• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Jie and Han Zhijie. An Unequal Clustering Algorithm in Wireless Sensor Networks Based on Traffic Prediction[J]. Journal of Computer Research and Development, 2010, 47(8): 1459-1465.
Citation: Li Jie and Han Zhijie. An Unequal Clustering Algorithm in Wireless Sensor Networks Based on Traffic Prediction[J]. Journal of Computer Research and Development, 2010, 47(8): 1459-1465.

An Unequal Clustering Algorithm in Wireless Sensor Networks Based on Traffic Prediction

More Information
  • Published Date: August 14, 2010
  • Wireless sensor networks are composed of a large number of sensor nodes that are densely deployed inside the phenomenon. An unequal cluster of routing algorithm is proposed based on divided virtual region for “hot spot” in clustering routing protocol with many jumps in the wireless sensor network. The routing algorithm gives the task of dividing clusters to the sink node with non-limited energy, such that the scale of inside cluster layer near the sink node is smaller than that of outer layer cluster. To realize the distributed election work of cluster head and avoid energy consumption in each wheel, main and vice cluster head is taken into the structure of clusters. The Markov forecast model is used to the replacement process of main cluster head. Thus, both the death of main cluster head due to exhausting energy completely and the network division because of the death are avoided. The life of the network is also reduced. Using the NS2.26 platform to simulate the proposed algorithm, the result indicates that compared with the traditional routing algorithm, this routing algorithm can prolong the life of WSN and enlarge the survival node number of WSN.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wu Linyang, Luo Rong, Guo Xueting, Guo Qi. Partitioning Acceleration Between CPU and DRAM: A Case Study on Accelerating Hash Joins in the Big Data Era[J]. Journal of Computer Research and Development, 2018, 55(2): 289-304. DOI: 10.7544/issn1000-1239.2018.20170842
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [7]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [8]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [9]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [10]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

Catalog

    Article views (633) PDF downloads (399) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return