Skip to main content

Performance Evaluating Method Based on Real GPS Data to Transfer Algorithm

  • Conference paper
Advances in Computer Science, Environment, Ecoinformatics, and Education (CSEE 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 216))

  • 715 Accesses

Abstract

To performance evaluating problem of transfer algorithms in opportunistic networks, real GPS data is used as experimental dataset in this paper. The performance of a fault-tolerant transfer algorithm based on principal component analysis is evaluated. According to the characteristic of algorithm, different ratio of lost data (10%, 20%, 30% and 40%) is tested in the experiments. Experimental results show that received track curve recovered by the algorithm is continuous and there is not gap, which can reflect the basic original information. Based on the experimental results, it is proved that the algorithm has good fault-tolerant performance and practicability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Trans. on Information Theory 46(2), 388–404 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  2. Widmer, J., Boudec, J.L.: Network coding for efficient communication in extreme networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 284–291. ACM, Philadelphia (2005)

    Chapter  Google Scholar 

  3. Wang, Y., Jain, S., Martonosi, M., Fall, K.: Erasure-Coding based routing for opportunistic networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 229–236. ACM, Philadelphia (2005)

    Chapter  Google Scholar 

  4. Chen, L., Yu, C., Sun, T., Chen, Y.C., Chu, H.H.: A hybrid routing approach for opportunistic networks. In: Proc. of the 2006 SIGCOMM Workshop on Challenged Networks, pp. 213–220. ACM, Pisa (2006)

    Chapter  Google Scholar 

  5. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int’l Conf. on Architectural Support for Programming Languages and Operating Systems, pp. 96–107. ACM, New York (2002)

    Google Scholar 

  6. Luo, T.Q., Zhang, J.: Fault-Tolerant Transfer Algorithm Based on Interweaved Coding in Opportunistic Networks. In: Proc. of International Conference on Mechanical Engineering Industry and Manufacturing Engineering, Beijing, July 23-24 (2011)

    Google Scholar 

  7. Cheng, F.H., Zhang, J.: Fault-Tolerant Transfer Algorithm Based on Principal Component Analysis in Opportunistic Networks. In: Proc. of International Conference on Teaching Materials, Education and Information Technology, Wuhan, August 21-23 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Luo, T., Zhang, J., Wang, Y. (2011). Performance Evaluating Method Based on Real GPS Data to Transfer Algorithm. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23345-6_95

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23345-6_95

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23344-9

  • Online ISBN: 978-3-642-23345-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics