scispace - formally typeset
Search or ask a question
Author

Yanyu Meng

Bio: Yanyu Meng is an academic researcher from Beihua University. The author has contributed to research in topics: Network planning and design & Network packet. The author has an hindex of 1, co-authored 1 publications receiving 5 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The reliability of wireless sensor network is affected by the credibility of nodes, and with the increase of bit error probability and packet length, the energy cost of network is gradually smaller and smaller, and the minimum energy cost can approach to 0.01 kJ, indicating that the anti-attack ability of the proposed method is strong.
Abstract: The reliability of wireless sensor network is affected by the credibility of nodes. With the addition of random nodes and increase of coverage, the reliability decreases. In order to improve the reliability of wireless sensor network, a reliability analysis method of intelligent computing-oriented wireless sensor network is proposed. In this method, a node optimization deployment model of wireless sensor network is established; The adaptive rotation scheduling method is adopted for optimal design of networking routing of wireless sensor network; the sensor quantization fusion tracking method is adopted for quantification of the credibility of sensor gird points; then the reliability of wireless sensor network is measured based on the analysis results with quantization fusion to improve the reliability of wireless sensor network, so as to achieve optimal network design. The simulation results show that with the proposed method in construction of wireless sensor network, the reliability of network is good. With the increase of bit error probability and packet length, the energy cost of network is gradually smaller and smaller, and the minimum energy cost can approach to 0.01 kJ, which indicates that the anti-attack ability of the proposed method is strong. When the number of data forwarding is 700, the success reception rate can reach 100%. Therefore, the proposed method is of good application value in wireless sensor network networking.

6 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The proposed system model presents a unique instance of interference for successfully delivering control and data packets, and a probabilistic estimation has given for the packet delivery rate for the raised specific condition.
Abstract: The Industrial Internet of Things uses intelligent sensors to collect the physical properties of objects placed on a large area. It provides innovative service and network functioning, such as time-bounded data delivery and efficient sensor sleep cycle management. Intelligent scheduling is crucial to assisting the situation. The periodic scheduling of radio transceivers of sensor nodes into sleep or active mode helps accomplish efficient energy consumption. Such an extensive scale network work on data collection on multihop fashion. Our proposal provides the algorithm to form the node’s backbone, which task is to collect the data from sensors scatted in the area. Further, the heuristic algorithm is proposed to assist the backbone node in balancing the incoming traffic for scheduling. In Time Division Multiple Access (TDMA) driven Medium Access Control (MAC), the nodes are scheduled for data forwarding in the allotted time slot (owner node) in each time frame. Our proposed work is named aggressive scheduling medium access control (AS-MAC). If the owner node does not have data to forward, then the corresponding slot will be aggressively scheduled by other nodes. Therefore, that slot and all consecutive slots if the corresponding owner nodes do not use will go to the needy nodes. The proposed system model presents a unique instance of interference for successfully delivering control and data packets. Therefore, a probabilistic estimation has given for the packet delivery rate for the raised specific condition. Our proposal’s distinctive feature is that the performance is better than Time Division Multiple Access for any given load. Finally, the packet delivery rate, packet drop, energy consumption, and time frame requirement for a different number of sensor node has been calculated and compared with the current state-of-the-art proposals.

24 citations

Journal ArticleDOI
TL;DR: Simulation results show that the method used for real-time monitoring of network mobile node resource energy consumption is better, the reliability of the monitoring output is higher, and the detection results are accurate, which has a positive impact on improving network performance.

6 citations

Journal ArticleDOI
TL;DR: In this article, a network coverage optimization method based on a hybrid strategy to improve the Antlion algorithm is proposed, where the continuity boundary shrinkage factor is used to accelerate the search traversal of the algorithm and accelerate the convergence speed.
Abstract: The anti-seepage wall project is an important part of the anti-seepage system of water conservancy and hydropower projects, and it is the basic facility and barrier to resist floods and ensure the safety of people's lives and property. This paper analyzes the wireless communication GPRS (General Packet Radio Service) technology. After establishing a mathematical model and determining the optimal sensor deployment scheme, the mesh-type sensor network type is determined, and the overall design scheme of the system is analyzed. The wireless network completes the field information collection and instruction transmission, and transmits the field information to the remote monitoring platform for unified processing. In order to effectively improve the node coverage of wireless sensor networks, a network coverage optimization method based on a hybrid strategy to improve the Antlion algorithm is proposed. The continuity boundary shrinkage factor is used to improve the search traversal of the algorithm and accelerate the convergence speed. Dynamic weight coefficients are introduced during the elitization phase to balance the global exploration and local development capabilities of the algorithm. Combining the precocious convergence judgment mechanism and the dynamic hybrid mutation method, the algorithm can effectively jump out of the local optimum. The comparison experiments on 4 benchmark functions verify the effectiveness of the improved strategy. The water injection test was used to detect and evaluate the integrity and impermeability of the plastic concrete impervious wall. The drilling and excavation verification results confirmed the effectiveness and practicability of the method.

3 citations

Journal ArticleDOI
TL;DR: The LBTA_CSACO is based on the cooperative behavior of cuckoo search and ant colony optimization to find a collection of task allocation solutions and models the reliability of the system with the help of the availability of the System to maximize reliability.
Abstract: This paper discusses the load-balanced task allocation problem in the grid transaction processing system to maximize reliability. Finding the solution of optimal load-balanced task allocation is known to be an NP-hard. This paper presents a load-balanced task allocation based cuckoo search-ant colony optimization (LBTA_CSACO) method for this problem. The LBTA_CSACO is based on the cooperative behavior of cuckoo search and ant colony optimization to nd a collection of task allocation solutions. This paper also models the reliability of the system with the help of the availability of the system. The motive of this work is to maximize the reliability of the system. After the simulation, six existing algorithms are taken for the comparison of the results; Honey Bee Optimization (HBO), Ant Colony Optimization (ACO), Hierarchical Load Balanced Algorithm (HLBA), Dynamic and Decentralized Load Balancing (DLB), and Randomized respectively.

2 citations

Journal ArticleDOI
TL;DR: It is shown that when solving the multiobjective optimization problem, the introduction of self‐adaptive adjustment of cross and variation coefficients can well overcome the problem that genetic algorithm falls into the local optimal solution, whereas the network coverage control algorithm designed in this paper can achieve greater coverage and lower energy consumption.

1 citations