Nothing Special   »   [go: up one dir, main page]

CN104363654A - Wireless sensor network three-dimensional node positioning method based on tunneling method - Google Patents

Wireless sensor network three-dimensional node positioning method based on tunneling method Download PDF

Info

Publication number
CN104363654A
CN104363654A CN201410613884.8A CN201410613884A CN104363654A CN 104363654 A CN104363654 A CN 104363654A CN 201410613884 A CN201410613884 A CN 201410613884A CN 104363654 A CN104363654 A CN 104363654A
Authority
CN
China
Prior art keywords
node
sigma
optimization
function
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410613884.8A
Other languages
Chinese (zh)
Other versions
CN104363654B (en
Inventor
蒋敏兰
胡娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haining Yuanhua Town Industrial Investment Co Ltd
Original Assignee
Zhejiang Normal University CJNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Normal University CJNU filed Critical Zhejiang Normal University CJNU
Priority to CN201410613884.8A priority Critical patent/CN104363654B/en
Publication of CN104363654A publication Critical patent/CN104363654A/en
Application granted granted Critical
Publication of CN104363654B publication Critical patent/CN104363654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a wireless sensor network three-dimensional node positioning method based on a tunneling method. The method includes the steps of 1, initializing a wireless sensor network, for each node, acquiring a distance between one-hop neighbor nodes, including the former node, and acquiring an anchor node coordinate matrix C; 2, calculating absolute coordinate matrixes Xi and Xj of the one-hop neighbor nodes; 3, calculating a target function Sigma(Xj) at the absolute coordinate matrix Xj; 4, if the former node is an unknown one, acquiring coordinates of the former node by means of a centroid algorithm to form an anchor node, and transmitting the coordinates to all one-hop neighbor nodes; 5, repeating the steps from 1 to 4 to finish positioning till all nodes turn into anchor nodes. The method has the advantages that the problem of the existing positioning methods that error accumulation occurs due to a computation process complicated by increase in dimensionality of a three-dimensional space can be solved, positioning error is small, and positioning precision is high.

Description

Based on the wireless sensor network tri-dimensional node positioning method of Tunneling method
Technical field
The present invention relates to wireless sensor network field, be specifically related to the wireless sensor network tri-dimensional node positioning method (being called for short TMDS method) based on Tunneling method.
Background technology
Wireless sensor network (Wireless Sensor Network, WSN) node locating technique is one of main support technology of wireless sensor network, the process of node locating is the node utilizing a few locations known, determines the position of unknown node according to certain algorithm or certain mechanism.Current two dimensional wireless sensor network nodes location technology has been tending towards ripe, but the research of aspect, regarding three-dimensional space nodes location is but relatively little.In actual applications, due to landform restriction (as aloft, ocean, forest, the complex-terrain such as mountain area) or environmental limitations (as being positioned at aerial differing heights or the different depth of ocean), wireless senser is made often spatially to become three-dimensional distribution, instead of plane distribution, so be only that to carry out two-dimensional localization to transducer on two dimensional surface be far from being enough, need Position Research to expand to three dimensions.Three dimensions is because the increase of dimension, and calculating process is complicated, there will be the accumulation of error, even if the error of node self poisoning is very little, and also can be clearly after three-dimensional computing.In addition, after wireless sensor network system completes self poisoning, also will in conjunction with the accurate location of node self coordinate realization to external object, therefore the location algorithm of node self needs higher positioning accuracy.In recent years, wireless sensor network three-dimensional nodes orientation problem has been had to thought and the solution of many novelties.What proposed by Shang etc. the earliest comes from the location technology that psychometry various dimensions calibrate (Multidimensional scaling, MDS), for node locating provides a kind of new thinking.MDS is a kind of data analysis technique, is obtained carrying out computing based on similarity matrix (distance matrix as being made up of Euclidean distance between node) by the point in hyperspace.MDS provides multiple method to solve orientation problem, if internodal distance is all known, then utilizes the method for singular value decomposition directly to obtain the coordinate of node; If internodal distance only has part known, then the method for repeated optimization can only be utilized to solve, and algorithm in this paper belongs to the latter.Compared with other location algorithm, the location algorithm based on MDS can make full use of all internodal related informations in network and locate multiple node simultaneously, also can obtain the relative position figure of node when not having anchor node; When needs absolute position, the anchor node number that budgetary estimate needs is minimum, does not also limit the deployment of anchor node; And MDS for solve node locating problem can when there is error in limited range information and distance value still can after obtain relatively accurate coordinate.The algorithm of more existing MDS at present, most is representational MDS-MAP, MDS-MAP (P) and MDS-MAP (P, R) algorithm.MDS-MAP is a kind of centralized location algorithm based on MDS, and first MDS-MAP algorithm utilizes multidimensional scaling technology to set up the local map of adjacent node in a series of three dimensions, then realizes the whole network location through Coordinate Conversion.MDS-MAP algorithm make use of the advantage that MDS itself has, avoid the error introduced with the approximate internodal actual distance of shortest path distance simultaneously, therefore its positioning precision improves, but maximum shortcoming needs centralized calculating, is not suitable for network large-scale, pockety.MDS-MAP (P) algorithm and MDS-MAP (P, R) algorithm is the distributed improvement of MDS-MAP algorithm, by whole network is divided into subnet, for each subnet independent operating MDS-MAP algorithm, obtain local coordinate system, then conversion and fusion calculation result realize the whole network and locate.The complexity that this conversion and fusion will increase algorithm greatly, and can transmission error be introduced in the process changed and merge, and cause the accumulation of error, and also network size is larger, and this accumulation of error is more obvious, and computation complexity also becomes geometry multiple to increase.
Summary of the invention
Technical problem to be solved by this invention is to provide the wireless sensor network tri-dimensional node positioning method based on Tunneling method, can solve in current localization method because the increase of three dimensions dimension causes calculating process complicated, there will be the problem of the accumulation of error, and position error is little, positioning precision is high.
For solving above-mentioned existing technical problem, the present invention adopts following scheme: based on the wireless sensor network tri-dimensional node positioning method of Tunneling method, comprise the following steps:
Step one: wireless sensor network initialization, for each node, obtain the distance comprised between its single-hop neighbor node, and judge which node be unknown node which be anchor node, obtain anchor node coordinates matrix C, when there is unknown node and anchor node number is more than or equal to 3, perform step 2; If there is no unknown node, algorithm stops; If there is unknown node but anchor node number is less than 3 time suspend computing, recover to perform step 2 until meet after anchor node number is more than or equal to 3;
Step 2: the absolute coordinate matrix calculating single-hop neighbor node:
ε=ε max,Z=X 0
for(i=1:i max)
{ execution algorithm TMDS Tunneling method obtains unknown node coordinates matrix X i
Z=X i
Reduce the value of wucha_p;
}
Execution algorithm TMDS Tunneling method, obtains unknown node coordinates matrix X j;
Step 3: calculate at X jtarget function σ (the X at place j), then judge whether inequality is below set up,
|σ(X j)-σ(X)|<wucha_p
If set up, send to corresponding neighbor node calculating the coordinate figure obtained, otherwise directly abandon coordinate figure, wherein wucha_p is the error threshold preset;
Step 4: if self be unknown node and receive other node calculate coordinate figure out, so utilize centroid algorithm to obtain the coordinate of self, thus become an anchor node, then the coordinate figure of self is sent to all single-hop neighbor nodes;
Step 5: repeat step one to step 4, until all nodes are all anchor node, complete location.
As preferably, in described step one, the initialized concrete steps of radio sensing network are: first anchor node is to its each neighbor node broadcast own location information, and utilize classical tolerance MDS general principle to adopt the mode of Matrix Solving to solve to obtain anchor node coordinates matrix, classical tolerance MDS general principle is as described below:
Use matrix X n × 3to represent in 3 dimension spaces the coordinate of n point, to any two points l, h, for the Euclidean distance between them square, available following formula represents:
d lh 2 ( X ) = d lh 2 = &Sigma; a = 1 3 ( x la - x ha ) 2 = &Sigma; a = 1 3 ( x la 2 + x ha 2 - 2 x la x ha ) - - - ( 1 )
To the point of 3 in three dimensions, corresponding matrix X = x 11 x 12 x 13 x 21 x 22 x 23 x 31 x 32 x 33 , Use D 2(X) matrix of square distance is represented, then D 2(X) can be expressed as:
D 2 ( X ) = 0 d 12 2 d 13 2 d 21 2 0 d 23 2 d 31 2 d 32 2 0 = &Sigma; a = 1 3 x 1 a 2 x 1 a 2 x 1 a 2 x 2 a 2 x 2 a 2 x 2 a 2 x 3 a 2 x 3 a 2 x 3 a 2 + &Sigma; a = 1 3 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 - 2 &Sigma; a = 1 3 x 1 a x 1 a x 1 a x 2 a x 1 a x 3 a x 2 a x 1 a x 2 a x 2 a x 2 a x 3 a x 3 a x 1 a x 3 a x 2 a x 3 a x 3 a = &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 1 1 1 + 1 1 1 &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 - 2 &Sigma; a = 1 3 X a X a T = Ce T + eC T - 2 &Sigma; a = 1 3 X a X a T - - - ( 2 )
Wherein X abe a row of matrix X, to be element be C column vector, vectorial e to be element be all 1 column matrix.
As preferably, in described step 2, the Tunneling method concrete steps of execution algorithm TMDS are: the repeated optimization computational process utilizing Tunneling Method to be improved is:
Tunneling Method is used to target function σ (X), the function τ (X) that burrows of the MDS optimized algorithm based on Tunneling Method algorithm is defined as follows:
τ(X)=σ(X)-σ(X *) (3)
Wherein X *for the local minizing point of σ (X),
In formula (3), τ (X) can do following distortion and obtain τ 1(X)
τ(X)=|σ(X)-σ(X *)|
τ(X)=|σ(X)-σ(X *)|/P(X)
Wherein P ( X ) = | | D ( X * ) - D ( X ) | | w 2 = &Sigma; i < j &omega; ij ( d ij ( X * ) - d ij ( X ) ) 2 ,
τ(X)=|σ(X)-σ(X *)| λ/P(X)
Wherein λ (the 0< λ <1) intensity parameters that is the function that burrows,
τ(X)=|σ(X)-σ(X *)| λ(1+1/P(X))
τ(X)=|σ(X)-σ(X *)| λ(1+ω/P(X))
Wherein ω (ω >1) Width Function that is the function that burrows,
&tau; 1 ( X ) = | &sigma; ( X ) - &sigma; ( X * ) | &lambda; &Pi; k = 1 r ( 1 + &omega; / P k ( X ) ) 1 / r - - - ( 4 )
Wherein r is r alternative X,
Above-mentioned τ 1(X) all conditions that function needs possess that burrows is met as follows:
A. τ 1(X) do not change the zero point of being multiplied by after the X of a circulation, the function that burrows only also with τ 1(X) identical;
B. by regulating the intensity parameters λ of limit can change the impact of function pole value on the function that burrows that burrow, due to level off to 1, to τ 1(X) the configuration quantity that minimizes reduces gradually, can also avoid leveling off to horizontal line 0;
C. by selecting different limit width parameter ω, limit can be regulated to affect the size of its territory, and burrow function τ 1(X) two ratios based on X function can be seen as, such τ 1(X) minimize optimization problem and can regard a batch ticket problem as, for ease of mark, supposes P (X) >0, by τ 1(X) be labeled as
&tau; 1 ( X ) = M ( X ) P ( X ) - - - ( 5 )
Wherein M (X)=N (X) (ω+P (X)), such τ 1(X) can pass through N (X) (ω+P (X))/P (X) and N (X)=| σ (X)-σ (X *) | λobtain a limit determined, suppose to find a Y, following formula is set up
&tau; 1 ( X ) = M ( X ) P ( X ) &le; M ( Y ) P ( Y ) = &tau; 1 ( Y ) - - - ( 6 )
P (X) is multiplied by both sides, uses P (X) >0, then can obtain
M ( X ) - M ( Y ) P ( Y ) P ( X ) &le; 0 - - - ( 7 )
Or F (q, X)=M (X)-qP (X)≤0 (8)
Like this, as long as an X can be found to make F (q, X) <0, then τ 1(X) < τ 1(Y) just set up, therefore, using iteration optimization algorithms to F (q, X), is namely realize τ 1(X) minimize optimization;
have and τ 1(X) identical zero point and stationary point, but more easily construct its Optimization Framework, so right enforcement minimizes interative computation, and for each Optimization Steps and majorized function, only provide the function about X and step, calculation step is as follows:
1) as formula (5), (6), (7), (8), the mode of batch ticket is used to obtain F (q, X);
2) optimize F (q, X), be namely
M ( X ) = N ( X ) ( &Pi; k = 1 r ( P k ( X ) + &omega; ) 1 r ) - - - ( 9 ) With - ( &Pi; k = 1 r P k ( X ) 1 r ) - - - ( 10 )
3) with the product of two functions, namely N (X) and iteration optimization is carried out to M (X):
A. to N (X)=| σ (X)-σ (X *) | λbe optimized, by a nonnegative function | σ (X)-σ (X *) | the optimization of root realize;
B. there is σ (X) > σ (X in imagination *), then | σ (X)-σ (X *) |=σ (X)-σ (X *), and all verify with the more new data of this imagination to interative computation each time.If this is envisioned for negative, i.e. σ (X)≤σ (X *), then the step that burrows stops, because found an X *, reach the object optimizing computing;
4) right be optimized, by P k(X) output is optimized to realize:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
5) right be optimized, by function P k(X) and the optimization of output valve realizes:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
B. according to Cauchy-Schwarz inequality, right being optimized, is namely to d ijand-d (X) ij(X) optimization;
C. use double optimization method to d ij(X) being optimized, is namely right be optimized, described double optimization method is exactly the point with some distribution disorders of conic fitting;
D. according to Holder inequality pair optimization, be namely to the optimization of formula (1) based on the quadratic function of X;
E. according to the p-d of Holder inequality ij(X) namely optimization be to the optimization of formula (1) based on the linear function of X.
As preferably, from as unknown node in described step 4, receive the position coordinates that other node sends over, the computational process utilizing centroid algorithm to obtain self coordinate is:
Suppose that 3 anchor node coordinates are respectively (x 1, y 1, z 1), (x 2, y 2, z 2), (x 3, y 3, z 3), unknown node (x j, y j, z j) be respectively d to the Euclidean distance of three anchor nodes 1, d 2, d 3, then unknown node coordinate is:
x j = x 1 d 1 + d 2 + x 2 d 2 + d 3 + x 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
y j = y 1 d 1 + d 2 + y 2 d 2 + d 3 + y 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
z j = z 1 d 1 + d 2 + z 2 d 2 + d 3 + z 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3 .
Beneficial effect:
The present invention adopts technique scheme to provide wireless sensor network tri-dimensional node positioning method based on Tunneling method, can solve in current localization method because the increase of three dimensions dimension causes calculating process complicated, there will be the problem of the accumulation of error, and position error is little, positioning precision is high.
Accompanying drawing explanation
Fig. 1 is unknown node and anchor node random distribution figure in the present invention;
Fig. 2 is the impact of node communication radius on performance of the present invention;
Fig. 3 is the impact of network node on performance of the present invention;
Fig. 4 is the impact of anchor node ratio on performance of the present invention.
Embodiment
Based on the wireless sensor network tri-dimensional node positioning method of Tunneling method, comprise the following steps:
Step one: wireless sensor network initialization, for each node, obtain the distance comprised between its single-hop neighbor node, and judge which node be unknown node which be anchor node, obtain anchor node coordinates matrix C, when there is unknown node and anchor node number is more than or equal to 3, perform step 2; If there is no unknown node, algorithm stops; If there is unknown node but anchor node number is less than 3 time suspend computing, recover to perform step 2 until meet after anchor node number is more than or equal to 3;
Step 2: the absolute coordinate matrix calculating single-hop neighbor node:
ε=ε max,Z=X 0
for(i=1:i max)
{ execution algorithm TMDS Tunneling method obtains unknown node coordinates matrix X i
Z=X i
Reduce the value of wucha_p;
}
Execution algorithm TMDS Tunneling method, obtains unknown node coordinates matrix X j;
Step 3: calculate at X jtarget function σ (the X at place j), then judge whether inequality is below set up,
|σ(X j)-σ(X)|<wucha_p
If set up, send to corresponding neighbor node calculating the coordinate figure obtained, otherwise directly abandon coordinate figure, wherein wucha_p is the error threshold preset;
Step 4: if self be unknown node and receive other node calculate coordinate figure out, so utilize centroid algorithm to obtain the coordinate of self, thus become an anchor node, then the coordinate figure of self is sent to all single-hop neighbor nodes;
Step 5: repeat step one to step 4, until all nodes are all anchor node, complete location.In described step one, the initialized concrete steps of radio sensing network are: first anchor node is to its each neighbor node broadcast own location information, and utilize classical tolerance MDS general principle to adopt the mode of Matrix Solving to solve to obtain anchor node coordinates matrix, classical tolerance MDS general principle is as described below:
Use matrix X n × 3to represent in 3 dimension spaces the coordinate of n point, to any two points l, h, for the Euclidean distance between them square, available following formula represents:
d lh 2 ( X ) = d lh 2 = &Sigma; a = 1 3 ( x la - x ha ) 2 = &Sigma; a = 1 3 ( x la 2 + x ha 2 - 2 x la x ha ) - - - ( 1 )
To the point of 3 in three dimensions, corresponding matrix X = x 11 x 12 x 13 x 21 x 22 x 23 x 31 x 32 x 33 , Use D 2(X) matrix of square distance is represented, then D 2(X) can be expressed as:
D 2 ( X ) = 0 d 12 2 d 13 2 d 21 2 0 d 23 2 d 31 2 d 32 2 0 = &Sigma; a = 1 3 x 1 a 2 x 1 a 2 x 1 a 2 x 2 a 2 x 2 a 2 x 2 a 2 x 3 a 2 x 3 a 2 x 3 a 2 + &Sigma; a = 1 3 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 - 2 &Sigma; a = 1 3 x 1 a x 1 a x 1 a x 2 a x 1 a x 3 a x 2 a x 1 a x 2 a x 2 a x 2 a x 3 a x 3 a x 1 a x 3 a x 2 a x 3 a x 3 a = &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 1 1 1 + 1 1 1 &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 - 2 &Sigma; a = 1 3 X a X a T = Ce T + eC T - 2 &Sigma; a = 1 3 X a X a T - - - ( 2 )
Wherein X abe a row of matrix X, to be element be C column vector, vectorial e to be element be all 1 column matrix.
In described step 2, the Tunneling method concrete steps of execution algorithm TMDS are: the repeated optimization computational process utilizing TunnelingMethod to be improved is:
Tunneling Method is used to target function σ (X), the function τ (X) that burrows of the MDS optimized algorithm based on Tunneling Method algorithm is defined as follows:
τ(X)=σ(X)-σ(X *) (3)
Wherein X *for the local minizing point of σ (X),
In formula (3), τ (X) can do following distortion and obtain τ 1(X)
τ(X)=|σ(X)-σ(X *)|
τ(X)=|σ(X)-σ(X *)|/P(X)
Wherein P ( X ) = | | D ( X * ) - D ( X ) | | w 2 = &Sigma; i < j &omega; ij ( d ij ( X * ) - d ij ( X ) ) 2 ,
τ(X)=|σ(X)-σ(X *)| λ/P(X)
Wherein λ (the 0< λ <1) intensity parameters that is the function that burrows,
τ(X)=|σ(X)-σ(X *)| λ(1+1/P(X))
τ(X)=|σ(X)-σ(X *)| λ(1+ω/P(X))
Wherein ω (ω >1) Width Function that is the function that burrows,
&tau; 1 ( X ) = | &sigma; ( X ) - &sigma; ( X * ) | &lambda; &Pi; k = 1 r ( 1 + &omega; / P k ( X ) ) 1 / r - - - ( 4 )
Wherein r is r alternative X,
Above-mentioned τ 1(X) all conditions that function needs possess that burrows is met as follows:
A. τ 1(X) do not change the zero point of being multiplied by after the X of a circulation, the function that burrows only also with τ 1(X) identical;
B. by regulating the intensity parameters λ of limit can change the impact of function pole value on the function that burrows that burrow, due to level off to 1, to τ 1(X) the configuration quantity that minimizes reduces gradually, can also avoid leveling off to horizontal line 0;
C. by selecting different limit width parameter ω, limit can be regulated to affect the size of its territory, and burrow function τ 1(X) two ratios based on X function can be seen as, such τ 1(X) minimize optimization problem and can regard a batch ticket problem as, for ease of mark, supposes P (X) >0, by τ 1(X) be labeled as
&tau; 1 ( X ) = M ( X ) P ( X ) - - - ( 5 )
Wherein M (X)=N (X) (ω+P (X)), such τ 1(X) can pass through N (X) (ω+P (X))/P (X) and N (X)=| σ (X)-σ (X *) | λobtain a limit determined, suppose to find a Y, following formula is set up
&tau; 1 ( X ) = M ( X ) P ( X ) &le; M ( Y ) P ( Y ) = &tau; 1 ( Y ) - - - ( 6 )
P (X) is multiplied by both sides, uses P (X) >0, then can obtain
M ( X ) - M ( Y ) P ( Y ) P ( X ) &le; 0 - - - ( 7 )
Or F (q, X)=M (X)-qP (X)≤0 (8)
Like this, as long as an X can be found to make F (q, X) <0, then τ 1(X) < τ 1(Y) just set up, therefore, using iteration optimization algorithms to F (q, X), is namely realize τ 1(X) minimize optimization;
have and τ 1(X) identical zero point and stationary point, but more easily construct its Optimization Framework, so right enforcement minimizes interative computation, and for each Optimization Steps and majorized function, only provide the function about X and step, calculation step is as follows:
1) as formula (5), (6), (7), (8), the mode of batch ticket is used to obtain F (q, X);
2) optimize F (q, X), be namely
M ( X ) = N ( X ) ( &Pi; k = 1 r ( P k ( X ) + &omega; ) 1 r ) - - - ( 9 ) With - ( &Pi; k = 1 r P k ( X ) 1 r ) - - - ( 10 )
3) with the product of two functions, namely N (X) and iteration optimization is carried out to M (X):
A. to N (X)=| σ (X)-σ (X *) | λbe optimized, by a nonnegative function | σ (X)-σ (X *) | the optimization of root realize;
B. there is σ (X) > σ (X in imagination *), then | σ (X)-σ (X *) |=σ (X)-σ (X *), and all verify with the more new data of this imagination to interative computation each time.If this is envisioned for negative, i.e. σ (X)≤σ (X *), then the step that burrows stops, because found an X *, reach the object optimizing computing;
4) right be optimized, by P k(X) output is optimized to realize:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
5) right be optimized, by function P k(X) and the optimization of output valve realizes:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
B. according to Cauchy-Schwarz inequality, right being optimized, is namely to d ijand-d (X) ij(X) optimization;
C. use double optimization method to d ij(X) being optimized, is namely right be optimized, described double optimization method is exactly the point with some distribution disorders of conic fitting;
D. according to Holder inequality pair optimization, be namely to the optimization of formula (1) based on the quadratic function of X;
E. according to the p-d of Holder inequality ij(X) namely optimization be to the optimization of formula (1) based on the linear function of X.
Certainly as unknown node in described step 4, receive the position coordinates that other node sends over, the computational process utilizing centroid algorithm to obtain self coordinate is:
Suppose that 3 anchor node coordinates are respectively (x 1, y 1, z 1), (x 2, y 2, z 2), (x 3, y 3, z 3), unknown node (x j, y j, z j) be respectively d to the Euclidean distance of three anchor nodes 1, d 2, d 3, then unknown node coordinate is:
x j = x 1 d 1 + d 2 + x 2 d 2 + d 3 + x 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
y j = y 1 d 1 + d 2 + y 2 d 2 + d 3 + y 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
z j = z 1 d 1 + d 2 + z 2 d 2 + d 3 + z 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3 .
For verifying validity of the present invention, Matlab7.8.0 (R2009a) (64) are adopted to realize emulation testing experiment to the present invention's (being called for short TMDS method) and MDS algorithm.Tunneling method can be translated as the method for burrowing.TMDS method carries out performance evaluation from node communication radius, number of network node, anchor node ratio tripartite in the face of TMDS algorithm.Experiment simulation environment is as described below: the square geometrical model adopting 10m*10m*10m, carries out the layout of node location, as shown in Figure 1 in this model space.It is as follows that common simulated environment is set: during same interative computation rule, node communication radius is identical; Repeated optimization algorithm iteration number of times is iterative_time=60 time, and interative computation error threshold is absolute_error_value=0.0001; Node locating error threshold wucha_p=0.05m, and definition is as unknown node position error error≤wucha_p, this location node is as the criterion true location node.
Table 1, table 2 represent that MDS algorithm and TMDS method are run 10 times continuously under identical simulated environment respectively, the result data of unknown node average localization error, accurately location node number, node accurately location rate and program runtime.Identical simulated environment arranges as follows: anchor node number M=8, is distributed in 8 vertex positions of square model respectively; All nodes have same communication radius R=8.
Table 1 MDS algorithm
Table 2 TMDS method
Can draw from the data of table 1, table 2, from the accuracy of algorithm location, TMDS algorithm 10 continuous operations, have the accurate location that can realize all unknown node for 9 times, and accurate location rate is 1; For once node accurately locates number is 49, and accurate location rate is 0.98, is namely the accurate location that TMDS algorithm can realize node substantially.Compare MDS algorithm, 10 continuous operations have the accurate location realizing 50 nodes for 4 times, and accurately location rate is lower wherein 2 minor nodes, is respectively: 0.08 and 0.1, are namely the accurate location not realizing node for this twice.From the running time of algorithm, generally speaking TMDS algorithm and MDS algorithm can complete algorithm computing within a short period of time.The MDS algorithm time is more stable, substantially between 13s ~ 14s, completes algorithm computing, and TMDS algorithm is because will carry out the interative computation of repeated optimization, so the time is slightly long; Again because 50 distributions of unknown node in the model space have randomness, choosing of repeated optimization algorithm iteration computing first local minimum has randomness, searching global optimum needs the number of times of interative computation different, so the positioning time completing whole node can be variant.In sum, the local minimum problem applying to Tunneling Method solve repeated optimization algorithm achieves good effect on wireless sensor node location.
Figure 2 shows that the impact of node communication radius on TMDS algorithm performance, now simulated environment is as follows: unknown node number N=50, is randomly distributed in the square model space of 10m*10m*10m; Anchor node number M=8, is distributed in 8 vertex positions of square model respectively; Analyzing communication node radius is carried out on the impact of algorithm performance by concept transfer communication radius size.From Fig. 2 (a), curve can draw, along with the increase of node communication radius, unknown node accurately locates number to be increased gradually, and the accurate localization ratio of node increases gradually.Wherein when communication radius R is increased to 8m, the number of accurate location node reaches 50, and continues to increase node communication radius, and unknown node accurately location rate remains 1 always.From Fig. 2 (b), curve can draw, along with the increase of node communication radius, the mean error of accurate location node location reduces gradually.Wherein when communication radius R is increased to from 8m from 4m, mean error downward trend is very fast; Continue to increase communication radius R, in 8m to the 12m stage, error change tends towards stability.When communication radius is less, network-in-dialing degree is low, can with the unknown node decreased number of node communication, during TMDS test, the node communication radius less (during for 8m) needed can reach higher node accurately location rate and lower node locating error, along with the increase of node communication radius, locating effect is stablized.
When Figure 3 shows that node communication radius is R=8, network node is on the impact of TMDS algorithm performance.According to the analysis to Fig. 2, when the communication radius R of node is 8m, be easier to the impact of other factors on algorithm performance of analysis node, so when analyzing anchor node ratio and affecting algorithm performance, arranging common simulated environment is: anchor node number M=8, is distributed in 8 vertex positions of square model respectively; Node has same communication radius, is R=8m; Change anchor node ratio by the number changing unknown node, analyze network node to the impact of algorithm performance.Curve from Fig. 3 (a) and Fig. 3 (b) can draw, along with number of network node increases to 78 from 38, namely unknown node number is 30 increase to 70, and the accurate location rate of unknown node is 1 always.When number of network node be 83 be namely unknown node number is 75, accurate location rate starts to decline.Namely in the environment that TMDS algorithm is less at anchor node number, number of network node is more, unknown node accurately location rate can continue to remain 1, demonstrate TMDS algorithm to have and accurately can locate unknown node in the few environment of anchor node number, and locating effect is stablized.
Figure 4 shows that the impact of anchor node ratio on TMDS algorithm performance, now simulated environment is as follows: unknown node number N=100, is randomly distributed in the model space; Anchor node wherein 8 are distributed in 8 vertex positions of square model respectively, and all the other anchor nodes are randomly distributed in the model space; All nodes have same communication radius, are R=8; By changing the quantity of anchor node, analyze anchor node ratio to the impact of algorithm performance.Can draw from the curve Fig. 4 (a), along with the increase of anchor node ratio, unknown node accurately locates quantity to be increased.When wherein anchor node ratio is 0.1, it is 40 that unknown node accurately locates number, anchor node ratio is that accurately to locate number be 100 to 0.15 unknown node when increasing to 0.5 always, and when illustrating that anchor node ratio is more than or equal to 0.15, TMDS algorithm accurately can be located all unknown node.Can draw from the curve Fig. 4 (b), along with the increase of anchor node ratio, unknown node position error reduces gradually, and wherein anchor node ratio was 0.1 to 0.16 stage, and unknown node average localization error declines rapidly.Increased to for 0.5 stage in anchor node ratio 0.16, average localization error has comparatively minor swing, but all in the accurate position error threshold range of unknown node, can realize the accurate location of node, and the accurate locating effect of unknown node is stablized.
The advantage of TMDS method:
(1) TMDS method is a kind of wireless sensor network distribution node location algorithm based on anchor node multidimensional scaling technology, this location algorithm is the absolute fix utilizing anchor node position and internodal Euclidean distance information directly to realize unknown node, do not need Coordinate Conversion and network integration computing, avoid the error accumulation of this process;
(2) core of TMDS method is a kind of repeated optimization method based on anchor node newly, the method derives on the basis of STRESS algorithm, and utilize the method (Tunneling Method) that burrows to solve repeated optimization method local minimum problem, improve the accuracy of optimum results;
(3) TMDS method is a kind of innovatory algorithm based on MDS, utilization be internodal otherness, result of calculation is stablized, and node locating effect also has higher stability.
Anchor node calibration MDS technology is utilized directly to obtain the absolute coordinate of unknown node, thus do not need complicated Local coordinate system to merge and relative coordinate to the conversion of absolute coordinate, take into account local minimum problem in MDS optimization simultaneously, while can degree of precision being reached, also there is higher stability.The method of burrowing in the method is deterministic type Global Optimization Method, global minimum can be searched out in minimization problem search procedure, jump out local minizing point, obtain the minimum point that a functional value is less, repeat this process and try to achieve globally optimal solution, thus improve the convergence rate of method, enhancing the ability of its global optimizing, in 3-D wireless sensor network node location, providing a kind of brand-new method and thinking for solving repeated optimization algorithm.Experimental result shows repeated optimization algorithm to be applied in 3-D wireless sensor network node location algorithm in conjunction with global optimization theory, improve the number that unknown node is accurately located, reduce unknown node position error, and ensure that node is randomly dispersed in the stability of the accurate locating effect of environment interior joint of 3-D wireless sensor network.
Specific embodiment described herein is only to the explanation for example of the present invention's spirit.Those skilled in the art can make various amendment or supplement or adopt similar mode to substitute to described specific embodiment, but can't depart from spirit of the present invention or surmount the scope that appended claims defines.

Claims (4)

1., based on the wireless sensor network tri-dimensional node positioning method of Tunneling method, it is characterized in that:
Comprise the following steps:
Step one: wireless sensor network initialization, for each node, obtain the distance comprised between its single-hop neighbor node, and judge which node be unknown node which be anchor node, obtain anchor node coordinates matrix C, when there is unknown node and anchor node number is more than or equal to 3, perform step 2; If there is no unknown node, algorithm stops; If there is unknown node but anchor node number is less than 3 time suspend computing, recover to perform step 2 until meet after anchor node number is more than or equal to 3;
Step 2: the absolute coordinate matrix calculating single-hop neighbor node:
ε=ε max,Z=X 0
for(i=1:i max)
{ execution algorithm TMDSTunneling method obtains unknown node coordinates matrix X iz=X i;
Reduce the value of wucha_p;
}
Execution algorithm TMDSTunneling method, obtains unknown node coordinates matrix X j;
Step 3: calculate at X jtarget function σ (the X at place j), then judge whether inequality is below set up,
|σ(X j)-σ(X)|<wucha_p
If set up, send to corresponding neighbor node calculating the coordinate figure obtained, no
Then directly abandon coordinate figure, wherein wucha_p is the error threshold preset;
Step 4: if self be unknown node and receive other node calculate coordinate figure out, so utilize centroid algorithm to obtain the coordinate of self, thus become an anchor node, then the coordinate figure of self is sent to all single-hop neighbor nodes;
Step 5: repeat step one to step 4, until all nodes are all anchor node, complete location.
2. the wireless sensor network tri-dimensional node positioning method based on Tunneling method according to claim 1, it is characterized in that: in described step one, the initialized concrete steps of radio sensing network are: first anchor node is to its each neighbor node broadcast own location information, and utilize classical tolerance MDS general principle to adopt the mode of Matrix Solving to solve to obtain anchor node coordinates matrix, classical tolerance MDS general principle is as described below:
Use matrix X n × 3to represent in 3 dimension spaces the coordinate of n point, to any two points l, h, for the Euclidean distance between them square, available following formula represents:
d lh 2 ( X ) = d lh 2 = &Sigma; a = 1 3 ( x la - x ha ) 2 = &Sigma; a = 1 3 ( x la 2 + x ha 2 - 2 x la x ha ) - - - ( 1 )
To the point of 3 in three dimensions, corresponding matrix X = x 11 x 12 x 13 x 21 x 22 x 23 x 31 x 32 x 33 , Use D 2(X) matrix of square distance is represented, then D 2(X) can be expressed as:
D 2 ( X ) = 0 d 12 2 d 13 2 d 21 2 0 d 23 2 d 31 2 d 32 2 0 = &Sigma; a = 1 3 x 1 a 2 x 1 a 2 x 1 a 2 x 2 a 2 x 2 a 2 x 2 a 2 x 3 a 2 x 3 a 2 x 3 a 2 + &Sigma; a = 1 3 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 x 1 a 2 x 2 a 2 x 3 a 2 - 2 &Sigma; a = 1 3 x 1 a x 1 a x 1 a x 2 a x 1 a x 3 a x 2 a x 1 a x 2 a x 2 a x 2 a x 3 a x 3 a x 1 a x 3 a x 2 a x 3 a x 3 a = &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 1 1 1 &Sigma; a = 1 3 x 1 a 2 &Sigma; a = 1 3 x 2 a 2 &Sigma; a = 1 3 x 3 a 2 - 2 &Sigma; a = 1 3 X a X a T = Ce T + e C T - 2 &Sigma; a = 1 3 X a X a T - - - ( 2 )
Wherein X abe a row of matrix X, to be element be C column vector, vectorial e to be element be all 1 column matrix.
3. the wireless sensor network tri-dimensional node positioning method based on Tunneling method according to claim 2, is characterized in that: in described step 2, the Tunneling method concrete steps of execution algorithm TMDS are: the repeated optimization computational process utilizing Tunneling Method to be improved is:
Tunneling Method is used to target function σ (X), the function τ (X) that burrows of the MDS optimized algorithm based on Tunneling Method algorithm is defined as follows:
τ(X)=σ(X)-σ(X *) (3)
Wherein X *for the local minizing point of σ (X),
In formula (3), τ (X) can do following distortion and obtain τ 1(X)
τ(X)=|σ(X)-σ(X *)|
τ(X)=|σ(X)-σ(X *)|/P(X)
Wherein P ( X ) = | | D ( X * ) - D ( X ) | | w 2 = &Sigma; i < j &omega; ij ( d ij ( X * ) - d ij ( X ) ) 2 ,
τ(X)=|σ(X)-σ(X *)| λ/P(X)
Wherein λ (the 0< λ <1) intensity parameters that is the function that burrows,
τ(X)=|σ(X)-σ(X *)| λ(1+1/P(X))
τ(X)=|σ(X)-σ(X *)| λ(1+ω/P(X))
Wherein ω (ω >1) Width Function that is the function that burrows,
&tau; 1 ( X ) = | &sigma; ( X ) - &sigma; ( X * ) | &lambda; &Pi; k = 1 r ( 1 + &omega; / P k ( X ) ) 1 / r - - - ( 4 )
Wherein r is r alternative X,
Above-mentioned τ 1(X) all conditions that function needs possess that burrows is met as follows:
A. τ 1(X) do not change the zero point of being multiplied by after the X of a circulation, the function that burrows only also with τ 1(X) identical;
B. by regulating the intensity parameters λ of limit can change the impact of function pole value on the function that burrows that burrow, due to level off to 1, to τ 1(X) the configuration quantity that minimizes reduces gradually, can also avoid leveling off to horizontal line 0;
C. by selecting different limit width parameter ω, limit can be regulated to affect the size of its territory, and burrow function τ 1(X) two ratios based on X function can be seen as, such τ 1(X) minimize optimization problem and can regard a batch ticket problem as, for ease of mark, supposes P (X) >0, by τ 1(X) be labeled as
&tau; 1 ( X ) = M ( X ) P ( X ) - - - ( 5 )
Wherein M (X)=N (X) (ω+P (X)), such τ 1(X) can pass through N (X) (ω+P (X))/P (X) and N (X)=| σ (X)-σ (X *) | λobtain a limit determined, suppose to find a Y, following formula is set up
&tau; 1 ( X ) = M ( X ) P ( X ) &le; M ( Y ) P ( Y ) = &tau; 1 ( Y ) - - - ( 6 )
P (X) is multiplied by both sides, uses P (X) >0, then can obtain
M ( X ) - M ( Y ) P ( Y ) P ( X ) &le; 0 - - - ( 7 )
Or F (q, X)=M (X)-qP (X)≤0 (8)
Like this, as long as an X can be found to make F (q, X) <0, then τ 1(X) < τ 1(Y) just set up, therefore, using iteration optimization algorithms to F (q, X), is namely realize τ 1(X) minimize optimization;
have and τ 1(X) identical zero point and stationary point, but more easily construct its Optimization Framework, so right enforcement minimizes interative computation, and for each Optimization Steps and majorized function, only provide the function about X and step, calculation step is as follows:
1) as formula (5), (6), (7), (8), the mode of batch ticket is used to obtain F (q, X);
2) optimize F (q, X), be namely
M ( X ) = N ( X ) ( &Pi; k = 1 r ( P k ( X ) + &omega; ) 1 r ) - - - ( 9 )
With - ( &Pi; k = 1 r P k ( X ) 1 r ) - - - ( 10 )
3) with the product of two functions, namely N (X) and iteration optimization is carried out to M (X):
A. to N (X)=| σ (X)-σ (X *) | λbe optimized, by a nonnegative function | σ (X)-σ (X *) | the optimization of root realize;
B. there is σ (X) > σ (X in imagination *), then | σ (X)-σ (X *) |=σ (X)-σ (X *), and all verify with the more new data of this imagination to interative computation each time.If this is envisioned for negative, i.e. σ (X)≤σ (X *), then the step that burrows stops, because found an X *, reach the object optimizing computing;
4) right be optimized, by P k(X) output is optimized to realize:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
5) right be optimized, by function P k(X) and the optimization of output valve realizes:
A. according to formula (1), (2), (3), (4), d is used ij(X k) replace δ ij, be namely to P k(X) be optimized;
B. according to Cauchy-Schwarz inequality, right being optimized, is namely to d ijand-d (X) ij(X) optimization;
C. use double optimization method to d ij(X) being optimized, is namely to d ij 2(X) be optimized, described double optimization method is exactly the point with some distribution disorders of conic fitting;
D. according to Holder inequality to d ij 2(X) namely optimization be to the optimization of formula (1) based on the quadratic function of X;
E. according to the p-d of Holder inequality ij(X) namely optimization be to the optimization of formula (1) based on the linear function of X.
4. the wireless sensor network tri-dimensional node positioning method based on Tunneling method according to claim 3, it is characterized in that: certainly as unknown node in described step 4, receive the position coordinates that other node sends over, the computational process utilizing centroid algorithm to obtain self coordinate is:
Suppose that 3 anchor node coordinates are respectively (x 1, y 1, z 1), (x 2, y 2, z 2), (x 3, y 3, z 3), unknown node (x j, y j, z j) be respectively d to the Euclidean distance of three anchor nodes 1, d 2, d 3, then unknown node coordinate is:
x j = x 1 d 1 + d 2 + x 2 d 2 + d 3 + x 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
y j = y 1 d 1 + d 2 + y 2 d 2 + d 3 + y 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3
z j = z 1 d 1 + d 2 + z 2 d 2 + d 3 + z 3 d 1 + d 3 1 d 1 + d 2 + 1 d 2 + d 3 + 1 d 1 + d 3 .
CN201410613884.8A 2014-11-04 2014-11-04 Wireless sensor network tri-dimensional node positioning method based on Tunneling method Active CN104363654B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410613884.8A CN104363654B (en) 2014-11-04 2014-11-04 Wireless sensor network tri-dimensional node positioning method based on Tunneling method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410613884.8A CN104363654B (en) 2014-11-04 2014-11-04 Wireless sensor network tri-dimensional node positioning method based on Tunneling method

Publications (2)

Publication Number Publication Date
CN104363654A true CN104363654A (en) 2015-02-18
CN104363654B CN104363654B (en) 2018-09-11

Family

ID=52530862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410613884.8A Active CN104363654B (en) 2014-11-04 2014-11-04 Wireless sensor network tri-dimensional node positioning method based on Tunneling method

Country Status (1)

Country Link
CN (1) CN104363654B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778227A (en) * 2015-03-27 2015-07-15 浙江慧谷信息技术有限公司 Vision analysis method for set relation in picture
CN104902565A (en) * 2015-06-04 2015-09-09 杭州电子科技大学 Distributed wireless sensor network three-dimensional multi-dimensional scaling (MDS) location method
CN105307264A (en) * 2015-07-27 2016-02-03 河南科技大学 Mobile node positioning method for wireless sensor network
CN106102162A (en) * 2016-06-03 2016-11-09 南京邮电大学 A kind of iterative estimate method for wireless sensor network three-dimensional localization
CN106131960A (en) * 2016-08-26 2016-11-16 武汉科技大学 Mobile node of wireless sensor network location algorithm based on multidimentional system
CN106604218A (en) * 2015-10-20 2017-04-26 北斗导航位置服务(北京)有限公司 High-precision indoor positioning method based on error migration learning
CN108513254A (en) * 2018-02-12 2018-09-07 广州盛之焰信息科技有限公司 A kind of interior 3-D positioning method
CN109451426A (en) * 2018-12-07 2019-03-08 厦门大学 A method of based on positioning anchor point fast layout in UWB indoor locating system
CN109688561A (en) * 2018-12-28 2019-04-26 皖西学院 A kind of 3 D stereo fingerprint distribution indoor positioning method and structure

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005292A1 (en) * 2005-06-22 2007-01-04 Jin Holly H Scalable sensor localization for wireless sensor networks
CN101251592A (en) * 2008-03-31 2008-08-27 中国科学院计算技术研究所 Method for locating node of wireless sensor network
CN102053249A (en) * 2009-10-30 2011-05-11 吴立新 Underground space high-precision positioning method based on laser scanning and sequence encoded graphics

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005292A1 (en) * 2005-06-22 2007-01-04 Jin Holly H Scalable sensor localization for wireless sensor networks
CN101251592A (en) * 2008-03-31 2008-08-27 中国科学院计算技术研究所 Method for locating node of wireless sensor network
CN102053249A (en) * 2009-10-30 2011-05-11 吴立新 Underground space high-precision positioning method based on laser scanning and sequence encoded graphics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HU JUAN等: "An improved Node Localization Algorithm in Wireless Sensor Network", 《2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA)》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778227B (en) * 2015-03-27 2018-05-25 嘉兴慧康智能科技有限公司 Collect the visual analysis method of relation in a kind of figure
CN104778227A (en) * 2015-03-27 2015-07-15 浙江慧谷信息技术有限公司 Vision analysis method for set relation in picture
CN104902565A (en) * 2015-06-04 2015-09-09 杭州电子科技大学 Distributed wireless sensor network three-dimensional multi-dimensional scaling (MDS) location method
CN105307264A (en) * 2015-07-27 2016-02-03 河南科技大学 Mobile node positioning method for wireless sensor network
CN106604218B (en) * 2015-10-20 2019-10-11 北斗导航位置服务(北京)有限公司 A kind of high-precision indoor orientation method based on error transfer learning
CN106604218A (en) * 2015-10-20 2017-04-26 北斗导航位置服务(北京)有限公司 High-precision indoor positioning method based on error migration learning
CN106102162A (en) * 2016-06-03 2016-11-09 南京邮电大学 A kind of iterative estimate method for wireless sensor network three-dimensional localization
CN106102162B (en) * 2016-06-03 2019-06-25 南京邮电大学 A kind of iterative estimate method for wireless sensor network three-dimensional localization
CN106131960A (en) * 2016-08-26 2016-11-16 武汉科技大学 Mobile node of wireless sensor network location algorithm based on multidimentional system
CN106131960B (en) * 2016-08-26 2019-10-25 武汉科技大学 Mobile node of wireless sensor network location algorithm based on multidimentional system
CN108513254A (en) * 2018-02-12 2018-09-07 广州盛之焰信息科技有限公司 A kind of interior 3-D positioning method
CN109451426A (en) * 2018-12-07 2019-03-08 厦门大学 A method of based on positioning anchor point fast layout in UWB indoor locating system
CN109688561A (en) * 2018-12-28 2019-04-26 皖西学院 A kind of 3 D stereo fingerprint distribution indoor positioning method and structure
CN109688561B (en) * 2018-12-28 2020-07-24 皖西学院 Indoor positioning method and structure for three-dimensional fingerprint distribution

Also Published As

Publication number Publication date
CN104363654B (en) 2018-09-11

Similar Documents

Publication Publication Date Title
CN104363654A (en) Wireless sensor network three-dimensional node positioning method based on tunneling method
CN108802674B (en) Joint search method and device for direct positioning
CN108650706B (en) Sensor node positioning method based on second-order Taylor approximation
Esrafilian et al. Three-dimensional-map-based trajectory design in UAV-aided wireless localization systems
CN103648164B (en) A kind of based on the difference time of advent and the wireless-sensor network distribution type localization method of Gossip algorithm
Yan et al. An improved multihop-based localization algorithm for wireless sensor network using learning approach
CN103744428A (en) Unmanned surface vehicle path planning method based on neighborhood intelligent water drop algorithm
CN103558602B (en) A kind of simulated annealing localization method for many bases sonar configuration mode
CN102890703A (en) Network heterogeneous multidimensional scaling (HMDS) method
CN104038901A (en) Indoor positioning method for reducing fingerprint data acquisition workload
CN104902565A (en) Distributed wireless sensor network three-dimensional multi-dimensional scaling (MDS) location method
CN103415072A (en) Positioning method based on distance estimation in wireless sensor network
CN109547929B (en) Distributed sensor node positioning method based on conjugate gradient method
CN104977562A (en) Fully distributed wireless sensor network robustness multi-sound-source positioning method
Stojkoska A taxonomy of localization techniques based on multidimensional scaling
Aloor et al. Distributed wireless sensor network localization using stochastic proximity embedding
CN108957395A (en) The mobile target 3-D positioning method of noise immunity in a kind of tunnel
Zhao et al. Research on Node localization Algorithm in WSN Based on TDOA
CN110057361B (en) Shortest path planning method based on GPS
Ameer et al. Underwater localization using stochastic proximity embedding and multi-dimensional scaling
Wei et al. BBIL: A bounding-based iterative method for IoT to localize things
CN112437397B (en) Distributed sensor node positioning method based on alternative correction Newton method
CN115397012A (en) Realization method of UWB positioning tracking system based on TWR-TDOA estimation and MPGA layout optimization
Zhang et al. Vision-based localization in multi-agent networks with communication constraints
Pei et al. Geolocation of a known-altitude moving source using TDOA and FDOA in the presence of altitude error

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191231

Address after: 314416 No.318, Nanjie Road, Yuanhua Town, Haining City, Jiaxing City, Zhejiang Province

Patentee after: Haining Yuanhua Town Industrial Investment Co., Ltd

Address before: 321004 No. 688 Yingbin Road, Zhejiang, Jinhua

Patentee before: Zhejiang Normal University