J4 ›› 2009, Vol. 44 ›› Issue (9): 52-55.

• Articles • Previous Articles     Next Articles

Particle swarm optimizationbasedwireless sensor  network nodes localization method

 ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo   

  1. 1. School of Information Science &Engineering Shandong Normal University,Jinan250014, Shandong, China;2. Shandong Computer Science Center, Jinan 250014, Shandong, China; 3. School of Information Management, Shandong Economic University, Jinan 250014, Shandong, China
  • Received:2009-05-20 Online:2009-09-16 Published:2009-11-05

Abstract:

To further enhance the location precision of unknown nodes in wireless sensor networks, a localization method based on particle swarm optimization is presented, through the combination of wireless sensor network and particle swarm optimization, which is dependent on distance. It can directly search outthe coordinates of unknown nodes by the distance from anchor nodes to unknown nodes. As is shown in the experimental results, compared to the normal locationalgorithms of fixed nodes,this method has higher positioning accuracy and can beapplied to the tracking of moving nodes.

Key words: wireless sensor networks(WSNs); particle swarm optimization(PSO); node location; anchor node

CLC Number: 

  • TP393
[1] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
[2] GUO Xiao-dong, JIAO Liang, QIU Yi-hong, GE Lian-sheng. Design and implementation of a multi-path inter-domain
routing simulator based on Click and NS2
[J]. J4, 2013, 48(11): 36-43.
[3] LIU Ai-Wen, LIU Fang-Ai. Research on a RP(k)based resource awareness model [J]. J4, 2009, 44(11): 57-62.
[4] SHU Zhi-Jiang, HU An-Yin, HU Lin, LIAN Jian. Research on the method of viral mobile communication cross entropy based on video service [J]. J4, 2009, 44(9): 32-34.
[5] LIU Ying-Hui, WANG Yang-Long, GUO Jiang, LI Dong-Yue. Channel sampling strategy of PTF with minimum time [J]. J4, 2009, 44(9): 56-59.
[6] DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78.
[7] DU Xiao-jun, LIN Bo-gang, LIN Zhi-yuan, LI Ying. Research on multiple population genetic algorithm in security software fuzzy test [J]. J4, 2013, 48(7): 79-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!