Font Size: a A A

Research For Target Traversing Through Sensory Fields

Posted on:2018-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z X LiaoFull Text:PDF
GTID:2348330518481939Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of microelectronics technology,sensor technology,communication technology and embedded technology,the wireless sensor network has been widely used in military and Environment Monitoring and other fields.It integrates information sensing,data processing,GPS positioning and network communication function.In the army,the wireless sensor network is mainly used as a means of detection enemy's military movements and actions.With the unceasing advancement in sensor technology,stealth technology research to avoid the enemy's military monitoring system has become very significantly important too.Traversing through a sensor field is an important application of anti-monitoring technology,in essence,belongs to target tracking application.The sensor network is intended to monitor whether the target exists and its active state by the information which collected from the distributed sensor nodes.However,unlike the sensor system,the purpose of the mobile object is to find a security path across the sensor area as far as possible.Therefore the relationship between the destination of sensor networks and mobile objects can be described as Monitoring and Anti-Monitoring.The primary purpose of this paper is to propose a new anti-monitoring strategy to improve the mobile object traversing performance.The research content includes reasonable exposure model,the rationality of risk prediction,a division of wireless sensor nodes and data information processing.Firstly,summarized the basis of the research on traversal algorithm.Such as connectivity coverage,location and routing protocols,and then conclude the research status of the existing anti-monitoring algorithm by these,also,analyzes some standard traversal algorithm in detail and pointed out its shortcomings.To guarantee the security of the mobile object traversing through a sensory field,a novel exposure model and a new dynamic heuristic anti-monitoring algorithm based on voronoi tessellation are proposed in this paper,which can estimate the real time risk of the mobile object approximately when it is traversing through the sensory field.In the algorithm,the division way we used Voronoi,the novel exposure model we add the idea of local density,and we have a comprehensive analysis of all possible next hop position for the selection.At last,we introduced a cost function to ensure dynamic heuristic search performance.In the paper,a large number of simulation experiments are carried out to verifythe feasibility and effectiveness of the strategy.The language used for the simulation test is Matlab and Java.The analysis can demonstrate the simulation of sensor distribution in graphical form.At the same time,the tests are capable of adjusting the parameters of the anti-monitoring algorithm to analyze the performance in all aspects.Theoretical analysis and simulation results show that the newly proposed methods have better stealth performance than existing methods and can find out a path with less risk to the destination for the mobile object to pass through the sensory field rapidly.
Keywords/Search Tags:Sensor networks, Anti-monitoring method, Voronoi tessellation, Dynamic Heuristic Algorithm
PDF Full Text Request
Related items