• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Ce, Zhang Xia, Li Ou, Wang Chong, Zhang Dalong. Data Gathering Using Dynamic Clustering Based on WSNs Compressive Sensing Algorithm[J]. Journal of Computer Research and Development, 2016, 53(9): 2000-2008. DOI: 10.7544/issn1000-1239.2016.20150459
Citation: Zhang Ce, Zhang Xia, Li Ou, Wang Chong, Zhang Dalong. Data Gathering Using Dynamic Clustering Based on WSNs Compressive Sensing Algorithm[J]. Journal of Computer Research and Development, 2016, 53(9): 2000-2008. DOI: 10.7544/issn1000-1239.2016.20150459

Data Gathering Using Dynamic Clustering Based on WSNs Compressive Sensing Algorithm

More Information
  • Published Date: August 31, 2016
  • One of the major challenges of designing wireless sensor networks data gathering algorithm is to reduce energy consumption, achieve better balanced consumption and prolong the lifetime of sensor network. For the current clustering algorithms of data gathering in wireless sensor networks neglecting the impact of event sources on data spatial correlation, a CS-based dynamic clustering algorithm centred on event source (CS-DCES) is proposed in this paper. Utilizing the model of Euclidean distance spatial correlation and joint sparsity model-1, the nodes that affected by the same event source are clustered together and reconstruct those nodes readings within cluster in order to increase the spatial correlation of data and reduce the number of each cluster measurement. The algorithm exploits the compressive data to calculate the location of event source and clusters dynamically. Moreover, according to simulation, we analyze the three factors that influence the algorithm performance, and they are attenuation coefficient of event sources, distance between event sources and the number of event sources, and finally the application condition of CS-DCES is given. The simulations show that CS-DCES outperforms the existing data gathering algorithms in decreasing communication cost, saving the network energy consumption and extending the network survival time under the same accuracy.
  • Related Articles

    [1]Zhang Xiaojian, Zhang Leilei, Zhang Zhizheng. Federated Learning Method Under User-Level Local Differential Privacy[J]. Journal of Computer Research and Development, 2025, 62(2): 472-487. DOI: 10.7544/issn1000-1239.202330167
    [2]Fu Nan, Ni Weiwei, Jiang Zepeng, Hou Lihe, Zhang Dongyue, Zhang Ruyu. Directed Graph Clustering Algorithm with Edge Local Differential Privacy[J]. Journal of Computer Research and Development, 2025, 62(1): 256-268. DOI: 10.7544/issn1000-1239.202330193
    [3]Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan. A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443. DOI: 10.7544/issn1000-1239.2021.20210589
    [4]Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian. Graph Degree Histogram Publication Method with Node-Differential Privacy[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520. DOI: 10.7544/issn1000-1239.2019.20170886
    [5]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [6]He Ming, Chang Mengmeng, Wu Xiaofei. A Collaborative Filtering Recommendation Method Based on Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(7): 1439-1451. DOI: 10.7544/issn1000-1239.2017.20160207
    [7]Zhang Xiaojian, Shao Chao, Meng Xiaofeng. Accurate Histogram Release under Differential Privacy[J]. Journal of Computer Research and Development, 2016, 53(5): 1106-1117. DOI: 10.7544/issn1000-1239.2016.20150304
    [8]Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin. Frequent Sequential Pattern Mining under Differential Privacy[J]. Journal of Computer Research and Development, 2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516
    [9]Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
    [10]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824

Catalog

    Article views (1274) PDF downloads (437) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return