• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Xianghui, Zhang Guoyin, and Xie Xiaoqin. A Load Balance Clustering Algorithm for Multilevel Energy Heterogeneous Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(3): 392-399.
Citation: Wang Xianghui, Zhang Guoyin, and Xie Xiaoqin. A Load Balance Clustering Algorithm for Multilevel Energy Heterogeneous Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(3): 392-399.

A Load Balance Clustering Algorithm for Multilevel Energy Heterogeneous Wireless Sensor Networks

More Information
  • Published Date: March 14, 2008
  • In multilevel heterogeneous wireless sensor networks, the initial energy of nodes are random distributed in a certain range, load balancing and energy efficiency are the significant challenges of clustering algorithm for energy heterogeneous networks. Current distributed clustering algorithm is mainly designed for homogeneous or two-level heterogeneous networks, and it is hard to implement load balancing when the nodes energy represents multilevel heterogeneity. So a load balance clustering algorithm LBCA (load balance clustering algorithm) for multilevel energy heterogeneous sensor networks is proposed. The algorithm select cluster head nodes and implements load balance according to the condition of energy distributing, and could prolong the stability period. In the process of cluster head selecting, when the energy is balanced in local area, the nodes which have the lower average communication cost are prior to be the cluster-head nodes, and it is propitious to decrease the total energy cost of local area. When the energy is imbalanced in local area, the high residual energy nodes are prior to be the cluster-head nodes, and it is propitious to implement load balancing. LBCA is compared with primary distributed clustering approach. The simulation results show that in multilevel energy heterogeneous networks, LBCA could better implement load balance and prolong the stability period.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Ouyang Dantong, Gao Han, Xu Yini, Zhang Liming. Minimal Conflict Set Solving Method Combined with Fault Logic Relationship[J]. Journal of Computer Research and Development, 2020, 57(7): 1472-1480. DOI: 10.7544/issn1000-1239.2020.20190338
    [4]Xu Yini, Ouyang Dantong, Liu Meng, Zhang Liming, Zhang Yonggang. Algorithm of Computing Minimal Conflict Sets Based on the Structural Feature of Fault Output[J]. Journal of Computer Research and Development, 2018, 55(11): 2386-2394. DOI: 10.7544/issn1000-1239.2018.20170381
    [5]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [6]Song Yang, Wang Houfeng. Chinese Zero Anaphora Resolution with Markov Logic[J]. Journal of Computer Research and Development, 2015, 52(9): 2114-2122. DOI: 10.7544/issn1000-1239.2015.20140620
    [7]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [8]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [9]Zhang Xinliang and Shi Chunyi. A Description-Logic Based Agent Organization[J]. Journal of Computer Research and Development, 2005, 42(11): 1843-1848.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (671) PDF downloads (576) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return