sensing network all The similar situation of node;Judge any two node niAnd njThe most similar method is as follows:
Node niAnd njThe data sequence collected within the time period [t, t+ α] isWithIf data sequence WithBetween distanceIt is less thanThen node niWith node nj[t, t+ α] is similar , otherwise, node niWith node nj[t, t+ α] is dissimilar;Wherein, ε is application error;
Step 3: according to the similar situation of all nodes that step 2 obtains, in radio sensing network in all nodes Select data critical node;
Step 4: unmanned plane node key to data carries out data acquisition, obtains in whole radio sensing network all The data cases of node.
Specifically, described step 3 selects data critical node in radio sensing network in all nodes, its Specifically include following steps:
Step 3.1, the historical data set D of all nodes in given radio sensing networkpreAnd application error ε, pass through Given history node data DpreDTW algorithm is utilized to be calculated the figure Sim of similar node in network with application error εgraph
Step 3.2, for the figure Sim of similar nodegraphIn all nodes carry out being calculated the worth of each node Attribute;
Step 3.3, to figure SimgraphIn each node travel through, find out the node that wherein worth attribute is maximum, this joint Point is a key node of data, is added to by this node in set cnodeset{}, simultaneously at figure SimgraphIn find The neighbor node Sim of this data critical nodegraph[cn] .neibor, at figure SimgraphNode set in, delete data Key node and its neighbor node, obtain new figure Simgraph
Step 3.4, to the new figure Sim obtainedgraphRepeat step 3.2~step 3.4, until figure SimgraphInterior joint Collection be combined into sky;
Step 3.5, the node in set cnodeset{} is all of data critical node obtained.
Specifically, the formula that in described step 3.2, calculating worth attribute is used is:
Sim g r a p h [ v ] . w o r t h = Sim g r a p h [ v ] · | n e i b o r | d i s ( Sim g r a p h [ v ] , c n o d e s e t ) - - - ( 6 )
Wherein, v represents node, and the molecule of formula represents the neighbor node number of node v, and denominator represents that node v is with existing The meansigma methods of all data critical nodal distances.
Compared with prior art, the invention have the advantages that
1, by the analysis to perception data, pick out low volume data and be worth bigger sensing node, i.e. data critical Node, the data that they gather jointly, the data that whole sensing node gathers can be represented under the error requirements of application.So After, the conventional target that data critical node is collected as Unmanned Aerial Vehicle Data, thus highlight unmanned plane in data collection mistake Key task in journey, reduces unmanned plane workload in data-gathering process, finally improves the work efficiency of unmanned plane.
2, the theory of the data that the whole sensing node of present invention data critical node on behalf gathers, is possible not only to application In terms of Unmanned Aerial Vehicle Data collection, can also well be applied under large-scale network environment, be played minimizing cost, be improved The effect of work efficiency.
Accompanying drawing explanation
Fig. 1 is the flow chart of the present invention;
Fig. 2 is to be the physical distribution figure of data critical node;
Fig. 3 is application error outdoor data collection correspondence data critical Node distribution figure when being 0.01.
With detailed description of the invention the solution of the present invention done below in conjunction with the accompanying drawings and explain in further detail and illustrate.
Detailed description of the invention
Defer to technique scheme, see Fig. 1, the Unmanned Aerial Vehicle Data collection side based on data critical node of the present invention Method, comprises the following steps:
Step one: it is all that all nodes in acquisition radio sensing network are gathered in certain time period [t, t+ α] Data.Wherein, α represents the length of this time period.
Step 2: judge any two node n in all nodes in radio sensing networkiAnd njThe most similar, obtain nothing The similar situation of all nodes in line sensing network.The most similar method of decision node is as follows:
Node niAnd njThe data sequence with sequential meaning collected within the time period [t, t+ α] isWith If data sequenceWithBetween distanceIt is less thanThat is: Then node niWith node nj[t, t+ α] is similar, otherwise, node niWith node nj[t, t+ α] is dissimilar.
Wherein,Wherein di,tRepresent node niIn the data that t gathers, and t < t1 < ... < t+ α.
ε is application error, and it is defined as, and applies acceptable error in data.If application error ε=a, receive when final Collect to data differ between [-a, a] with the data truly collected time, apply be all acceptable.Setting for ε Do not have fixing rule to follow, mainly set according to the requirement of application.
Within in the time period [t, t+ α], node niWith node njWhen clock system is Complete Synchronization, internodal distanceComputing formula is:
dis t , t + λ × θ i , j = | d i , t - d j , t | + | d i , t + θ - d j , t + θ | + ... + | d i , t + λ × θ - d j , t + λ × θ | - - - ( 1 )
If within the time period [t, t+ α], node niWith node njClock system does not has a Complete Synchronization, or occurs in that and lose Lose the situation of data, then utilize DTW algorithm to calculateWithBetween distanceAnd the essence of DTW algorithm is to tie up Spending shorter vector to have carried out " stretching ", then longer with dimension vector carries out distance and solves.
Below to node niWith node njWhen clock system is Complete Synchronization, the similarity determination methods of two nodes is just Really property proves:
If within the time period [t, t+ α], node niWith node njWhen clock system is Complete Synchronization and node njClock system System is Complete Synchronization, and does not the most lose data, and the data that two nodes collect the most within the time period are counting It is equal, i.e. in amountAssume within the time period [t, t+ α], a total of H collection period.If β represents On each collection period in time period [t, t+ α], for node niWith node njThe data collected, difference between them The set that absolute value is constituted.
β={ β12,...,βH}(2)
β i = | d j , Δt i - d i , Δt i | - - - ( 3 )
dis t , t + α i , j = Σ β i ∈ β β i ≤ ϵ × m a x ( | l t , t + α i | , | l t , t + α j | ) = ϵ × H - - - ( 4 )
Assuming that the element number being less than ε in β is z, the element number more than ε is Q.
As Q=0, then all elements in β is both less than ε.It represented within the time period [t, t+ α] in the physical sense In any identical collection period, for node niWith node njThe data gathered, the difference between them is all at the error model of application In enclosing, n the most at any timeiThe data gathered can replace njThe data gathered, so node niWith node njIt is similar 's.
As z > > Q, then the nearly all element in β is both less than ε.It represents at time period [t, t+ in the physical sense α] in most collection period in, for node niWith node njThe data gathered, the difference between them is all in application In range of error, in this case it is also believed that niThe data gathered can substitute for njThe data gathered, so node niWith Node njIt is similar.
As z < < Q, then the nearly all element in β is both greater than ε.Assume that in β, all element sums less than ε are βsmallThen:
lim Q → H ϵ × H - β s m a l l Q - ϵ = 0 - - - ( 5 )
The physical significance of its formula (5) is, although now the nearly all element in β is both greater than ε, but they and ε Between differ the least by almost 0.In this case it is also believed that niThe data gathered can substitute for njThe data gathered, So node nkWith node njIt is similar.
When the sizableness of z Yu Q, then the element number more than ε in β is essentially identical with the element number less than ε.By In in stable environment, do not have the data that node collects and situation fluctuated occur, thus can only be half even In the continuous time, niThe data gathered and njThe data gathered differ all in the range of application error, and in second half time, both adopt The data difference that collection arrives is not the most in the range of error of application.Therefore, when the sizableness of z Yu Q, its physical significance is joint Point njThe data gathered and node ni, within first half section (second half section) time, between them, there is similarity in the data gathered, and Second half section, (first half section) was in the time, there is not similarity between them.Because the environment residing for node is in most cases Stable, do not have a great change, therefore it is unlikely that above-mentioned situation.
In sum, if within the time period [t, t+ α], node niWith node njClock system is Complete Synchronization, and The most do not lose data, and data acquisition sequenceWithBetween distance less than ε × H, then node niAnd node njIt is similar.
If within the time period [t, t+ α], node niWith node njClock system does not has a Complete Synchronization, or occurs in that and lose Lose the situation of data, then utilize DTW algorithm to calculateWithBetween distance.And the essence of DTW algorithm is that dimension is shorter Vector carried out " stretching ", then longer with dimension vector carries out distance and solves.Therefore, in like manner can obtain: if number According to acquisition sequenceWithBetween distance be less thanThen node niWith node njIt is similar.
If node niThe data gathered can replace node njThe data gathered, then claim node niAnd njAt time period [t, t+ α] It is inside similar, also referred to as node niAnd njSimilarity relation is there is within the time period [t, t+ α].If the data in [t, t+ α], can The most sufficiently to represent the environmental change around node, then claim node niAnd njIt is all similar in whole life cycle.? The lower part of the present invention assumes that the data in the selected time period the most sufficiently represent the change of environment.
Step 3: according to the similar situation of nodes all in radio sensing network, selects all joints in radio sensing network The key node of point;Concrete grammar is as follows:
Step 3.1, the historical data set D of all nodes in given radio sensing networkpreAnd it is acceptable in algorithm Error in data i.e. application error ε.By given history node data DpreDTW algorithm is utilized to be calculated with application error ε, The figure Sim of similar node in networkgraph
Step 3.2, the figure Sim to similar nodegraphIn all nodes carry out being calculated the worth of each node and belong to Property, the concrete formula calculating worth attribute is:
Sim g r a p h [ v ] . w o r t h = Sim g r a p h [ v ] . | n e i b o r | d i s ( Sim g r a p h [ v ] , c n o d e s e t ) - - - ( 6 )
Wherein, v represents node, and the molecule of formula represents the neighbor node number of node v, and denominator represents that node v is with existing The meansigma methods of all data critical nodal distances.And worth attribute i.e. data value, data value is each data perception The attribute that node is had, specifically represents the use value that the data gathered by it are had.In the present invention we assume that: just Often under situation, the data that all sensing nodes are gathered have identical use value, for simplicity it is set to 1.Cause This, for data critical node nkIf corresponding coverage scope is Γ, then its data value is | Γ |.Because | Γ | represents in the physical sense: in the range of error of application, and the data that node gathers can replace set as representative The data that in Γ, all nodes gather, are employed to be used, so the data value of node is exactly the data of all nodes in Γ It is worth sum, is | Γ |.Therefore, the worth attribute of node is directly proportional to the number of its neighbor node, crucial with available data The distance of property node is inversely proportional to.
Step 3.3, to figure SimgraphIn each node travel through, find out the node that wherein worth attribute is maximum, this joint Point is a key node of data, is added to by this node in set cnodeset{}, simultaneously at figure SimgraphIn find The neighbor node Sim of this data critical nodegraph[cn] .neibor, at figure SimgraphNode set in, delete data Key node and its neighbor node, obtain new figure Simgraph
Step 3.4, to the new figure Sim obtainedgraphRepeat step 3.2~step 3.4, until figure SimgraphInterior joint Collection be combined into sky.
Step 3.5, the node in set cnodeset{}, it is all of data critical node finally given.
The idiographic flow of said method and use can be summarized as below graph:
The a collection of node N picked out from networkxAs data critical node: it meets following condition: 1, ensure net Remaining each node in network, at least with NxIn a node be similar;2, N is worked asxIn all nodes be in one straight During line, the minimum (overall length of line between critical length that is two node of farthest two the internodal critical length of physical distance Degree);Work as NxIn all nodes when being not on straight line, when ensureing by NxIn external figure corresponding to all nodes Critical area minimum (between critical area i.e. node, line forms the area of figure);3, condition one and condition two are met for any Node set, leave out the most unnecessary node, it is ensured that NxIt is that element number is minimum and meet the set of node of two above condition Close.
According to the definition of data critical node, the select permeability of data critical node is converted to mathematical problem:
Assuming that whole network is a figure G, all sensing nodes in network are the summits in figure G.If by sense Primary data analysis is learnt, under the error requirements of application, two nodes exist similarity relation, between two the most corresponding summits There is limit, if there is no similarity relation, between two the most corresponding summits, there is not limit.Figure G is referred to as the whole network joint by us The similarity graph of a relation of point.How from network, all of data perception node to select data critical node, now may be used To be interpreted as finding a collection of summit N in figure GxSo that in network, an at least neighbours summit, remaining each summit is at Nx In, it is ensured that NxIn vertex number minimum, and critical length corresponding to these summits or critical area minimum.
The select permeability of this data critical node is the problem of minimum dominant set in graph theory, and it solves difficulty is NP- hard.Pertinent literature is that the algorithm using Greedy strategy solves to the solution of minimum dominant set problem, and the present invention is by right Greedy algorithm carries out some amendments, reasonably solves the select permeability of data critical node.
1) prove and solution formula
When the problem that the select permeability of data critical node is minimum dominant set in graph theory, it solves difficulty and is The proof of NP-hard
Prove: the minimum dominant set problem in graph theory, it solves difficulty is NP-hard.It is concrete is defined as follows: for One non-directed graph G (V, E), finds out a collection of node h, h ∈ V from G so that the summit in h all exists limit with the summit in V-h Relation, ensures that the vertex number in h is minimum simultaneously.If for being in each node, with network of network edge other The most there is not similarity relation in node.At this moment, these are in the node of edge zone, are data critical node certainly, institute simultaneously It is also certain for having the critical length corresponding to data critical node or critical area.Therefore, at this point for data critical The selection work of node is it is to be understood that find out minimum a collection of node N in a networkxSo that remaining each joint in network A point at least neighbor node is in NxIn, and this minimum dominant set problem in graph theory just.Therefore, it can be seen that it is minimum Dominating set problem is a special case of the select permeability of data critical node in network.So, data critical joint in network The select permeability of point is NP-hard.
2) utilize algorithm to carry out the solution procedure of data critical node, be mainly made up of two parts.Part I is profit Use DTW algorithm, build the similarity graph of a relation of the whole network node.Owing to, during building similarity graph of a relation, judge every Whether there is similarity between individual node and other all nodes, therefore its time complexity is O (n2), it is assumed that node is corresponding The average length of data acquisition sequence is a, then the time complexity that Part I is overall is O (a2*n2).Part II is basis Similarity graph of a relation selects data critical node, from algorithm it can be seen that its core is to carry out all nodes twice Cycle criterion process.Therefore, the time complexity of Part II is O (n2).So all in all the time complexity of algorithm 1 is O(a2*n2), although the time complexity of algorithm 1 is O (n on the whole2) rank, but if the length of data acquisition sequence compares Greatly, i.e. the constant coefficient of value bigger then algorithm 1 time complexity of a will be very big, the most how to select suitable data acquisition Collection sequence is most important.
Owing to data critical node is the conventional destination node that unmanned plane carries out data collection, so its meeting and unmanned plane Communicate frequently.If therefore data critical node is the most constant, then its energy can quickly exhaust, so that network enters " seemingly-dead " state.For this problem, solution in this paper is: arrange an energy threshold for data critical node, When its energy is less than this threshold value, then find in the range of its coverage with existing data critical node average distance That little node, sets it to new data critical node.
If according to the similarity between node, the whole network node similarity relationships figure Sim constitutedgraphIn, there is N number of top Point and M bar limit.The number assuming the data critical node finally calculated by algorithm is κ, from pertinent literatureTherefore, if the destination node that data critical node is collected as Unmanned Aerial Vehicle Data, then unmanned The task amount of machine data collection is minimum can be reduced
Step 4: unmanned plane carries out data acquisition to the data critical node in network, thus obtains in whole network The data cases of all nodes.
The effect of the present invention can be further illustrated by following emulation.
Emulation 1, verifies data critical node correctness in the inventive method.
Program in whole experiment and emulation is write by oneself completely, and development language is c++, the parameter of all simulated environment All arrange with reference to the parameter in true environment.This emulation use data set respectively, (1) outdoor data collection: be deployed in elm 41 data sensing nodes in the North Platform Ruins of Great Wall of woods town are gathered between 20 days at 1 day to 2015 December of December in 2015 Data.These 41 node bottoms use CC2530 hardware configuration, are responsible for gathering the temperature of the internal 15cm degree of depth of Ruins of Great Wall soil Angle value.(2) house data collection: between February 28 to 5 days April in 2004 in 2004, be deployed in Intel Berkeley The data that 54 data sensing nodes of Research laboratory are collected.These 54 node bottoms use TinyOS to operate system System, gathers temperature, humidity, illumination and the voltage data of self in surrounding.In experiment herein, for collect 4 kinds of data, only utilize the temperature data that node gathers.Utilize outdoor and house data collection separately below, to step 3c) middle proposition The correctness of selection algorithm of data critical node verify.The experimental result of emulation is described as follows:
When table 1 is that application error is set to 0.01, data critical node corresponding to outdoor data collection and corresponding Coverage scope.From table 1, can be clearly seen that whole network has 6 key nodes of data, therefore, in nothing In the case of abnormality sensing data, the task amount in whole data-gathering process will reduce 85.37%.These 6 data critical In property node, the coverage scope corresponding to 56,493, the 495 key nodes of number is bigger, is 19,12,7 to account for respectively Arrive whole number of network node purpose 92.67%.
Outdoor data collection correspondence data critical node situation during table 1 application error 0.01
Fig. 3 is then the true distribution situation of data critical node and coverage scope thereof: five-pointed star shape table in figure Registration represents the ordinary node of data according to key node, circle.
Fig. 3 represents different nodes with distinct symbols (A, B and C), the joint of the most corresponding key node of different pieces of information Point coverage:
● A node represents, the coverage scope corresponding to the 56 key nodes of number.These nodes are mainly distributed : outside western wall, south outside, the inner side of Dong Qiang within the walls.
● B node represents, the coverage scope corresponding to the 493 key nodes of number.These nodes are mainly distributed : outside side within the walls, west and east wall.
● C node represents, the coverage scope corresponding to the 495 key nodes of number.These nodes are mainly distributed : the outside of north wall.
For the coverage scope corresponding to the 56 key nodes of number.It is every that they are placed exactly in the sun in position It place irradiated.Therefore, the soil moisture in these places is the highest.So the data that these nodes are gathered have The biggest similarity.
For the coverage scope corresponding to the 493 key nodes of number.Because North Platform western wall physical features in town is higher, East wall physical features ratio is relatively low.The sun has the most all been blocked in the outside of Xi Qiang and the inner side of Dong Qiang, and body of wall is the thickest, so at Xi Qiang Inner side and Dong Qiang outside gather soil moisture value all ratios relatively low.So the data of these node collections have huge phase Like property.
For the coverage scope corresponding to the 495 key nodes of number.Due to the Shi Tiao road, outside of north wall, so Outside north wall, the temperature of soil is by ectocine is relatively big and other bodies of wall have certain difference.So the number that these nodes gather According to having huge similarity.
Table 2 is application error when being 0.0001, data critical node corresponding to house data collection and saving accordingly Point coverage.As can be seen from Table 2: a total of 7 key nodes of data, the node of the 45 key nodes of number covers Lid scope is 42 to the maximum, has accounted for the 70.77% of whole network node sum.
House data collection correspondence data critical node situation during table 2 application error 0.0001
Fig. 2 is the physical distribution figure of data critical node, as can clearly see from the figure the 45 key joint of number The coverage scope of point, is almost distributed in each corner of network, and the coverage of other data critical nodes is the most scattered The lower left corner being distributed in monitored area and the upper right corner.The first and last coverage model of data critical node and its correspondence Enclose, geographical distribution does not has any significant feature.This is because under indoor environment, environment is highly stable and indoor Air be also mutually circulation, be the most almost all identical at each local air temperature value, therefore basic between data It is all similar, so just there will be the above results.

Claims (3)

1. a Unmanned Aerial Vehicle Data collection method based on data critical node, it is characterised in that comprise the following steps:
Step one: obtain all data that all nodes in radio sensing network are gathered in certain time period [t, t+ α];
Step 2: judge any two node n in all nodesiAnd njThe most similar, obtain all nodes in radio sensing network Similar situation;Judge any two node niAnd njThe most similar method is as follows:
Node niAnd njThe data sequence collected within the time period [t, t+ α] isWithIf data sequenceWithBetween distance be less thanThen node niWith node nj[t, t+ α] is similar, no Then, node niWith node nj[t, t+ α] is dissimilar;Wherein, ε is application error;
Step 3: according to the similar situation of all nodes that step 2 obtains, select in all nodes in radio sensing network Data critical node;
Step 4: unmanned plane node key to data carries out data acquisition, obtains all nodes in whole radio sensing network Data cases.
2. Unmanned Aerial Vehicle Data collection method based on data critical node as claimed in claim 1, it is characterised in that described Selecting data critical node in radio sensing network in all nodes in step 3, it specifically includes following steps:
Step 3.1, the historical data set D of all nodes in given radio sensing networkpreAnd application error ε, by given History node data DpreDTW algorithm is utilized to be calculated the figure Sim of similar node in network with application error εgraph
Step 3.2, for the figure Sim of similar nodegraphIn all nodes carry out being calculated the worth of each node and belong to Property;
Step 3.3, to figure SimgraphIn each node travel through, find out the node that wherein worth attribute is maximum, this node is i.e. It is a key node of data, this node is added in set cnodeset{}, simultaneously at figure SimgraphIn find this number Neighbor node Sim according to key nodegraph[cn] .neibor, at figure SimgraphNode set in, delete data critical Property node and its neighbor node, obtain new figure Simgraph
Step 3.4, to the new figure Sim obtainedgraphRepeat step 3.2~step 3.4, until figure SimgraphThe set of interior joint For sky;
Step 3.5, the node in set cnodeset{} is all of data critical node obtained.
3. Unmanned Aerial Vehicle Data collection method based on data critical node as claimed in claim 2, it is characterised in that described Step 3.2 in calculate the formula that used of worth attribute and be:
Sim g r a p h [ v ] . w o r t h = Sim g r a p h [ v ] . | n e i b o r | d i s ( Sim g r a p h [ v ] , c n o d e s e t )
Wherein, v represents node, and the molecule of formula represents the neighbor node number of node v, and denominator represents node v and existing institute There is the meansigma methods of data critical nodal distance.
CN201610538537.2A 2016-07-08 2016-07-08 A kind of Unmanned Aerial Vehicle Data collection method based on data critical node Active CN106211256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610538537.2A CN106211256B (en) 2016-07-08 2016-07-08 A kind of Unmanned Aerial Vehicle Data collection method based on data critical node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610538537.2A CN106211256B (en) 2016-07-08 2016-07-08 A kind of Unmanned Aerial Vehicle Data collection method based on data critical node

Publications (2)

Publication Number Publication Date
CN106211256A true CN106211256A (en) 2016-12-07
CN106211256B CN106211256B (en) 2019-10-01

Family

ID=57474142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610538537.2A Active CN106211256B (en) 2016-07-08 2016-07-08 A kind of Unmanned Aerial Vehicle Data collection method based on data critical node

Country Status (1)

Country Link
CN (1) CN106211256B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106879044A (en) * 2017-02-17 2017-06-20 哈尔滨工程大学 The underwater sensor network method for routing that cavity perceives
CN108645769A (en) * 2018-06-05 2018-10-12 广州市荣盛环保科技有限公司 A kind of environmental air quality monitoring method based on unmanned plane
CN108718459A (en) * 2018-05-22 2018-10-30 南京邮电大学 A kind of wireless sense network method of data capture based on unmanned plane
CN109033125A (en) * 2018-05-31 2018-12-18 黑龙江大学 Time sequence data domination set information extraction method
CN109885598A (en) * 2019-01-25 2019-06-14 沈阳无距科技有限公司 Fault recognition method, device, computer readable storage medium and electronic equipment
CN110493844A (en) * 2019-09-24 2019-11-22 广州大学 The data fusion Game with Coalitions method and system of Wireless Sensor Networks

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080137624A1 (en) * 2006-12-07 2008-06-12 Innovative Wireless Technologies, Inc. Method and Apparatus for Management of a Global Wireless Sensor Network
CN105682171A (en) * 2016-03-09 2016-06-15 北京航空航天大学 Spatio-temporal clustering method for compressive data gathering

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080137624A1 (en) * 2006-12-07 2008-06-12 Innovative Wireless Technologies, Inc. Method and Apparatus for Management of a Global Wireless Sensor Network
CN105682171A (en) * 2016-03-09 2016-06-15 北京航空航天大学 Spatio-temporal clustering method for compressive data gathering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周四望,李兰: "传感器网络基于DTW的多小波压缩算法", 《通信学报》 *
李中: "基于形态相似距离的时间序列相似度计算", 《计算机工程与设计》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106879044A (en) * 2017-02-17 2017-06-20 哈尔滨工程大学 The underwater sensor network method for routing that cavity perceives
CN106879044B (en) * 2017-02-17 2019-11-12 哈尔滨工程大学 The underwater sensor network method for routing of cavity perception
CN108718459A (en) * 2018-05-22 2018-10-30 南京邮电大学 A kind of wireless sense network method of data capture based on unmanned plane
CN109033125A (en) * 2018-05-31 2018-12-18 黑龙江大学 Time sequence data domination set information extraction method
CN109033125B (en) * 2018-05-31 2022-05-13 黑龙江大学 Time sequence data domination set information extraction method
CN108645769A (en) * 2018-06-05 2018-10-12 广州市荣盛环保科技有限公司 A kind of environmental air quality monitoring method based on unmanned plane
CN109885598A (en) * 2019-01-25 2019-06-14 沈阳无距科技有限公司 Fault recognition method, device, computer readable storage medium and electronic equipment
CN109885598B (en) * 2019-01-25 2021-03-02 沈阳无距科技有限公司 Fault identification method and device, computer readable storage medium and electronic equipment
CN110493844A (en) * 2019-09-24 2019-11-22 广州大学 The data fusion Game with Coalitions method and system of Wireless Sensor Networks

Also Published As

Publication number Publication date
CN106211256B (en) 2019-10-01

Similar Documents

Publication Publication Date Title
CN106211256A (en) A kind of Unmanned Aerial Vehicle Data collection method based on data critical node
CN110689622B (en) Synchronous positioning and composition method based on point cloud segmentation matching closed-loop correction
CN103428275B (en) Indoor moving goal activity route tracking method based on WSN
CN105263113B (en) A kind of WiFi location fingerprints map constructing method and its system based on crowdsourcing
CN104462190B (en) A kind of online position predicting method excavated based on magnanimity space tracking
CN109635748B (en) Method for extracting road characteristics in high-resolution image
CN105530651B (en) Optimal base station layout method in wireless positioning system
CN105635963B (en) Multiple agent co-located method
CN110320919B (en) Method for optimizing path of mobile robot in unknown geographic environment
CN110057362B (en) Mobile robot path planning method of limited unit map
CN104936287A (en) Sensor network indoor fingerprint positioning method based on matrix completion
CN113776534B (en) Unmanned aerial vehicle three-dimensional time-varying airspace navigation method based on three-dimensional subdivision grid
CN107423762A (en) Semi-supervised fingerprinting localization algorithm based on manifold regularization
CN102496187A (en) Method for tracking contour line to boundary and fault based on triangular mesh
CN103295080A (en) Three-dimensional path programming method based on elevation diagram and ant colony foraging
CN108111965A (en) A kind of definite method and apparatus of base station location
CN107179525A (en) A kind of location fingerprint construction method of the Kriging regression based on Thiessen polygon
Prentow et al. Making sense of trajectory data in indoor spaces
CN114815801A (en) Adaptive environment path planning method based on strategy-value network and MCTS
CN116698043A (en) Visual navigation method for indoor mobile robot
Wang et al. Coverage path planning design of mapping UAVs based on particle swarm optimization algorithm
Pumpichet et al. Belief-based cleaning in trajectory sensor streams
CN115587664A (en) Solar radiation prediction method and system based on graph convolution long-term and short-term memory network
CN109633531A (en) Wireless sensor network node positioning system under composite noise condition
CN111432449B (en) Industrial wireless chargeable sensor network charging scheduling method based on new particle swarm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant