• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Dayang, Liu Yanheng, Wang Aimin. An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment[J]. Journal of Computer Research and Development, 2008, 45(1): 104-109.
Citation: Sun Dayang, Liu Yanheng, Wang Aimin. An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment[J]. Journal of Computer Research and Development, 2008, 45(1): 104-109.

An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment

More Information
  • Published Date: January 14, 2008
  • This paper first gives an analysis of data aggregation and data compression based on energy consumption of sensor nodes, after which an approach is proposed to construct an aggregation tree in the case of non-perfect aggregation, since GIT considers only the case of perfect aggregation and it does not work well if the aggregation is non-perfect. An assessment scheme that can get the information of hops from the aggregation point to the sink and the hops from the aggregation point to the source node is used to construct such an aggregation tree. Moreover, the energy consumption of the aggregation is also considered. This scheme can be used when perfect aggregation cannot be performed. In this paper, an approach to reduce the cost of reinforcement is also proposed, in which the reinforcement work is done by the source nodes themselves, not by the sink node. Simulation result shows that this approach can save more energy than GIT when the aggregation ratio is small. This result also provides a theoretical limit of aggregation to tell when GIT will lose its superiority and thus gives a direction to choose among the aggregation algorithms. Another result shows that the further the sources are away from the sink, the less reinforcement messages are needed. Finally a guidance to tell when to use the ECA (energy consumption assessment) scheme is given.
  • Related Articles

    [1]Liu Zhibin, Zeng Xiaoqin, Liu Huiyi, Chu Rong. A Heuristic Two-layer Reinforcement Learning Algorithm Based on BP Neural Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 579-587. DOI: 10.7544/issn1000-1239.2015.20131270
    [2]Zhang Weiguo, Yin Xia, and Wu Jianping. A Computation Method of Path Diversity Based on AS Relationships[J]. Journal of Computer Research and Development, 2012, 49(1): 167-173.
    [3]Chen Ziyang and Zhou Junfeng. An Optimal Storage Strategy for Static Path Labeling Scheme[J]. Journal of Computer Research and Development, 2011, 48(6): 1101-1108.
    [4]Zhou Ling, Wang Jianxin. Path Nodes-Driven Least-Cost Shortest Path Tree Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 721-728.
    [5]Huang Jianbin, Sun Heli. Focused Web Entity Search Using the Linked-Path Prediction Model[J]. Journal of Computer Research and Development, 2010, 47(12).
    [6]Yang Guoqiang and Dou Wenhua. A Fast Algorithm for Inferring AS-Level Path of Internet Topology[J]. Journal of Computer Research and Development, 2009, 46(11): 1797-1802.
    [7]Shi Chuan, Shi Zhongzhi, Wang Maoguang. Online Hierarchical Reinforcement Learning Based on Path-matching[J]. Journal of Computer Research and Development, 2008, 45(9).
    [8]Yu Kun, Wu Guoxin, Xu Libo, Wu Peng. Optimal Path Based Geographic Routing in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(12): 2004-2011.
    [9]Zhang Zhirou, Luo Siwei, Chen Xin, Zhong Jingjing. Research on Mobile Agent Path Optimization Algorithm in Grid[J]. Journal of Computer Research and Development, 2006, 43(5): 791-796.
    [10]Jiang Aiquan, Wu Jiagao, and Ye Xiaoguo. Adaptive RSVP Path Fast Handoff Scheme in Wireless/Mobile Networks[J]. Journal of Computer Research and Development, 2005, 42(9): 1550-1557.

Catalog

    Article views (596) PDF downloads (491) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return