• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Linfeng, Liu Ye. A Heuristic Cluster Control Algorithm of Wireless Sensor Networks Topology[J]. Journal of Computer Research and Development, 2008, 45(7): 1099-1105.
Citation: Liu Linfeng, Liu Ye. A Heuristic Cluster Control Algorithm of Wireless Sensor Networks Topology[J]. Journal of Computer Research and Development, 2008, 45(7): 1099-1105.

A Heuristic Cluster Control Algorithm of Wireless Sensor Networks Topology

More Information
  • Published Date: July 14, 2008
  • The main objective of wireless sensor network design is to fulfill the task of prolonging network lifetime. The network topology, which is the important foundation of upper layer protocols, serves as the supportive groundwork for achieving this goal. In order to design a topology control algorithm that conforms to the lifetime requirement of wireless sensor networks, the defects of previous algorithms are firstly explored. There are some defects such as deployment restriction, low reliability or poor rationality found in these algorithms. Then a WSN cluster model is constructed and analyzed theoretically according to the requirement of clustering, which ultimately turns to a clustering and cluster-head electing problem with approximate optimizing objectives. A heuristic topology control algorithm of cluster (HTCC) is proposed as a solution to the above problem. HTCC is composed of two methods: cluster constructing (CC) method and cluster-head electing (CHE) method. The clusters can be partitioned by the CC method, and the cluster-heads can be selected by the CHE method. The performance of the algorithm is analyzed and validated through experiments. The result indicates that the network topology of clusters with proper size has the characteristics of low energy consumption and high robustness, effectively prolonging the lifetime of the whole network.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (791) PDF downloads (495) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return