Journal on Communications ›› 2013, Vol. 34 ›› Issue (10): 28-36.doi: 10.3969/j.issn.1000-436x.2013.10.004
• Academic paper • Previous Articles Next Articles
Ze ZHAO1,2,Peng-fei SHANG1,2,Hai-ming CHEN1,Qiang LIU1,Dong LI1,Zhao-liang ZHANG1,2,Li CUI1
Online:
2013-10-25
Published:
2017-08-10
Supported by:
Ze ZHAO,Peng-fei SHANG,Hai-ming CHEN,Qiang LIU,Dong LI,Zhao-liang ZHANG,Li CUI. Interference identification and classification mechanism for wireless sensor network[J]. Journal on Communications, 2013, 34(10): 28-36.
"
Length | TxPower | RSSI | LQI | CCAtimes | Throughput | PRR | |
Length | 1.000 | 0.000 | 0.006 | 0.021 | 0.025 | 0.802 | -0.267 |
TxPower | 0.000 | 1.000 | 0.937 | 0.775 | -0.017 | 0.409 | 0.784 |
RSSI | 0.006 | 0.937 | 1.000 | 0.833 | 0.003 | 0.427 | 0.814 |
LQI | 0.021 | 0.775 | 0.833 | 1.000 | 0.019 | 0.395 | 0.706 |
CCAtimes | 0.025 | -0.017 | 0.003 | 0.019 | 1.000 | -0.004 | 0.023 |
Throughput | 0.802 | 0.409 | 0.427 | 0.395 | -0.004 | 1.000 | 0.227 |
PRR | -0.267 | 0.784 | 0.814 | 0.706 | 0.023 | 0.227 | 1.000 |
"
Length | TxPower | RSSI | LQI | CCAtimes | Throughput | PRR | Int_Length | Int_Power | |
Length | 1.000 | 0.005 | -0.006 | 0.185 | 0.011 | 0.675 | -0.251 | -0.003 | 0.000 |
TxPower | 0.005 | 1.000 | 0.742 | 0.188 | -0.039 | 0.265 | 0.456 | -0.005 | -0.033 |
RSSI | -0.006 | 0.742 | 1.000 | 0.508 | 0.158 | 0.246 | 0.588 | 0.005 | 0.192 |
LQI | 0.185 | 0.188 | 0.508 | 1.000 | 0.198 | 0.234 | 0.290 | 0.095 | 0.162 |
CCAtimes | 0.011 | -0.039 | 0.158 | 0.198 | 1.000 | -0.385 | 0.032 | 0.536 | 0.539 |
Throughput | 0.675 | 0.265 | 0.246 | 0.234 | -0.385 | 1.000 | 0.199 | -0.305 | -0.216 |
PRR | -0.251 | 0.456 | 0.588 | 0.290 | 0.032 | 0.199 | 1.000 | -0.009 | -0.023 |
Int_Length | -0.003 | -0.005 | 0.005 | 0.095 | 0.536 | -0.305 | -0.009 | 1.000 | 0.004 |
Int_Power | 0.000 | -0.033 | 0.192 | 0.162 | 0.539 | -0.216 | -0.023 | 0.004 | 1.000 |
"
Length | TxPower | RSSI | LQI | CCAtimes | Throughput | PRR | Int_Length | Int_Power | |
Length | 1.000 | 0.074 | 0.012 | 0.165 | -0.286 | -0.237 | -0.626 | -0.097 | -0.080 |
TxPower | 0.074 | 1.000 | 0.652 | 0.451 | -0.043 | 0.179 | 0.133 | -0.086 | 0.093 |
RSSI | 0.012 | 0.652 | 1.000 | 0.749 | 0.188 | -0.136 | -0.048 | 0.410 | -0.198 |
LQI | 0.165 | 0.451 | 0.749 | 1.000 | 0.142 | -0.255 | -0.214 | 0.377 | -0.109 |
CCAtimes | -0.286 | -0.043 | 0.188 | 0.142 | 1.000 | -0.285 | -0.021 | 0.553 | 0.157 |
Throughput | -0.237 | 0.179 | -0.136 | -0.255 | -0.285 | 1.000 | 0.877 | -0.690 | -0.035 |
PRR | -0.626 | 0.133 | -0.048 | -0.214 | -0.021 | 0.877 | 1.000 | -0.410 | 0.055 |
Int_Length | -0.097 | -0.086 | 0.410 | 0.377 | 0.553 | -0.690 | -0.410 | 1.000 | 0.013 |
Int_Power | -0.080 | 0.093 | -0.198 | -0.109 | 0.157 | -0.035 | 0.055 | 0.013 | 1.000 |
[1] | 崔莉, 鞠海玲, 苗勇 ,等. 无线传感器网络研究进展[J]. 计算机研究与发展, 2005,42(1): 163-174. CUI L , JU H L , MIAO Y ,et al. Research overview of wireless sensor network[J]. Journal of Computer Research and Development, 2005,42(1): 163-174. |
[2] | CAMP J , KNIGHTLY E . Modulation rate adaptation in urban and vehicular environments:cross-layer implementation and experimental evaluation[J]. IEEE/ACM Transactions on Networking, 2010,18(6): 1949-1962 |
[3] | FONSECA R , GNAWALI O , JAMIESON K ,et al. Four-bit wireless link estimation[A]. Hot Topics in Networks (HotNets-VI)[C]. Atlanta,GA, 2007. |
[4] | SCHMIDL T M , COX D C . Robust frequency and timing synchronization for OFDM[J]. IEEE Transactions on Communications, 1997,45(12): 1613-1621. |
[5] | MASE K , OKADA H , NAKANO Y . RSSI-based cross layer link quality management for layer 3 wireless mesh networks[A]. 17th International Conference on Software,Telecommunications &Computer Networks[C]. 2009. |
[6] | WOO A , CULLER D . Evaluation of Efficient Link Reliability Estimators for Low-power Wireless Networks[R]. Berkeley:University of California. |
[7] | 张乐, 李栋, 崔莉 , EasiTOD:一种降低传感器网络时效障碍物干扰的检测调节机制[J]. 计算机研究与发展, 2009,(12): 2003-2013. ZHANG L , LI D , CUI L . EasiTOD:a detection and adjustment mechanism to reduce the interference of the timel iness obstacles in sensor networks[J]. Journal of Computer Research and Development, 2009,46(12): 2003-2013. |
[8] | REIS C , MAHAJAN R , RODRIG M ,et al. Measurement-based models of delivery and interference in static wireless networks[A]. Proceedings of the 2006 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications[C]. 2006. |
[9] | ZHANG J , TAN K , ZHAO J ,et al. A practical SNR-guided rate adaptation[A]. Proceedings of INFOCOM 2008[C]. 2008. |
[10] | VUTUKURU M , BALAKRISHNAN H , JAMIESON K . Cross-layer wireless bit rate adaptation[A]. Proceedings of SIGCOMM[C]. 2009. |
[11] | WU K , TAN H , NGAN H ,et al. Chip error pattern analysis in IEEE 802.15.4 mobile computing[J]. IEEE Transactions on Mobile Computing, 2012.11(4): 543-552. |
[12] | HAUKE J , TOMASZ K . Comparison of values of pearson's and spearman's correlation coefficients on the same sets of data[J]. Quaestiones Geographicae,Versita,Warsaw, 2011,30(2): 87-93 |
[13] | AMDT S , TUREVY C , ANDREASEN N C . Correlating and predicting psychiatric symptom ratings:spearmans rversus Kendalls tau correlation[J]. Psychiatric Research,Elsevier, 1999,33(2): 97-104. |
[14] | . |
[1] | Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA. Method based on contrastive incremental learning for fine-grained malicious traffic classification [J]. Journal on Communications, 2023, 44(3): 1-11. |
[2] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[3] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[4] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[5] | Hongping YAN, Qiang ZHOU, Shihao WANG, Wang YAO, Liukun HE, Liangmin WANG. Composite Tor traffic features extraction method of webpage in actual network flow based on SDN [J]. Journal on Communications, 2022, 43(3): 76-87. |
[6] | Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN. Method based on contrastive learning for fine-grained unknown malicious traffic classification [J]. Journal on Communications, 2022, 43(10): 12-25. |
[7] | Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN. Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics [J]. Journal on Communications, 2022, 43(10): 177-185. |
[8] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[9] | Zhiwang CHEN, Zhongxin ZHANG, Juan SONG, Haipeng LEI, Yong PENG. Tracking algorithm of Siamese network based on online target classification and adaptive template update [J]. Journal on Communications, 2021, 42(8): 151-163. |
[10] | Aijing SUN, Shichang LI, Yicai ZHANG. WSN clustering routing algorithm based on PSO optimized fuzzy C-means [J]. Journal on Communications, 2021, 42(3): 91-99. |
[11] | Hongmin GAO, Xueying CAO, Zhonghao CHEN, Zaijun HUA, Chenming LI, Yue CHEN. Hyperspectral image classification method based on multi-scale proximal feature concatenate network [J]. Journal on Communications, 2021, 42(2): 92-102. |
[12] | Liu LIU, Jianhua ZHANG, Yuanyuan FAN, Li YU, Jiachi ZHANG. Survey of application of machine learning in wireless channel modeling [J]. Journal on Communications, 2021, 42(2): 134-153. |
[13] | Chuanhong LIU, Caili GUO, Yang YANG, Chunyan FENG, Qizheng SUN, Jiujiu CHEN. Intelligent task-oriented semantic communication method in artificial intelligence of things [J]. Journal on Communications, 2021, 42(11): 97-108. |
[14] | Youhua FU, Dong CHEN. Channel estimation for hybrid intelligent reflecting surface structure assisted mmWave communications [J]. Journal on Communications, 2021, 42(10): 189-196. |
[15] | Yongjin HU,Yuanbo GUO,Jun MA,Han ZHANG,Xiuqing MAO. Method to generate cyber deception traffic based on adversarial sample [J]. Journal on Communications, 2020, 41(9): 59-70. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|