• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Duan Bin, Ke Xin, Huang Fuwei, Zhou Xinyun, Sun Limin. An Aggregate Contribution Based Delay-Time Allocation Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 34-40.
Citation: Duan Bin, Ke Xin, Huang Fuwei, Zhou Xinyun, Sun Limin. An Aggregate Contribution Based Delay-Time Allocation Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 34-40.

An Aggregate Contribution Based Delay-Time Allocation Algorithm for Wireless Sensor Networks

More Information
  • Published Date: January 14, 2008
  • A primary goal in the design of wireless sensor networks (WSNs) is lifetime maximization, constrained by the energy capacity of batteries. By introducing in-network processing technology, data aggregation has been recently proved to be an effective method to reduce the redundant energy consumption and prolong the network lifespan. Data aggregation can also improve the data accuracy and reliability. When applying specific aggregation schemes to reality, it is necessary to take into account the aggregation time factor, whose increase will improve the aggregation efficacy but deteriorate network transmission performance. And how to allocate the entire delay-time along each route to attain a balance between these two factors is significant. In this paper, a novel aggregate contribution based delay-time allocation algorithm (ACDA) is proposed, in which the impact on aggregation efficacy of different positions in the route tree is quantified first, then the aggregate contribution is gradually refined through an iterative update process, and finally the aggregation time of every node at sink is proportionally allocated. Since this scheme takes into full consideration of location discrepancy and interaction between nodes, The simulation results show that the ACDA achieves a better performance in both aggregation gain and transmission real-time property when compared with other present schemes, just shown in the simulation results.
  • Related Articles

    [1]Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia. Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338. DOI: 10.7544/issn1000-1239.2019.20190376
    [2]Yao Sheng, Xu Feng, Zhao Peng, Ji Xia. Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model[J]. Journal of Computer Research and Development, 2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    [3]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [4]Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi. Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728. DOI: 10.7544/issn1000-1239.2015.20130601
    [5]Zhang Fengbin and Wang Tianbo. Real Value Negative Selection Algorithm with the n-Dimensional Chaotic Map[J]. Journal of Computer Research and Development, 2013, 50(7): 1387-1398.
    [6]Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao. Multi-Label Feature Selection Algorithm Based on Information Entropy[J]. Journal of Computer Research and Development, 2013, 50(6): 1177-1184.
    [7]Zheng Liming, Zou Peng, Han Weihong, Li Aiping, Jia Yan. Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network[J]. Journal of Computer Research and Development, 2012, 49(9): 1972-1981.
    [8]Zhang Xiang, Deng Zhaohong, Wang Shitong, Choi Kupsze. Maximum Entropy Relief Feature Weighting[J]. Journal of Computer Research and Development, 2011, 48(6): 1038-1048.
    [9]Chen Shitao, Chen Guolong, Guo Wenzhong, and Liu Yanhua. Feature Selection of the Intrusion Detection Data Based on Particle Swarm Optimization and Neighborhood Reduction[J]. Journal of Computer Research and Development, 2010, 47(7): 1261-1267.
    [10]Hou Jian, Peng Jiayin, Zhang Yuzhuo, Zhang Chengyi. A Reverse Triple I Algorithm for Fuzzy Reasoning Based on Maximum Fuzzy Entropy Principle[J]. Journal of Computer Research and Development, 2006, 43(7): 1180-1185.

Catalog

    Article views (553) PDF downloads (555) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return