Application of Wireless Sensor Technology in the Training of Martial Arts and Specification Motion Detection

Article Preview

Abstract:

With the development of the computer wireless communication technology, wireless sensor detection is being widely applied to engineering practice. Combined with the advantages and disadvantages of the two algorithms LEACH and PEGASIS, this paper proposes a new algorithm BEAHR algorithm. At the same time, this paper establishes mathematical model algorithm of wireless network detection energy consumption for BEAHR algorithm. Finally, this paper calculates the numerical value of the three algorithms LEACH, PEGASIS and BEAHR by using the general numerical simulation software of MATLAB software. Through the numerical simulation experiments, it is found that with the increase of time, the average energy consumption of three algorithms will also be increased. Among them, the fastest increase of energy consumption is LEAC. However, the energy consumption of BEAHR algorithm is small. When the time is 1000 s, power consumption is 0.5 J, which verifies the validity and reliability of BEAHR algorithm and proves that BEAHR algorithm has the excellent performance to save energy and improve the network life cycle.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

926-930

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhou Qi. Development and application of the wireless sensor network in the field of industrial control [J]. The petrochemical industry automation, 2013 (1): 51-54.

Google Scholar

[2] Yu WenJun Ling Zhihao. Study on a kind of Internet of things and intelligent household system [J]. Automation instrument, 2011, 32 (8): 56-59.

Google Scholar

[3] Wan Yadong, Wang Qin, Zhang Xiaotong. Analysis on clusters and tree shape's wireless sensor network system level design [J]. Computer science, 2010, 37 (8): 99-103.

Google Scholar

[4] Bai Ronggang, Zhao Baohua, Qu Yugui. A kind of energy saving wireless sensor network cross-layer structure [J]. Journal of China university of science and technology, 2011, 39 (8): 809-817.

Google Scholar

[5] Wang Huaqun, Zhang Lijun, Zhao Junxi. Secret key management based on ring Zn and RSA in the Adhoc network [J]. Journal of communication, 2010, 27(3): 13-16.

Google Scholar

[6] Liu Chun, Liu Jianwei, Zhang Qishan; Li Hui. A kind of secret key management and authentication model without certificate [J]. Journal of xi 'an university of electronic science and technology, 2011(6): 974-979.

Google Scholar

[7] Ren Yongjun, Wang Jiandong, Zhuang Yi. Management scheme of dynamic adhoc network key [J]. Journal of nanjing university of aeronautics and astronautics, 2010(12): 810-813.

Google Scholar

[8] Ge Meng, Zhao Xibin, Lin Guoen. Robust key management suitable for mobile self-organized network [J]. Journal of tsinghua university (natural science edition), 2010(7): 1194-1197.

Google Scholar

[9] Zhou Yinan, Zhou Yunsen. Application of the WSN in real-time monitoring of industrial production. [J]. Industrial control computer, 2011, 21 (8) : 24-25.

Google Scholar

[10] Du Xiaoming, Chen Yan. Application of wireless sensor networks in monitoring greenhouse agriculture [J]. Journal of agricultural mechanization research, 2011, 31 (6): 141-144.

Google Scholar

[11] Ma Huadong, Tao Dan. Multimedia sensor network and its research progress. Journal of software, 2010, 17 (9): 2013-(2028).

Google Scholar

[12] I. Akyildiz, et aL A Survey on Wireless Multimedia Sensor Networks. Computer Networks, 2012, 51(9): 921-960.

DOI: 10.1016/j.comnet.2006.10.002

Google Scholar