Computer and Modernization ›› 2018, Vol. 0 ›› Issue (09): 87-.doi: 10.3969/j.issn.1006-2475.2018.09.017
Previous Articles Next Articles
Received:
2018-03-08
Online:
2018-09-29
Published:
2018-09-30
CLC Number:
FU Wei, ZHOU Xin-li. Sectional Optimization Routing Algorithm Based on Geographic Location in UAV Network[J]. Computer and Modernization, 2018, 0(09): 87-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2018.09.017
[1] 曹英烈,谢胜利,邱宏燕. MANET中基于位置和拓扑信息的混合路由算法[J]. 华南理工大学学报(自然科学版), 2007,35(1):74-79. [2] 唐瑞春,郭双乐,纪红英. HOGGH:一种WMSN网络的路由优化算法[J]. 中国海洋大学学报(自然科学版), 2010,40(11):123-128. [3] 沙毅,李娜,张立立,等. 一种基于地理位置预测的Ad Hoc网络路由算法[J]. 小型微型计算机系统, 2015,36(3):493-496. [4] Ko Y B, Vaidya N H. Location-aided routing (LAR) in mobile ad hoc networks[C]// Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. 1998:66-75. [5] Fang Qing, Gao Jie, Guibas L J. Locating and bypassing routing holes in sensor networks[C]// Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies. 2004,4:2458-2468. [6] Gabriel K R, Sokal R R. A new statistical approach to geographic variation analysis[J]. Systematic Biology, 1969,18(3):259-278. [7] Toussaint G. The relative neighbourhood graph of a finite planar set[J]. Pattern Recognition, 1980,12(4):261-268. [8] Chen Dazhi, Varshney P K. A survey of void handling techniques or geographic routing in wireless networks[J]. IEEE Communications Surveys and Tutorials, 2007,9(1):50-67. [9] Nelson R, Kleinrock L. The spatial capacity of a slotted ALOHA multihop packet radio network with capture[J]. IEEE Transactions on Communications, 1984,32(6):684-694. [10]Kranakis E, Singh H, Urrutia J. Compass routing on geometric networks[C]// Proceedings of the 11th Canadian Conference on Computational Geometry. 1999:51-54. [11]Takagi H, Kleinrock L. Optimal transmission ranges for randomly distributed packet radio terminals[J]. IEEE Transactions on Communications, 1984,32(3):246-257. [12]Hou Ting-chao, Li V. Transmission range control in multihop packet radio networks[J]. IEEE Transactions on Communications, 1986,34(1):38-44. [13]Finn G G. Routing and Addressing Problems in Large Metropolitan-scale Internetworks[R].Marina Del Rey Information Sciences Institute, University of Southern California, 1987. [14]Stojmenovic I, Lin Xu. Power-aware localized routing in wireless networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2001,12(11):1122-1133. [15]Ramakrishnan B, Selvi M, Nishanth R B. Efficiency measure of routing protocols in vehicular ad hoc network using freeway mobility model[J]. Wireless Networks, 2017,23(2):323-333. [16]陈敏. OPNET网络仿真[M]. 北京:清华大学出版社, 2004. [17]Karp B, Kung H T. GPSR: Greedy perimeter stateless routing for wireless networks[C]// Proceedings of the 6th Annual ACM International Conference on Mobile Computing and Networking. 2000:243-254. [18]钱钊. 基于位置信息的移动自组织网络路由算法研究[D]. 哈尔滨:哈尔滨工业大学, 2013. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||