CN106371626A - Virtual three-dimensional scene controller - Google Patents

Virtual three-dimensional scene controller Download PDF

Info

Publication number
CN106371626A
CN106371626A CN201610728710.5A CN201610728710A CN106371626A CN 106371626 A CN106371626 A CN 106371626A CN 201610728710 A CN201610728710 A CN 201610728710A CN 106371626 A CN106371626 A CN 106371626A
Authority
CN
China
Prior art keywords
node
value
module
network
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610728710.5A
Other languages
Chinese (zh)
Inventor
闫瑞杰
李海香
金国文
范梅梅
陈丽梅
苏华莺
张伟
赵美凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610728710.5A priority Critical patent/CN106371626A/en
Publication of CN106371626A publication Critical patent/CN106371626A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0346Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/038Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
    • G06F3/0383Signal control means within the pointing device

Abstract

The invention discloses a virtual three-dimensional scene controller. The virtual three-dimensional scene controller comprises a control gun and a receiver, wherein the control gun comprises a gun body; a trigger type key and a navigation direction key are arranged on the gun body; the trigger type key is located in the front of the gun body; the navigation direction key is located at the rear end of the gun body; a first circuit board and a lithium battery are mounted in the inner cavity of the gun body; a three-axis gyroscope, a tri-axial accelerometer module, a first MCU and a wireless transmission module are mounted on the first circuit board; and the three-axis gyroscope, the tri-axial accelerometer module and the wireless transmission module are respectively connected with the first MCU. The virtual three-dimensional scene controller integrates the functions of a wireless mouse and a keyboard and is capable of randomly carrying out 360-degree operation without dead angles, so that the omnibearing control and reaming of virtual spaces are realized; the gun type design accords with the handholding habit, so that operation can be carried out by both the left hand and the right hand; and the virtual three-dimensional scene controller has an effective distance of 20 m, supports gesture control, supports large-scale motion sensing games and satisfies the operation requirements of 3D virtual scenes.

Description

A kind of virtual three-dimensional scene controller
Technical field
The invention belongs to virtual device technology field, more particularly, to a kind of virtual three-dimensional scene controller.
Background technology
At present, virtual game, software industry flourish, and the operation that conventional mouse cannot meet 3d virtual scene will Ask.
In the conventional technology, conventional infrared mouse must be used on the table by infrared or laser.Also have only with 2 axles The air mouse of gyroscope.Both devices can only realize x-axis, the two dimensional surface of y-axis controls, for three-dimensional three-dimensional z-axis then Do not enable to control, be not suitable for the virtual three-dimensional scene program of current trend.The operation meeting 3d virtual scene requires, and adopts Corresponding adjustment must also be done by keyboard alternate function key with the air mouse of 2 axle gyroscopes, user is felt very simultaneously Inconvenient.
Content of the invention
It is an object of the invention to provide a kind of virtual three-dimensional scene controller is it is intended to solve conventional mouse using not side Just it is impossible to meet the problem of the operation requirement of 3d virtual scene.
The present invention is achieved in that a kind of virtual three-dimensional scene controller, and described virtual three-dimensional scene controller includes Control rifle and receptor, described control rifle includes gun body, described gun body is provided with trigger-type button and navigation direction key, described pull Machine formula button is located at the front of gun body, and described navigation direction key mapping is in the rearward end of gun body;
First circuit board and lithium battery are installed in described gun body inner chamber, described first circuit board is provided with three axis accelerometer Instrument, three axis accelerometer module, a mcu, wireless transmitter module, described three-axis gyroscope, three axis accelerometer module and nothing Line transmitter module is connected with a described mcu respectively;
Described receptor includes wireless receiving module, and one end of described wireless receiving module is provided with usb interface, described wireless Second circuit board is installed in receiver module inner chamber, described second circuit board is provided with the 2nd mcu and coupled wireless Receiver module;
Described gun body being provided with, positioned at small of the stock lower end, the extension being connected with it, described lithium battery be arranged on described in prolong In the inner chamber of extending portion, described lithium battery inline power management module, described lithium battery is through described power management module and described the One mcu is connected;The rear end of extension is provided with charging inlet, and described charging inlet is connected with described power management module;
Described wireless receiving module is provided with display lamp, and described display lamp is connected with described 2nd mcu;
Navigation direction key is rolling ball structure, is controlled with thumb, realize respectively up and down, left and right 4 directions press Directly press totally 5 keypress functions with 1 to control.
Further, described wireless transmitter module is provided with wireless mesh network node trust value computing unit, described wireless The trust value computing method of the wireless mesh network node of mesh network node trust value computing unit comprises the following steps:
Step one, the interaction times of different time piece between acquisition node, according to the data setup time sequence obtaining, pass through Third index flatness predicting between node the interaction times of next timeslice, by the phase of interaction times predictive value and actual value To error as node direct trust value;The concrete calculation procedure of direct trust value is:
The interaction times of n timeslice between collection network observations node i and node j:
Choose intervals t as an observation time piece, with observer nodes i and tested node j in 1 timeslice Interior interaction times as observation index, true interaction times, be denoted as yt, record the y of n timeslice successivelyn, and preserved In the communications records table of node i;
The interaction times of (n+1)th timeslice of prediction:
According to the interaction times setup time sequence of the n timeslice collecting, using under third index flatness prediction Interaction times between one timeslice n+1 interior nodes i and j, predict interaction times, are denoted asComputing formula is as follows:
y ^ n + 1 = a n + b n + c n
Predictive coefficient an、bn、cnValue can be calculated by equation below:
a n = 3 y ^ n + 1 ( 1 ) - 3 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 )
b n = α 2 ( 1 - α ) 2 [ ( 6 - 5 α ) y ^ n + 1 ( 1 ) - 2 ( 5 - 4 α ) y ^ n + 1 ( 2 ) + ( 4 - 3 α ) y ^ n + 1 ( 3 ) ]
c n = α 2 2 ( 1 - α ) 2 [ y ^ n + 1 ( 1 ) - 2 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 ) ]
Wherein:Be respectively once, secondary, Three-exponential Smoothing number, calculated by equation below Arrive:
y ^ n + 1 ( 1 ) = α × y n + ( 1 - α ) × y ^ n ( 1 )
y ^ n + 1 ( 2 ) = α × y ^ n + 1 ( 1 ) + ( 1 - α ) × y ^ n ( 2 )
y ^ n + 1 ( 3 ) = α × y ^ n + 1 ( 2 ) + ( 1 - α ) × y ^ n ( 3 )
It is the initial value of third index flatness, its value is
y ^ 0 ( 1 ) = y ^ 0 ( 2 ) = y ^ 0 ( 3 ) = y 1 + y 2 + y 3 3
α is smoothing factor (0 < α < 1), embodies the time attenuation characteristic trusted, that is, from predictive value more close to timeslice ytWeight is bigger, from predictive value more away from timeslice ytWeight is less;Usually, if data fluctuations are larger, and long-term trend Amplitude of variation is larger, assumes α when substantially rapidly rising or falling trend and should take higher value (0.6~0.8), can increase in the recent period Data is to the impact predicting the outcome;When data has fluctuation, but when long-term trend change is little, α is in 0.1~0.4 value;If number According to smooth fluctuations, α takes 0.05~0.20;
Calculating direct trust value:
Direct trust value td of node jijFor predicting interaction timesWith true interaction times yn+1Relative error,
Step 2, calculates indirect trust values using calculating formula obtained from multipath trust recommendation mode;Using multipath The concrete calculation procedure that calculating formula obtained from trust recommendation mode calculates indirect trust values is:
The collection direct trust value to node j for the trusted node:
Node i meets td to allikThe credible associated nodes of≤φ inquire its direct trust value to node j, wherein φ For the believability threshold of recommended node, according to the precision prescribed of credibility, the span of φ is 0~0.4;
Calculating indirect trust values:
Trust value collected by COMPREHENSIVE CALCULATING, obtains indirect trust values tr of node jij,
Wherein, had with j node in the associated nodes for observer nodes i for the set (i) and interacted And its direct trust value meets tdikThe node set of≤φ;
Step 3, draws comprehensive trust value by direct trust value and indirect trust values conformity calculation;Concrete calculation procedure is:
Comprehensive trust value (tij) computing formula as follows: tij=β tdij+(1-β)trij, wherein β (0≤β≤1) expression is directly Connect the weight of trust value, when β=0, node i and node j do not have a direct interaction relation, the calculating of comprehensive trust value directly from In indirect trust values, it is more objective to judge;When β=1, node i is to the comprehensive trust value of node j all from directly trusting Value, in this case, judges more subjective, Practical Calculation determines the value of β as needed.
Further, described wireless transmitter module is provided with signal negentropy computing module, described signal negentropy computing module Signal negentropy computational methods include:
j ^ ( x ) ≈ σ j = 1 n k j [ e { g j ( x ) } - e { g j ( m ) } ] 2 ;
Wherein, kjFor some normal numbers, m is the gaussian variable with zero-mean, unit variance, function gjFor non-secondary letter Number;
As all of gjDuring=g, approximate expression becomes:
jg(x)≈c[e{g(x)}-e{g(m)}]2
Wherein, g is arbitrarily non-quadratic function, and c is a constant.
Further, described wireless transmitter module is provided with wireless network distributed module, the distributed mould of described wireless network The distributed method of block includes:
Step one, the neighbours of node si, the point position of covering, default network life l, the marking class of battery life bi, si Type upd, ii=1;
Step 2, judges whether ii < l/l, if so, then directly carries out next step, no, then type, is labeled as lab Optimum working time of node arrange, then terminate;
Step 3, calculates maximum additionally effectively cover time and pro-jobs degree, and to neighbours broadcast mes (i, null, upd,δpi);
Step 4, judgesIf being, siδ piWhether maximum, if s in neighboursiδ pi Neighbours are maximum, siLabelling oneself is lab and broadcasts mes (i, lab, sch, δ p to neighboursi)di=di-bi, siexits.;If siδ piNeighbours are not maximum, judge siWhether receive neighbours skMes (k, lab, sch, δ pk);If siIt is to receive neighbours skMes (k, lab, sch, δ pk), then siMore new neighbor skInformation, recalculateδ pi, and broadcast mes (i, upd, null, δ p to neighboursi);If siIt is not received by neighbours skMes (k, lab, sch, δ pk), then, judge siWhether receive neighbours skMes (k, upd, null, δ pk), if siIt is to receive neighbours skMes (k, upd,null,δpk), siMore new neighbor skPro-jobs degree;If siIt is not received by neighbours skMes (k, upd, null, δ pk), then return and judge
Further, described wireless receiving module is provided with radio net cooperative spectrum sensing module, described radio net The radio net cooperation frequency spectrum sensing method that frequency spectrum sensing module is made in complexation includes:
Step one, the node participating in cooperative sensing proceeds by the cycle for τsFrequency spectrum detection process, obtain primary user frequency The feature of spectrum resource;Feature according to primary user's signal and channel fading coefficient, calculate each local sensing node criReceive Signal yi(n);According to energy measuring principle, obtain sensing node criStatistic v of the signal energy at placei, when sampling quantity is enough When big, viApproximate Gaussian distributed;
Step 2, normal sensing node and malice sensing node pass through orthogonal CCCH to data fusion center Carry out the report of perception information;Normal sensing node is faithfully reported the perception information of oneself, and malicious node then adopts false-alarm Attack mode is reported: when signal energy statistic viMore than attacking threshold value η, then faithfully report the sensing results of oneself; Otherwise will be with Probability paOffensive attack, sends a higher energy value to reach the mesh of malicious attack to data fusion center 's;
Step 3, data fusion center carries out data fusion, and the evil according to malicious node to the perception information collected Meaning attack mode calculates the false-alarm probability of the overall situation;Signal to noise ratio γ according to each nodeiParticipate in the secondary of cooperative sensing for each Level user cri, i=1 ... k one weight of designThen signal energy statistic u collection being obtainediCarry out Linear weighted function obtains the statistic of final signal energyAnalysis false-alarm malicious attack pattern is made to frequency spectrum perception The impact becoming, obtains overall false-alarm probability pfWith attack Probability pa, attack threshold value η, the function expression between attack strength δ such as Under:
p f = q ( σ i = 1 k ω i 2 ( 1 + 2 γ i ) q ( p d ) + τ s f s ( σ i = 1 k ω i γ i + c 1 - c 0 σ u 2 ) )
Wherein:
Step 4, secondary user's and primary user's share spectrum resources, if primary user is detected to be in not busy state, will be with High-power transmission signal, otherwise will be with small-power transmission signal;Secondary user's transmitter su-tx determining according to data fusion center Plan result adjusts the signal transmission power of oneself, if primary user pu is detected to be in not busy state, will be with high-power p0Transmitting Signal;If it is primary user pu with power p that primary user pu is in busy conditionpTransmission signal, secondary user's transmitter su-tx will With small-power p1Transmission signal;Therefore the average throughput in a time frame in secondary network is written as form:
r = e { t - τ s t [ ( 1 - p f ) p ( h 0 ) log 2 ( 1 + g s s p 0 σ u 2 ) + p f p ( h 0 ) log 2 ( 1 + g s s p 1 σ u 2 ) + ( 1 - p d ) p ( h 1 ) log 2 ( 1 + g s s p 0 h k p p + σ u 2 ) + p d p ( h 1 ) log 2 ( 1 + g s s p 1 h k p p + σ u 2 ) ] } - - - ( 1 )
Wherein: hk,gssIt is primary user transmitter pu-tx respectively to secondary user's transmitter su-tx secondary user's transmitter Channel fading coefficient between su-tx, secondary user's transmitter su-tx to secondary user's receiver su-rx, p (h0) and p (h1) Represent that primary user pu is practically in the probability of not busy state and busy condition respectively;
Step 5, builds Optimized model, determines the constraints about transmission power and detecting period, and solution is set up Optimization problem, obtains so that the handling capacity of the secondary network maximum perception cycle of cooperative sensing and the signal of secondary user's are sent out Penetrate power;Ensure that secondary user's network can work long hours, the transmission power of secondary user's need to be limited it is ensured that secondary use The average emitted power of family network is less than limit value:
e{α0p01p10p01p1}≤pav(2)
P in formulaavThe maximum average emitted power of secondary user's transmitter su-tx, this averagely refer to fading channel system Number hi,gss,gspThe expectation of stochastic variable;The top priority of cognitive radio networks is the service quality of protection primary user's network, Therefore the jamming power of network is limited;According to the spectrum sharing network model based on cooperative sensing it is known that interference only exists Primary user pu is in and occurs during busy condition, so average interference power constraint is written as form:
e{gsp0p01p1)}≤qav(3)
Guarantee that the detection probability at each node and the whole detection probability of network are not less than respective target detection respectively Probability, the restrictive condition with regard to detection probability is as follows:
pd≥pth,pdi≥pth, i=1,2 ... k (4)
According under above-mentioned restrictive condition, set up the optimization with the average throughput maximizing secondary network as object function Problem:
max { τ s , ϵ , { ϵ i } , p 0 , p 1 } r s u b j e c t t o ( 2 ) , ( 3 ) , ( 4 ) , p 0 &greaterequal; 0 , p 1 &greaterequal; 0 0 ≤ τ s ≤ t - - - ( pr o b l e m 1 )
Solve set up optimization problem, select to make the perception week of the cooperative sensing of handling capacity maximum of secondary network The signal transmission power of phase and secondary user's is as the perceptual parameters of this frequency spectrum perception model;
Step 6, repetitive cycling step one is to step 5, until completing emulation experiment 1000 times, to the optimum obtaining every time Solution is averaged, using meansigma methodss as the perceptual parameters of frequency spectrum perception model.
The virtual three-dimensional scene controller that the present invention provides, integrates wireless mouse, keypad function, 360 degree of no dead angles Arbitrarily it is achieved that the comprehensive control in Virtual Space and roaming, pistol type design meets holds custom, can be exchanged with right-hand man for manipulation Operation, 20 meters of coverage, support gesture manipulation, support large-scale somatic sensation television game, the operation meeting 3d virtual scene requires.This The trust value computing method of the wireless mesh network node that invention provides, comprising: direct trust value calculates, indirect trust values calculate With comprehensive trust value computing three phases, the interaction times of different time piece, root between direct trust value calculating acquisition node first According to the data setup time sequence obtaining, then predict the interaction of next timeslice between node by third index flatness Number of times, using the relative error of interaction times predictive value and actual value as node direct trust value, the calculating of indirect trust values Formula adopts obtained from multipath trust recommendation mode, and comprehensive trust value is by direct trust value and indirect trust values conformity calculation Draw;The present invention provides a method that for node trust value computing, according to the concrete condition of network, adaptable put down may be selected Sliding factor alpha, believability threshold φ, the value of direct trust value weight beta it is ensured that the time attenuation characteristic of trust value and objectivity, Objectively and accurately describe the credibility of node, computation complexity is low and communication cost is little, be applicable to wireless mesh network, have Stronger popularization and using value.The present invention is in always effective cover time, network life, average weighted incident detection rate and network Residue energy of node uniformity aspect, the performance of modified hydrothermal process has been above the performance of original algorithm and random algorithm.
Brief description
Fig. 1 is virtual three-dimensional scene controller architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is receiver architecture schematic diagram provided in an embodiment of the present invention;
In figure: 1, gun body;2nd, first circuit board;3rd, charging inlet;4th, lithium battery;5th, trigger-type button;6th, navigation direction Key;11st, housing;13rd, second circuit board;15th, usb interface;16th, display lamp.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to Limit the present invention.
Below in conjunction with the accompanying drawings the application principle of the present invention is explained in detail.
Refer to the virtual three-dimensional scene controller of Fig. 1 to Fig. 2: the embodiment of the present invention, including control rifle and receptor, institute State control rifle and include gun body 1, described gun body 1 is provided with trigger-type button 5 and navigation direction key 6, and described trigger-type button 5 is located at The front of gun body 1, described navigation direction key 6 is located at the rearward end of gun body 1;
First circuit board 2 and lithium battery 4 are installed in described gun body 1 inner chamber, described first circuit board 2 is provided with three Axle gyroscope, three axis accelerometer module, a mcu, wireless transmitter module, described three-axis gyroscope, three axis accelerometer mould Block and wireless transmitter module are connected with a described mcu respectively;
Described receptor includes wireless receiving module, and one end of described wireless receiving module is provided with usb interface 15, described nothing Second circuit board 13 is installed in line receiver module inner chamber, described second circuit board 13 is provided with the 2nd mcu12 and with its phase Wireless receiving module even;
Described three-axis gyroscope, three axis accelerometer module collection x, y, z axle in virtual three-dimensional space scene for the mouse Position signalling and export to a described mcu, a described mcu passes through described wireless transmitter module and wireless receiving module will Mouse positional data transmits to described 2nd mcu, and described 2nd mcu passes through described usb interface 15 again, and mouse positional data is defeated Go out to computer.
Described gun body 1 is being provided with, positioned at small of the stock lower end, the extension being connected with it, and described lithium battery 4 is arranged on described In the inner chamber of extension, described lithium battery 4 inline power management module, described lithium battery 4 is through described power management module and institute State a mcu to be connected;The rear end of extension is provided with charging inlet 3, and described charging inlet 3 is connected with described power management module.
Described wireless receiving module is provided with display lamp 16, and described display lamp 16 is connected with described 2nd mcu.
Described three-axis gyroscope, three axis accelerometer module adopt the module of model mpu6050, described wireless transmit mould Block and wireless receiving module all adopt the 2.4g wireless module of model rf2401.
Three-axis gyroscope, three axis accelerometer module adopt the module of model mpu6050, and this module embeds three axis accelerometer Instrument and three axis accelerometer, the i2c bus using standard carries out reading and writing data and control.Three-axis gyroscope can distinguish aware space The change of the anglec of rotation in x-axis, y-axis and z-axis, the rotation angle information of detection, through a mcu algorithm calculation process, controls meter Left and right in calculation machine virtual 3d scene, rotate up and down and in front and back.And three axis accelerometer can distinguish aware space x-axis, y-axis and z The change of translational speed on axle, the displacement information of detection, through a mcu algorithm calculation process, control computer virtual 3d field Left and right in scape, upper and lower and movable.Correspondingly to virtual 3d scene after summary angle and change in displacement information The adjustment at interior visual angle, can facilitate and carry out spatial roaming control in virtual 3d scene.
The angular velocity full lattice sensing range of mpu-6050 is ± 250, ± 500, ± 1000 and ± 2000 °/sec (dps), can Accurately follow the trail of quick with action at a slow speed, the accelerator full lattice sensing range that user's programmable controls be ± 2g, ± 4g ± 8g with ± 16g.Product transmission can pass through the ic being up to 400khz.Mpu-6000 can be in different operating at voltages, and vdd supply voltage is situated between and is 2.5v ± 5%, 3.0v ± 5% or 3.3v ± 5%, logic interfacing vvdio is powered as 1.8v ± 5% (mpu6000 only use vdd), The agitator that other features include built-in temperature-sensitive sticker and only have ± 1% variation in environment of operation.
Wireless transmitter module is using general 2.4g wireless transmitter module rf2401 in the world, 50 meters of transmission range, transmission speed Rate 1m/s, has that communication frequency is high, and capacity is big, the features such as long transmission distance.
First mcu adopt 32 arm processor chips, built-in modulus translation interface, can be by gyroscope, acceleration analysis The information such as information and trigger-type button 5, handss navigation direction key 6 is entered line algorithm conversion and is encoded, and is launched by wireless module Go.
Lithium battery 4 adopts high capacity polymer lithium battery group, has stable performance, small volume, its embedded power management Module can prevent the faults such as lithium battery external short circuit, overcharge, over-discharge, provides long-time stable power supply for device.
Trigger-type button 5 forefinger control, is defined as mouse function left button in computer operating system.
Navigation direction key 6 is rolling ball structure, is controlled with thumb, realize respectively up and down, left and right 4 directions press Directly press totally 5 keypress functions with 1 to control.4 arrow buttons define according to software requirement, directly descend button definition to be computer Mouse function right button in operating system.
Charging inlet 3 provides interface for lithium cell charging, can be using special charger it is also possible to pass through data switch line Access computer usb interface and electricity is adopted from computer.
Receptor, using standard usb2.0 communication standard, is coupled together with computer by usb interface 15 by this interface, There is provided power supply data coffret for receptor.
Wireless receiving module is using general 2.4g wireless module rf2401 in the world, low based on ieee802.15.4 standard Power consumption Personal Area Network agreement, has that communication frequency is high, and capacity is big, the features such as long transmission distance.Matched by address, can prevent empty here The interfering of other wireless devices interior.
Using the virtual three-dimensional scene controller of the present invention, directly control rifle can be held with left hand or the right hand, in the air Tilt, rotation or movement are adjusted to the picture of virtual 3d scene, by trigger-type button 5 and navigation direction key 6 to void The behavior intended in 3d scene is controlled.
First usb interface 15 and computer are coupled together, three-axis gyroscope and triaxial accelerometer are placed on home position, point to Its original orientation, home position p (x, y, z), r (rx, ry, rz) can make a reservation for.Then, 4 directionkeys are controlled with thumb, respectively Scene is controlled to move to four direction;Control rifle forwards, backwards both direction move, in 3d scene drive scene advance and after Move back;Control rifle four direction skew vertically and horizontally, control scene to do left rotation and right rotation with current point and rotate up and down respectively;With When, trigger-type button 5 is controlled with forefinger, navigation direction key 6 is controlled with middle finger, realizes the left and right key operation of mouse.
Further, described wireless transmitter module is provided with wireless mesh network node trust value computing unit, described wireless The trust value computing method of the wireless mesh network node of mesh network node trust value computing unit comprises the following steps:
Step one, the interaction times of different time piece between acquisition node, according to the data setup time sequence obtaining, pass through Third index flatness predicting between node the interaction times of next timeslice, by the phase of interaction times predictive value and actual value To error as node direct trust value;The concrete calculation procedure of direct trust value is:
The interaction times of n timeslice between collection network observations node i and node j:
Choose intervals t as an observation time piece, with observer nodes i and tested node j in 1 timeslice Interior interaction times as observation index, true interaction times, be denoted as yt, record the y of n timeslice successivelyn, and preserved In the communications records table of node i;
The interaction times of (n+1)th timeslice of prediction:
According to the interaction times setup time sequence of the n timeslice collecting, using under third index flatness prediction Interaction times between one timeslice n+1 interior nodes i and j, predict interaction times, are denoted asComputing formula is as follows:
y ^ n + 1 = a n + b n + c n
Predictive coefficient an、bn、cnValue can be calculated by equation below:
a n = 3 y ^ n + 1 ( 1 ) - 3 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 )
b n = α 2 ( 1 - α ) 2 [ ( 6 - 5 α ) y ^ n + 1 ( 1 ) - 2 ( 5 - 4 α ) y ^ n + 1 ( 2 ) + ( 4 - 3 α ) y ^ n + 1 ( 3 ) ]
c n = α 2 2 ( 1 - α ) 2 [ y ^ n + 1 ( 1 ) - 2 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 ) ]
Wherein:Be respectively once, secondary, Three-exponential Smoothing number, calculated by equation below Arrive:
y ^ n + 1 ( 1 ) = α × y n + ( 1 - α ) × y ^ n ( 1 )
y ^ n + 1 ( 2 ) = α × y ^ n + 1 ( 1 ) + ( 1 - α ) × y ^ n ( 2 )
y ^ n + 1 ( 3 ) = α × y ^ n + 1 ( 2 ) + ( 1 - α ) × y ^ n ( 3 )
It is the initial value of third index flatness, its value is
y ^ 0 ( 1 ) = y ^ 0 ( 2 ) = y ^ 0 ( 3 ) = y 1 + y 2 + y 3 3
α is smoothing factor (0 < α < 1), embodies the time attenuation characteristic trusted, that is, from predictive value more close to timeslice ytWeight is bigger, from predictive value more away from timeslice ytWeight is less;Usually, if data fluctuations are larger, and long-term trend Amplitude of variation is larger, assumes α when substantially rapidly rising or falling trend and should take higher value (0.6~0.8), can increase in the recent period Data is to the impact predicting the outcome;When data has fluctuation, but long-term trend change little when, α can between 0.1~0.4 value; If steadily, α should take smaller value (0.05~0.20) to data fluctuations;
Calculating direct trust value:
Direct trust value td of node jijFor predicting interaction timesWith true interaction times yn+1Relative error,
Step 2, calculates indirect trust values using calculating formula obtained from multipath trust recommendation mode;Using multipath The concrete calculation procedure that calculating formula obtained from trust recommendation mode calculates indirect trust values is:
The collection direct trust value to node j for the trusted node:
Node i meets td to allikThe credible associated nodes of≤φ inquire its direct trust value to node j, wherein φ For the believability threshold of recommended node, according to the precision prescribed of credibility, the span of φ is 0~0.4;
Calculating indirect trust values:
Trust value collected by COMPREHENSIVE CALCULATING, obtains indirect trust values tr of node jij,
Wherein, had with j node in the associated nodes for observer nodes i for the set (i) and interacted And its direct trust value meets tdikThe node set of≤φ;
Step 3, draws comprehensive trust value by direct trust value and indirect trust values conformity calculation;Concrete calculation procedure is:
Comprehensive trust value (tij) computing formula as follows: tij=β tdij+(1-β)trij, wherein β (0≤β≤1) expression is directly Connect the weight of trust value, when β=0, node i and node j do not have a direct interaction relation, the calculating of comprehensive trust value directly from In indirect trust values, it is more objective to judge;When β=1, node i is to the comprehensive trust value of node j all from directly trusting Value, in this case, judges more subjective, Practical Calculation can determine the value of β as needed.
Further, described wireless transmitter module is provided with signal negentropy computing module, described signal negentropy computing module Signal negentropy computational methods include:
j ^ ( x ) ≈ σ j = 1 n k j [ e { g j ( x ) } - e { g j ( m ) } ] 2 ;
Wherein, kjFor some normal numbers, m is the gaussian variable with zero-mean, unit variance, function gjFor non-secondary letter Number;
As all of gjDuring=g, approximate expression becomes:
jg(x)≈c[e{g(x)}-e{g(m)}]2
Wherein, g is arbitrarily non-quadratic function, and c is a constant.
Further, described wireless transmitter module is provided with wireless network distributed module, the distributed mould of described wireless network The distributed method of block includes:
Step one, the neighbours of node si, the point position of covering, default network life l, the marking class of battery life bi, si Type upd, ii=1;
Step 2, judges whether ii < l/l, if so, then directly carries out next step, no, then type, is labeled as lab Optimum working time of node arrange, then terminate;
Step 3, calculates maximum additionally effectively cover time and pro-jobs degree, and to neighbours broadcast mes (i, null, upd,δpi);
Step 4, judgesIf being, siδ piWhether maximum, if s in neighboursiδ pi Neighbours are maximum, siLabelling oneself is lab and broadcasts mes (i, lab, sch, δ p to neighboursi)di=di-bi, siexits.;If siδ piNeighbours are not maximum, judge siWhether receive neighbours skMes (k, lab, sch, δ pk);If siIt is to receive neighbours skMes (k, lab, sch, δ pk), then siMore new neighbor skInformation, recalculate δpi, and broadcast mes (i, upd, null, δ p to neighboursi);If siIt is not received by neighbours skMes (k, lab, sch, δ pk), then, judge siWhether receive neighbours skMes (k, upd, null, δ pk), if siIt is to receive neighbours skMes (k, upd,null,δpk), siMore new neighbor skPro-jobs degree;If siIt is not received by neighbours skMes (k, upd, null, δ pk), then return and judge
Further, described wireless receiving module is provided with radio net cooperative spectrum sensing module, described radio net The radio net cooperation frequency spectrum sensing method that frequency spectrum sensing module is made in complexation includes:
Step one, the node participating in cooperative sensing proceeds by the cycle for τsFrequency spectrum detection process, obtain primary user frequency The feature of spectrum resource;Feature according to primary user's signal and channel fading coefficient, calculate each local sensing node criReceive Signal yi(n);According to energy measuring principle, obtain sensing node criStatistic v of the signal energy at placei, when sampling quantity is enough When big, viApproximate Gaussian distributed;
Step 2, normal sensing node and malice sensing node pass through orthogonal CCCH to data fusion center Carry out the report of perception information;Normal sensing node is faithfully reported the perception information of oneself, and malicious node then adopts false-alarm Attack mode is reported: when signal energy statistic viMore than attacking threshold value η, then faithfully report the sensing results of oneself; Otherwise will be with Probability paOffensive attack, sends a higher energy value to reach the mesh of malicious attack to data fusion center 's;
Step 3, data fusion center carries out data fusion, and the evil according to malicious node to the perception information collected Meaning attack mode calculates the false-alarm probability of the overall situation;Signal to noise ratio γ according to each nodeiParticipate in the secondary of cooperative sensing for each Level user cri, i=1 ... k one weight of designThen signal energy statistic u collection being obtainediEnter Row linear weighted function obtains the statistic of final signal energyAnalysis false-alarm malicious attack pattern is to frequency spectrum perception The impact causing, obtains overall false-alarm probability pfWith attack Probability pa, attack threshold value η, the function expression between attack strength δ As follows:
p f = q ( σ i = 1 k ω i 2 ( 1 + 2 γ i ) q ( p d ) + τ s f s ( σ i = 1 k ω i γ i + c 1 - c 0 σ u 2 ) )
Wherein:
Step 4, secondary user's and primary user's share spectrum resources, if primary user is detected to be in not busy state, will be with High-power transmission signal, otherwise will be with small-power transmission signal;Secondary user's transmitter su-tx determining according to data fusion center Plan result adjusts the signal transmission power of oneself, if primary user pu is detected to be in not busy state, will be with high-power p0Transmitting Signal;If it is primary user pu with power p that primary user pu is in busy conditionpTransmission signal, secondary user's transmitter su-tx will With small-power p1Transmission signal;Therefore the average throughput in a time frame in secondary network is written as form:
r = e { t - τ s t [ ( 1 - p f ) p ( h 0 ) log 2 ( 1 + g s s p 0 σ u 2 ) + p f p ( h 0 ) log 2 ( 1 + g s s p 1 σ u 2 ) + ( 1 - p d ) p ( h 1 ) log 2 ( 1 + g s s p 0 h k p p + σ u 2 ) + p d p ( h 1 ) log 2 ( 1 + g s s p 1 h k p p + σ u 2 ) ] } - - - ( 1 )
Wherein: hk,gssIt is primary user transmitter pu-tx respectively to secondary user's transmitter su-tx secondary user's transmitter Channel fading coefficient between su-tx, secondary user's transmitter su-tx to secondary user's receiver su-rx, p (h0) and p (h1) Represent that primary user pu is practically in the probability of not busy state and busy condition respectively;
Step 5, builds Optimized model, determines the constraints about transmission power and detecting period, and solution is set up Optimization problem, obtains so that the handling capacity of the secondary network maximum perception cycle of cooperative sensing and the signal of secondary user's are sent out Penetrate power;Ensure that secondary user's network can work long hours, the transmission power of secondary user's need to be limited it is ensured that secondary use The average emitted power of family network is less than limit value:
e{α0p01p10p01p1}≤pav(2)
P in formulaavThe maximum average emitted power of secondary user's transmitter su-tx, this averagely refer to fading channel system Number hi,gss,gspThe expectation of stochastic variable;The top priority of cognitive radio networks is the service quality of protection primary user's network, Therefore the jamming power of network is limited;According to the spectrum sharing network model based on cooperative sensing it is known that interference only exists Primary user pu is in and occurs during busy condition, so average interference power constraint is written as form:
e{gsp0p01p1)}≤qav(3)
Guarantee that the detection probability at each node and the whole detection probability of network are not less than respective target detection respectively Probability, the restrictive condition with regard to detection probability is as follows:
pd≥pth,pdi≥pth, i=1,2 ... k (4)
According under above-mentioned restrictive condition, set up the optimization with the average throughput maximizing secondary network as object function Problem:
max { τ s , ϵ , { ϵ i } , p 0 , p 1 } r s u b j e c t t o ( 2 ) , ( 3 ) , ( 4 ) , p 0 &greaterequal; 0 , p 1 &greaterequal; 0 0 ≤ τ s ≤ t - - - ( pr o b l e m 1 )
Solve set up optimization problem, select to make the perception week of the cooperative sensing of handling capacity maximum of secondary network The signal transmission power of phase and secondary user's is as the perceptual parameters of this frequency spectrum perception model;
Step 6, repetitive cycling step one is to step 5, until completing emulation experiment 1000 times, to the optimum obtaining every time Solution is averaged, using meansigma methodss as the perceptual parameters of frequency spectrum perception model.
User only needs to move control rifle in the air, vertically and horizontally four direction translation, on screen mouse then press than Example is with mobile it is possible to be rapidly converted to onscreen cursor control.Rifle operation is controlled to press the will precise control of user completely, Hand-held comfortable feel, convenient, control sensitivity height.
Using virtual three-dimensional scene controller of the present invention, by computer operating system drive software, both can calculate Three-dimensional scenic picture is realized on machine control it is also possible to realize two-dimensional picture control on computers as common air mouse.
The virtual three-dimensional scene controller of the present invention integrates wireless mouse, keypad function, and 360 degree of no dead angles are any It is achieved that the comprehensive control in Virtual Space and roaming, pistol type design meets holds custom, can exchange behaviour with right-hand man for manipulation Make, 20 meters of coverage, support gesture manipulation, support large-scale somatic sensation television game, the operation meeting 3d virtual scene requires.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (5)

1. a kind of virtual three-dimensional scene controller is it is characterised in that described virtual three-dimensional scene controller includes controlling rifle and connects Receive device, described control rifle includes gun body, and described gun body is provided with trigger-type button and navigation direction key, described trigger-type presses key mapping In the front of gun body, described navigation direction key mapping is in the rearward end of gun body;
First circuit board and lithium battery are installed in described gun body inner chamber, described first circuit board is provided with three-axis gyroscope, Three axis accelerometer module, a mcu, wireless transmitter module, described three-axis gyroscope, three axis accelerometer module and wireless Penetrate module to be connected with a described mcu respectively;
Described receptor includes wireless receiving module, and one end of described wireless receiving module is provided with usb interface, described wireless receiving Second circuit board is installed in module internal cavity, described second circuit board is provided with the 2nd mcu and coupled wireless receiving Module;
Described gun body is being provided with, positioned at small of the stock lower end, the extension being connected with it, and described lithium battery is arranged on described extension Inner chamber in, described lithium battery inline power management module, described lithium battery is through described power management module and a described mcu It is connected;The rear end of extension is provided with charging inlet, and described charging inlet is connected with described power management module;
Described wireless receiving module is provided with display lamp, and described display lamp is connected with described 2nd mcu;
Navigation direction key is rolling ball structure, is controlled with thumb, realize respectively up and down, left and right 4 directions press and 1 Directly press totally 5 keypress functions to control.
2. virtual three-dimensional scene controller as claimed in claim 1 is it is characterised in that the setting of described wireless transmitter module has or not Line mesh network node trust value computing unit, the wireless mesh network of described wireless mesh network node trust value computing unit The trust value computing method of node comprises the following steps:
Step one, the interaction times of different time piece between acquisition node, according to the data setup time sequence obtaining, by three times Exponential smoothing, to predict the interaction times of next timeslice between node, misses relative with actual value for interaction times predictive value Difference is as the direct trust value of node;The concrete calculation procedure of direct trust value is:
The interaction times of n timeslice between collection network observations node i and node j:
Choose intervals t as an observation time piece, with observer nodes i and tested node j in 1 timeslice Interaction times as observation index, true interaction times, be denoted as yt, record the y of n timeslice successivelyn, and save it in section In the communications records table of point i;
The interaction times of (n+1)th timeslice of prediction:
According to the interaction times setup time sequence of the n timeslice collecting, predicted next using third index flatness Interaction times between timeslice n+1 interior nodes i and j, predict interaction times, are denoted asComputing formula is as follows:
y ^ n + 1 = a n + b n + c n
Predictive coefficient an、bn、cnValue can be calculated by equation below:
a n = 3 y ^ n + 1 ( 1 ) - 3 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 )
b n = α 2 ( 1 - α ) 2 [ ( 6 - 5 α ) y ^ n + 1 ( 1 ) - 2 ( 5 - 4 α ) y ^ n + 1 ( 2 ) + ( 4 - 3 α ) y ^ n + 1 ( 3 ) ]
c n = α 2 2 ( 1 - α ) 2 [ y ^ n + 1 ( 1 ) - 2 y ^ n + 1 ( 2 ) + y ^ n + 1 ( 3 ) ]
Wherein:Be respectively once, secondary, Three-exponential Smoothing number, be calculated by equation below:
y ^ n + 1 ( 1 ) = α × y n + ( 1 - α ) × y ^ n ( 1 )
y ^ n + 1 ( 2 ) = α × y ^ n + 1 ( 1 ) + ( 1 - α ) × y ^ n ( 2 )
y ^ n + 1 ( 3 ) = α × y ^ n + 1 ( 2 ) + ( 1 - α ) × y ^ n ( 3 )
It is the initial value of third index flatness, its value is
y ^ 0 ( 1 ) = y ^ 0 ( 2 ) = y ^ 0 ( 3 ) = y 1 + y 2 + y 3 3
α is smoothing factor (0 < α < 1), embody trust time attenuation characteristic, that is, from predictive value more close to timeslice ytWeight Bigger, from predictive value more away from timeslice ytWeight is less;Usually, if data fluctuations are larger, and long-term trend change Amplitude is larger, assumes α when substantially rapidly rising or falling trend and should take higher value (0.6~0.8), can increase Recent data To the impact predicting the outcome;When data has fluctuation, but when long-term trend change is little, α is in 0.1~0.4 value;If data wave Dynamic steady, α takes 0.05~0.20;
Calculating direct trust value:
Direct trust value td of node jijFor predicting interaction timesWith true interaction times yn+1Relative error,
Step 2, calculates indirect trust values using calculating formula obtained from multipath trust recommendation mode;Trusted using multipath The concrete calculation procedure that calculating formula obtained from the way of recommendation calculates indirect trust values is:
The collection direct trust value to node j for the trusted node:
Node i meets td to allikThe credible associated nodes of≤φ inquire its direct trust value to node j, and wherein φ is to push away Recommend the believability threshold of node, according to the precision prescribed of credibility, the span of φ is 0~0.4;
Calculating indirect trust values:
Trust value collected by COMPREHENSIVE CALCULATING, obtains indirect trust values tr of node jij,Its In, set (i) be observer nodes i associated nodes in had with j node and to interact and its direct trust value meets tdikThe section of≤φ Point set;
Step 3, draws comprehensive trust value by direct trust value and indirect trust values conformity calculation;Concrete calculation procedure is:
Comprehensive trust value (tij) computing formula as follows: tij=β tdij+(1-β)trij, wherein β (0≤β≤1) expression directly letter Appoint the weight of value, when β=0, node i and node j do not have direct interaction relation, between the calculating of comprehensive trust value arises directly from Connect trust value, it is more objective to judge;When β=1, node i to the comprehensive trust value of node j all from direct trust value, In this case, judge more subjective, Practical Calculation determines the value of β as needed.
3. virtual three-dimensional scene controller as claimed in claim 1 is it is characterised in that described wireless transmitter module is provided with letter Number negentropy computing module, the signal negentropy computational methods of described signal negentropy computing module include:
j ^ ( x ) ≈ σ j = 1 n k j [ e { g j ( x ) } - e { g j ( m ) } ] 2 ;
Wherein, kjFor some normal numbers, m is the gaussian variable with zero-mean, unit variance, function gjFor non-quadratic function;
As all of gjDuring=g, approximate expression becomes:
jg(x)≈c[e{g(x)}-e{g(m)}]2
Wherein, g is arbitrarily non-quadratic function, and c is a constant.
4. virtual three-dimensional scene controller as claimed in claim 1 is it is characterised in that the setting of described wireless transmitter module has or not Gauze network distributed module, the distributed method of described wireless network distributed module includes:
Step one, the neighbours of node si, the point position of covering, default network life l, the type of battery life bi, si Upd, ii=1;
Step 2, judges whether ii < l/l, if so, then directly carries out next step, no, then type, is labeled as the section of lab The optimum working time of point arranges, and then terminates;
Step 3, calculates maximum additionally effective cover time and pro-jobs degree, and broadcasts mes (i, null, upd, δ to neighbours pi);
Step 4, judgesIf being, siδ piWhether maximum, if s in neighboursiδ piIn neighbour It is maximum between two parties, siLabelling oneself is lab and broadcasts mes (i, lab, sch, δ p to neighboursi)di=di-bi,siexits.;If siδ piNeighbours are not maximum, judge siWhether receive neighbours skMes (k, lab, sch, δ pk);If siIt is to receive To neighbours skMes (k, lab, sch, δ pk), then siMore new neighbor skInformation, recalculateδpi, and to neighbours Broadcast mes (i, upd, null, δ pi);If siIt is not received by neighbours skMes (k, lab, sch, δ pk), then, judge siIt is No receive neighbours skMes (k, upd, null, δ pk), if siIt is to receive neighbours skMes (k, upd, null, δ pk), siMore new neighbor skPro-jobs degree;If siIt is not received by neighbours skMes (k, upd, null, δ pk), then return and judge
5. virtual three-dimensional scene controller as claimed in claim 1 is it is characterised in that the setting of described wireless receiving module has or not Line electric network cooperative spectrum sensing module, the radio net cooperation frequency spectrum sense of described radio net cooperative spectrum sensing module Perception method includes:
Step one, the node participating in cooperative sensing proceeds by the cycle for τsFrequency spectrum detection process, obtain primary user's frequency spectrum resource Feature;Feature according to primary user's signal and channel fading coefficient, calculate each local sensing node criThe signal y receivingi (n);According to energy measuring principle, obtain sensing node criStatistic v of the signal energy at placei, when sampling quantity is sufficiently large, vi Approximate Gaussian distributed;
Step 2, normal sensing node and malice sensing node are carried out to data fusion center by orthogonal CCCH The report of perception information;Normal sensing node is faithfully reported the perception information of oneself, and malicious node then adopts false-alarm to attack Pattern is reported: when signal energy statistic viMore than attacking threshold value η, then faithfully report the sensing results of oneself;Otherwise Will be with Probability paOffensive attack, sends a higher energy value to reach the purpose of malicious attack to data fusion center;
Step 3, data fusion center carries out data fusion to the perception information collected, and attacks according to the malice of malicious node Blow mode calculates the false-alarm probability of the overall situation;Signal to noise ratio γ according to each nodeiThe secondary participating in cooperative sensing for each is used Family cri, i=1 ... k one weight of designThen signal energy statistic u collection being obtainediEnter line Property weighting obtain the statistic of final signal energyAnalysis false-alarm malicious attack pattern causes to frequency spectrum perception Impact, obtain overall false-alarm probability pfWith attack Probability pa, attack threshold value η, the function expression between attack strength δ such as Under:
p f = q ( σ i = 1 k ω i 2 ( 1 + 2 γ i ) q ( p d ) + τ s f s ( σ i = 1 k ω i γ i + c 1 - c 0 σ u 2 ) )
Wherein:
Step 4, secondary user's and primary user's share spectrum resources, if primary user is detected to be in not busy state, will be with big work( Rate transmission signal, otherwise will be with small-power transmission signal;Secondary user's transmitter su-tx is according to the decision-making knot of data fusion center Fruit adjusts the signal transmission power of oneself, if primary user pu is detected to be in not busy state, will be with high-power p0Transmission signal; If it is primary user pu with power p that primary user pu is in busy conditionpTransmission signal, secondary user's transmitter su-tx will be with little Power p1Transmission signal;Therefore the average throughput in a time frame in secondary network is written as form:
r = e { t - τ s t [ ( 1 - p f ) p ( h 0 ) log 2 ( 1 + g s s p 0 σ u 2 ) + p f p ( h 0 ) log 2 ( 1 + g s s p 1 σ u 2 ) + ( 1 - p d ) p ( h 1 ) log 2 ( 1 + g s s p 0 h k p p + σ u 2 ) + p d p ( h 1 ) log 2 ( 1 + g s s p 1 h k p p + σ u 2 ) ] } ;
Wherein: hk,gssIt is primary user transmitter pu-tx to secondary user's transmitter su-tx secondary user's transmitter su- respectively Channel fading coefficient between tx, secondary user's transmitter su-tx to secondary user's receiver su-rx, p (h0) and p (h1) respectively Represent that primary user pu is practically in the probability of not busy state and busy condition;
Step 5, builds Optimized model, determines the constraints about transmission power and detecting period, solves set up optimum Change problem, obtains making the perception cycle of cooperative sensing of handling capacity maximum of secondary network and the signal transmitting work(of secondary user's Rate;Ensure that secondary user's network can work long hours, the transmission power of secondary user's need to be limited it is ensured that secondary user's net The average emitted power of network is less than limit value:
e{α0p01p10p01p1}≤pav
P in formulaavThe maximum average emitted power of secondary user's transmitter su-tx, this averagely refer to channel fading coefficient hi, gss,gspThe expectation of stochastic variable;The top priority of cognitive radio networks is the service quality of protection primary user's network, therefore right The jamming power of network is limited;According to the spectrum sharing network model based on cooperative sensing it is known that interference is only primary Family pu is in and occurs during busy condition, so average interference power constraint is written as form:
e{gsp0p01p1)}≤qav
Guarantee that the detection probability at each node and the whole detection probability of network are not less than respective target detection probability respectively, Restrictive condition with regard to detection probability is as follows:
pd≥pth,pdi≥pth, i=1,2 ... k;
Ask according under above-mentioned restrictive condition, setting up the optimization with the average throughput maximizing secondary network as object function Topic:
m a x { τ s , ϵ , { ϵ i } , p 0 , p 1 } r
subject to(2),(3),(4),p0≥0,p1≥0;
0≤τs≤t
Solve set up optimization problem, select to make secondary network handling capacity maximum perception cycle of cooperative sensing and The signal transmission power of secondary user's is as the perceptual parameters of this frequency spectrum perception model;
Step 6, repetitive cycling step one, to step 5, until completing emulation experiment 1000 times, takes to the optimal solution obtaining every time Averagely, using meansigma methodss as the perceptual parameters of frequency spectrum perception model.
CN201610728710.5A 2016-08-25 2016-08-25 Virtual three-dimensional scene controller Pending CN106371626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610728710.5A CN106371626A (en) 2016-08-25 2016-08-25 Virtual three-dimensional scene controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610728710.5A CN106371626A (en) 2016-08-25 2016-08-25 Virtual three-dimensional scene controller

Publications (1)

Publication Number Publication Date
CN106371626A true CN106371626A (en) 2017-02-01

Family

ID=57879319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610728710.5A Pending CN106371626A (en) 2016-08-25 2016-08-25 Virtual three-dimensional scene controller

Country Status (1)

Country Link
CN (1) CN106371626A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778111A (en) * 2017-02-20 2017-05-31 周长英 A kind of control method and system of computer system user authority
CN107154876A (en) * 2017-05-18 2017-09-12 贵州斯曼特信息技术开发有限责任公司 A kind of large-scale data based on cloud service platform calculates acceleration system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2906809Y (en) * 2006-03-24 2007-05-30 上海科技馆 Multimedia ecologic scene simulation system
CN203217500U (en) * 2013-04-25 2013-09-25 安徽省电力公司培训中心 Handheld virtual space controller
CN103987054A (en) * 2014-05-27 2014-08-13 西安电子科技大学 Wireless network sensor network coverage distributed method
CN104038928A (en) * 2014-03-26 2014-09-10 宋晓宇 Method for calculating trust values of wireless Mesh network nodes
CN104113921A (en) * 2014-07-11 2014-10-22 山东科技大学 MIMO-EDM wireless communication system and method
CN104202102A (en) * 2014-09-10 2014-12-10 西安电子科技大学 Cooperative spectrum sensing method of cognitive radio network considering malicious nodes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2906809Y (en) * 2006-03-24 2007-05-30 上海科技馆 Multimedia ecologic scene simulation system
CN203217500U (en) * 2013-04-25 2013-09-25 安徽省电力公司培训中心 Handheld virtual space controller
CN104038928A (en) * 2014-03-26 2014-09-10 宋晓宇 Method for calculating trust values of wireless Mesh network nodes
CN103987054A (en) * 2014-05-27 2014-08-13 西安电子科技大学 Wireless network sensor network coverage distributed method
CN104113921A (en) * 2014-07-11 2014-10-22 山东科技大学 MIMO-EDM wireless communication system and method
CN104202102A (en) * 2014-09-10 2014-12-10 西安电子科技大学 Cooperative spectrum sensing method of cognitive radio network considering malicious nodes

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778111A (en) * 2017-02-20 2017-05-31 周长英 A kind of control method and system of computer system user authority
CN107154876A (en) * 2017-05-18 2017-09-12 贵州斯曼特信息技术开发有限责任公司 A kind of large-scale data based on cloud service platform calculates acceleration system

Similar Documents

Publication Publication Date Title
CN106778585B (en) A kind of face key point-tracking method and device
Zhang et al. Interference mitigation for cyber-physical wireless body area network system using social networks
CN110784880B (en) Antenna weight optimization method, terminal and readable storage medium
CN110288978A (en) A kind of speech recognition modeling training method and device
CN107273011A (en) Application program fast switch over method and mobile terminal
CN110321965A (en) The method and device that the training method of object weight identification model, object identify again
CN110035447A (en) A kind of measuring configuration method and terminal device
CN106068487A (en) The display of button-free activates
CN103472756A (en) Artificial intelligence achieving method, server and equipment
CN109934512A (en) A kind of training method and system of prediction model
CN105007104A (en) Method and system for pairing connection of terminal equipment
CN109217483A (en) A kind of charge power method of adjustment and device
CN108242961A (en) Full duplex cognitive radio networks cooperation frequency spectrum sensing method based on integrated study
CN102004843A (en) Handheld control roaming system with pattern recognition function
US10324134B2 (en) Method and device for ascertaining required charging time
CN107172702A (en) The method of adjustment and device of mobile terminal and its WiFi transmission powers
CN107948919A (en) A kind of shared method for processing information and mobile terminal
CN106371626A (en) Virtual three-dimensional scene controller
Pradhan et al. Cooperative spectrum sensing in cognitive radio network using multiobjective evolutionary algorithms and fuzzy decision making
CN115937638A (en) Model training method, image processing method, related device and storage medium
CN110022235A (en) Information processing method, terminal and server
CN113494940A (en) Dangerous house monitoring system based on wireless sensor network
CN106199216A (en) Radiation value display packing and device
CN108322924A (en) A kind of bandwidth switching method and mobile terminal
CN110351702A (en) System information area determines method, indicating means, terminal and the network equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170201

WD01 Invention patent application deemed withdrawn after publication