2010 An Efficient Data Gathering Routing Protocol in Sensor Networks

合集下载

软件工程介绍--英文版

软件工程介绍--英文版

软件工程介绍--英文版Software Engineering IntroductionSoftware engineering is a discipline that focuses on the design, development, maintenance, and testing of software systems It plays a crucial role in today's digital age, where software is an integral part of almost every aspect of our lives, from communication and entertainment to business and healthcareThe importance of software engineering cannot be overstated In a world that increasingly relies on technology, software needs to be reliable, efficient, and userfriendly Poorly developed software can lead to significant problems, such as system crashes, security breaches, and user dissatisfaction This is where software engineers come in – they apply scientific and engineering principles to ensure that software meets the highest standards of qualityOne of the key aspects of software engineering is the software development life cycle (SDLC) This is a structured process that typically includes several phases, such as requirements gathering, design, implementation, testing, and maintenance During the requirements gathering phase, software engineers work closely with stakeholders to understand their needs and expectations for the software This involves identifying the functions the software should perform, the users it will serve, and any constraints or limitationsThe design phase is where the overall architecture and structure of the software are planned This includes decisions about the software'scomponents, interfaces, and data structures A welldesigned software systemis modular, scalable, and maintainable, making it easier to add new features and fix bugs in the futureImplementation is the actual coding of the software Software engineers use programming languages and tools to translate the design into working code They also need to follow best practices in coding, such as writing clear and understandable code, using proper naming conventions, and adding comments to explain the logicTesting is an essential part of the SDLC to ensure that the software functions correctly and meets the specified requirements Different types of tests are performed, including unit testing (testing individual components),integration testing (testing how components work together), and system testing (testing the entire software system) Bug fixes and optimizations are made based on the test resultsMaintenance is the ongoing process of supporting and improving the software after it has been deployed This may involve fixing bugs, addingnew features, adapting the software to changes in the environment or user needs, and ensuring its compatibility with new technologiesAnother important concept in software engineering is software design patterns These are reusable solutions to common software design problemsBy using design patterns, software engineers can improve the quality and efficiency of their code Some common design patterns include the singleton pattern, factory pattern, and observer patternAgile methodologies have also become popular in recent years in software engineering Unlike traditional waterfall models, which follow a sequential process, agile approaches emphasize flexibility and collaboration Teams work in short iterations, delivering working software frequently and responding quickly to changes in requirementsSoftware engineering also involves managing projects effectively This includes tasks such as scheduling, budgeting, resource allocation, and risk management Good project management skills are essential to ensure that software projects are completed on time and within budgetIn addition, software engineers need to be aware of ethical and legal considerations They must ensure that the software they develop respects privacy, security, and intellectual property rights They also have a responsibility to create software that is accessible to all users, regardless of their abilitiesFinally, the field of software engineering is constantly evolving New technologies, programming languages, and development paradigms emerge regularly Software engineers need to keep learning and staying updated to remain competent in their professionIn conclusion, software engineering is a complex and diverse field that requires a combination of technical skills, problemsolving abilities, and teamwork It is a discipline that has a significant impact on our modern society and will continue to play a crucial role in shaping the future of technology。

别人的论文(终稿)

别人的论文(终稿)

Civil Aviation University of China毕业设计(论文)专业:计算机科学与技术学号: 070341418学生姓名:鲁汉侬所属学院:计算机学院指导教师:张宇翔二〇一一年六月中国民航大学本科生毕业设计(论文)WSN中约束移动轨迹的数据汇聚路由协议设计与仿真Designing and Simulating of Efficient Data Gathering Routing Protocols with Constraint Path of WSN专业:计算机科学与技术学生姓名:鲁汉侬学号:070341418学院:计算机学院指导教师:张宇翔2011 年 6月创见性声明本人声明:所呈交的毕业论文是本人在指导教师的指导下进行的工作和取得的成果,论文中所引用的他人已经发表或撰写过的研究成果,均加以特别标注并在此表示致谢。

与我一同工作的同志对本论文所做的任何贡献也已在论文中作了明确的说明并表示谢意。

毕业论文作者签名:签字日期:年月日本科毕业设计(论文)版权使用授权书本毕业设计(论文)作者完全了解中国民航大学有关保留、使用毕业设计(论文)的规定。

特授权中国民航大学可以将毕业设计(论文)的全部或部分内容编入有关数据库进行检索,并采用影印、缩印或扫描等复制手段保存、汇编以供查阅和借阅。

同意学校向国家有关部门或机构送交毕业设计(论文)的复印件和磁盘。

(保密的毕业论文在解密后适用本授权说明)毕业论文作者签名:指导教师签名:签字日期:年月日签字日期:年月摘要无线传感器网络(wireless sensor networks,简称WSNs)是由能量及资源有限的大量节点构成具有数据采集、检测、控制的强有力的自组织网络形式,在有限的能量约束下,降低无线传感器能量消耗,提高数据采集效率是研究和应用无线传感器网络的热点。

在sink移动轨迹固定的传感器网络中,由于sink有限的通信时间和节点的随机分布,使得很难兼顾数据采集量的提高和整体能耗的降低。

选择性必修第三册 Unit 2 Out of this world

选择性必修第三册 Unit 2 Out of this world

1.astronaut n.宇航员,航天员2.gravity n.重力;严重性;严肃3.float v i.飘动,漂流;浮v t.使浮动,使漂流4.cupboard n.壁橱;橱柜,衣柜5.ceiling n.天花板;上限6.mission n.任务;使命,天职;军事行动;太空飞行任务carry out a mission执行任务7.creature n.动物,生物;人8.mosquito n.(pl.mosquitoes or mosquitos)蚊子9.microscope n.显微镜10.maintenance n.维护,保养;维持,保持11.radiation n.辐射,放射线12.luxury n.不常有的乐趣(或享受);奢侈品13.tube n.管,管子;软管14.furthermore ad v.此外,再者15.pill n.药丸,药片16.discipline v t.严格要求(自己);惩罚;训练n.训练,纪律;行为准则;自制力17.leisure n.闲暇,空闲leisure time业余时间at sb’s leisure在某人闲暇时18.crew n.全体工作人员;全体乘务人员,全体船员;专业团队19.altogether ad v.完全;总共;总之20.kit n.成套设备,成套工具;配套元件21.telescope n.望远镜22.crucial adj.至关重要的,关键性的23.orbit v t.& v i.围绕……运动;沿轨道运行n.(天体等运行的)轨道24.astronomer n.天文学家25.merely ad v.仅仅,只不过26.administration n.行政部门;管理,行政27.agency n.机构;代理处28.comprise v t.包括,包含;组成,构成be comprised of...由……组成29.scan v t.& v i.扫描;细看;浏览n.扫描检查;快速查阅30.foundation n.基础,根据;地基;创办;基金会31.purse n.资金,财源;钱包32.tale n.故事;讲述,叙述33.shuttle n.航天飞机;来往于两地之间的航班(或班车、火车) v i.频繁往来(于两地之间) 34.hydrogen n.氢,氢气35.rocket n.火箭;火箭武器36.motive n.原因,动机,目的a motive for...……的动机37.mechanic n.机械师,技工38.shelter n.居住,住处;庇护v t.保护,掩蔽v i.躲避39.constant adj.固定的,不变的;连续发生的,重复的40.nuclear adj.核能的,原子能的;核武器的41.evaluate v t.评估,估计,评价→evaluation n.评价;估价42.exposure n.面临,遭受;揭露;报道→expose v t.使暴露;使显露;揭发;使(胶卷)曝光43.visible adj.看得见的;明显的→invisible adj.看不见的→visibly ad v.易察觉地;明显地44.permanent adj.永久的,永恒的→permanence n.永久性,持久性;永久45.universe n.宇宙,天地万物→universal adj.普遍的;全体的;全世界的;共同的46.origin n.起源,起因;出身→original adj.起初的;原来的;首创的;独创的n.原著;原作→originally ad v.原来,起初the origin of...……的起源47.frequency n.发生率,出现率;频繁;频率→frequent adj.频繁的→frequently ad v.频繁地48.investment n.投资;投入→invest v.投资;投入49.calculate v t.计算,核算;预测→calculation n.计算,运算;预测→calculator n.计算器It is calculated that...据估算……50.coverage n.新闻报道;覆盖范围;信息范围→cover n.覆盖物;封面;掩护物v.覆盖;遮盖;处理;涉及;包括51.incredibly ad v.极其,极端地;令人难以置信→incredible adj.不可思议的,难以置信的52.dust n.沙土,尘土;灰尘,尘埃→dusty adj.布满灰尘的53.cast new light on使进一步了解……54.plain to see显而易见的55.lay the foundation for为……打下基础56.come to an end结束57.at a time每次58.a huge amount of大量的59.long to do 渴望做……60.make sense of弄清楚/弄明白……61.Due to the near absence of gravity in space,we have to attach ourselves so that we don’t float around.(so that引导目的状语从句)由于太空中近乎没有重力,我们必须把自己固定住,这样我们才不会四处飘浮。

SE培训

SE培训

Project planning Process
PSP Data Gathering
Time Measures Size Measures Quality Measures
Development vs. Usage Defects; IBM release 1
PSP Quality Management
Unit 5 软件过程改进 Software Process Improvement
What is Process?
Webster’s dictionary
A process is ―a system of operations in producing something…a series of actions, changes, or functions that achieve an end or result.‖
有效的软件过程环境
软件技术 的变化
过程定义
软件过程 改进
培 训
对结果与 反馈的度 量
活动工具
过程用户 的反馈
结果软件程序
软件过程改进框架
软件过程环境
软件过程架构 软件过程改进 的行动计划 软件过程改进规划图 软件过程评估
组织与管理架构
实施负责人
执行委员会
项目1 项目2 项目3 项目4
软件过程改进团队1
如果过程不在统计控制之下就不可能实现持续的进有效的软件过程环境过程定义软件技术的变化软件过程改进活动工具结果软件程序过程用户的反馈对结果与反馈的度软件过程改进框架软件过程架构软件过程改进规划图软件过程评估软件过程改进的行动计划软件过程环境软件过程改进团队4软件过程改进团队3软件过程改进团队2软件过程改进团队1企业的sepg实施负责人执行委员会项目1项目2项目3项目4组织与管理架构技术架构度量与反馈工具组织标准软件过程的技术架构项目所定义的软件过程的技术架构检索与决策支持工具数据文档保存与检索工具数据文档保存与检索工具特定过程的裁剪软件过程技术反面架构的体系示意图软件过程改进规划图如果你不知去往何方脚下的路会知道cmm软件过程评估youdontknowwhereyoumapwonthelp软件过程改进计划第五级优化持续过程改进第四级已管理的可预测的过程第三级已定义的统一标准的过程第二级可重复的规范的过程第一级初始的混乱的过程软件过程的重大改变必须从高层开始必须人人参与树立明确的目标并对当前的过程了解持续改进没有有意识的努力和周期性的增强软件过程的变化就不会持久软件过程改进需要投资要想改进软件过程必须有人为之努力未精心计划的过程改进只是美好的愿望对于一个拙劣的已定义的过程实行自动将产生拙劣的定义的结果改进应分小步走培训培训再培训一些常见的误解必须从确定的需求开始只要通过测试产品就不会有问题软件质量无法度量软件问题是技术问题需要好的开发人员软件管理与其他管理不同找到一条适合自己的过程改进的方法组织和准备执行组织审查建立技术工作组了解项目当前状态重新定义过程开发解决方案执行过程试点和评价结果支持组织级的经验和实践学习过程改进方法历史情况总结成功的过程改进程序一般是

典型的WSN路由协议

典型的WSN路由协议

典型的WSN路由协议典型的无线传感器网络(Wireless Sensor Network,WSN)路由协议有多种,其中包括基于层级结构的协议、基于分簇结构的协议、基于数据中心的协议等。

在以下文本中,我将详细介绍这些典型的WSN路由协议。

一、基于层级结构的协议基于层级结构的WSN路由协议通常将网络节点划分为多个层级,如根节点、中间节点和叶子节点。

这些协议的主要目标是将传感器节点的数据从低层级传输到高层级,从而实现对数据的收集和处理。

1. LEACH(Low-Energy Adaptive Clustering Hierarchy)LEACH是一种基于层级结构的分簇协议,采用随机方式选择簇首。

在LEACH中,各个节点根据能量水平选择成为簇首或普通节点。

簇首节点收集普通节点的数据并进行聚合,然后将聚合结果传输到基站。

2. HEED(Hybrid Energy Efficient Distributed Clustering)HEED是一种能量效率分簇协议,采用分布式方式选择簇首。

在HEED 中,每个节点通过计算能量、距离和节点密度等指标来选择簇首节点。

该协议通过平衡能量消耗和网络负载来延长网络寿命。

二、基于分簇结构的协议基于分簇结构的WSN路由协议将网络节点按照一定的规则划分为不同的簇,以便有效地管理和协调数据传输。

1. PEGASIS(Power-Efficient Gathering in Sensor Information Systems)PEGASIS是一种能量有效的数据收集协议,在不选择簇首的情况下通过链式传输将数据传输到基站。

该协议通过最小化传输功率和距离来延长网络寿命。

2. SEP(Stable Election Protocol)SEP是一种能量稳定的分簇协议,通过轮流的方式选择簇首节点。

在SEP中,每个节点有一个能量阈值,当能量低于阈值时,节点将成为簇首并将其能量转移到其他节点上。

优化方案的参考答案英语

优化方案的参考答案英语

优化方案的参考答案英语Optimizing Solutions: A Reference GuideIntroductionIn today's fast-paced world, finding efficient and effective solutions to various challenges is of utmost importance. Whether it is in business, technology, or personal life, optimizing solutions can lead to improved outcomes and increased productivity. This article aims to provide a reference guide on optimizing solutions, exploring different techniques and approaches without delving into politics.Understanding the ProblemBefore diving into finding an optimal solution, it is crucial to understand the problem at hand. This involves conducting thorough research, gathering relevant data, and identifying the root causes. By having a clear understanding of the problem, one can develop a targeted approach to finding the best solution.Brainstorming and Idea GenerationOnce the problem is understood, the next step is to brainstorm and generate ideas. This stage involves thinking outside the box, encouraging creativity, and exploring various possibilities. It is essential to create an open and inclusive environment where all team members can contribute their ideas freely. By harnessing collective intelligence, innovative and optimal solutions can be discovered.Analyzing and Evaluating OptionsAfter generating a pool of ideas, it is essential to analyze and evaluate each option. This involves considering the feasibility, cost-effectiveness, and potential risks associated with each solution. Utilizing decision-making tools such as cost-benefit analysis or SWOT analysis can assist in objectively assessing the pros and cons of each option. By carefully evaluating the alternatives, one can identify the most promising solution.Collaboration and CommunicationOptimizing solutions often requires collaboration and effective communication among team members. By fostering a collaborative environment, individuals can share their expertise, perspectives, and insights. This exchange of ideas can lead to the refinement and enhancement of proposed solutions. Additionally, effective communication ensures that everyone is on the same page, minimizing misunderstandings and facilitating smooth implementation.Implementing and Monitoring ProgressOnce a solution is selected, it is crucial to develop a comprehensive implementation plan. This plan should outline the necessary steps, allocate resources, and establish a timeline. Regular monitoring and evaluation of the progress are essential to identify any deviations or obstacles. By closely monitoring the implementation, necessary adjustments can be made promptly, ensuring the optimization process remains on track.Continuous ImprovementOptimizing solutions is an ongoing process that requires a commitment to continuous improvement. Regularly reviewing the implemented solutions and seeking feedback from stakeholders can provide valuable insights for further optimization. Embracing a culture of learning and adaptability allows for the identification of new opportunities and the refinement of existing solutions. ConclusionIn conclusion, optimizing solutions is a multifaceted process that involves understanding the problem, generating ideas, evaluating options, collaborating, implementing, and continuously improving. By following these steps, individuals and organizations can enhance their problem-solving capabilities, leading to more efficient and effective outcomes. Remember, the key lies in creativity, critical thinking, and a commitment to constant improvement.。

不良反应信号挖掘流程

不良反应信号挖掘流程

不良反应信号挖掘流程Adverse drug reactions (ADRs) are a significant concern in healthcare as they can lead to patient harm, increased healthcare costs, and regulatory issues. Therefore, it is crucial to have an effective process for detecting and monitoring ADR signals. In this response, I will discuss the problem of ADR signal mining and outline the requirements for an efficient ADR signal mining workflow.ADRs can arise from various sources, including clinical trials, post-marketing surveillance, and spontaneous reporting systems. The first step in the ADR signal mining process is data collection. This involves gathering information from diverse sources, such as electronic health records, patient reports, and social media platforms. The collected data should be comprehensive and cover a wide range of patient populations and drug exposures.Once the data is collected, the next step is data preprocessing. This involves cleaning the data, removingduplicates, and standardizing the format. It is important to ensure data quality and integrity to minimize false signals and improve the accuracy of the analysis. Additionally, data preprocessing may involve coding the reported adverse events using standardized medical terminology, such as the Medical Dictionary for Regulatory Activities (MedDRA).After data preprocessing, the data is ready for analysis. Various statistical and data mining techniques can be employed to identify potential ADR signals. One commonly used approach is disproportionality analysis, which compares the observed number of ADR reports for a specific drug-event combination with the expected number based on background rates. Other methods include time-to-onset analysis, which examines the temporal relationship between drug exposure and the onset of adverse events, and signal detection algorithms, such as the Bayesian Confidence Propagation Neural Network (BCPNN).Once potential ADR signals are identified, they need to be further evaluated and validated. This involvesconducting detailed clinical assessments, reviewing relevant literature, and consulting domain experts. The goal is to determine the causality and clinicalsignificance of the identified signals. Validated signals are then reported to regulatory authorities and healthcare professionals for appropriate action, such as updating drug labels, issuing safety alerts, or implementing risk management strategies.Finally, continuous monitoring and surveillance are essential to ensure the timely detection of new ADR signals and the assessment of known signals. This involves the establishment of pharmacovigilance systems, which collect and analyze real-world data on drug safety. Feedback mechanisms, such as healthcare professional reporting and patient reporting systems, play a crucial role in this ongoing monitoring process.In conclusion, an effective ADR signal mining workflow involves data collection, preprocessing, analysis, evaluation, and continuous monitoring. It requires a multidisciplinary approach, combining expertise inpharmacology, statistics, data science, and clinical medicine. By implementing such a workflow, healthcare systems can enhance patient safety, improve drug regulation, and ultimately save lives.。

ssci technical benchmarking requirement

ssci technical benchmarking requirement

ssci technical benchmarking requirementTo define the technical benchmarking requirement for SSCI (Social Science Citation Index), the following components should be considered:1. Data Collection: Determine the sources and methods for collecting data related to social science citations. This may include gathering information from scholarly journals, conference proceedings, and other scholarly publications.2. Data Processing: Outline the process of processing and standardizing the collected data. This involves ensuring the accuracy and consistency of citation information, including author names, titles, publication information, and reference formats.3. Indexing: Design an indexing system that categorizes and organizes the collected data into relevant subject areas, disciplines, and citation indexes. This facilitates efficient searching and retrieval of citation information for users.4. Quality Control: Establish quality control measures to validate data accuracy and completeness. This may involve manual checks, automated algorithms, and regular audits to identify and correct errors or inconsistencies in the citation data.5. Search Interface: Develop a user-friendly search interface that allows researchers to access and explore the SSCI database effectively. The interface should offer advanced search functionalities, filtering options, and relevant metadata to enhance the retrieval of citation information.6. Performance Metrics: Define performance metrics to gauge the efficiency and effectiveness of the SSCI benchmarking system. This could include measures such as data coverage, accuracy, search response time, and user satisfaction.7. Data Updates: Establish a mechanism to regularly update and incorporate new citation information into the benchmarking system. This ensures that the database reflects the latest developments and research in social sciences.8. Security and Privacy: Implement robust security measures to protect the integrity and confidentiality of the SSCI database. This includes ensuring data encryption, access controls, and compliance with privacy regulations.9. User Support: Provide user support services, such as documentation, tutorials, and help desks, to assist researchers in utilizing the SSCI benchmarking system effectively.10. Collaboration and Integration: Explore opportunities for collaboration with other citation index databases or research institutions to enhance data sharing, interoperability, and the overall value of the SSCI benchmarking system.These requirements form the basis for developing a technically robust and comprehensive SSCI benchmarking system for social science citation analysis.。

基于ZigBee的无线传感器网络管理系统架构设计

基于ZigBee的无线传感器网络管理系统架构设计

基于ZigBee的无线传感器网络管理系统架构设计何丽莉;孙冰怡;姜宇;张健;胡成全【摘要】Based on WINNA abstract model and ZigBee characteristics, a novel WSN management framework was proposed. An embedded framework of WSN node based on agent was given, which is usable to heterogeneous networks. Furthermore, a visual network management platform was designed, which can improve the efficiency of the WSN management. It proves that this WSN management system can fully use the limited network resources and greatly improve the service quality.%基于WINNA网络管理抽象模型,结合ZigBee协议的应用特征,提出一个新的无线传感器网络管理框架;给出了一个基于代理的节点嵌入式系统架构,并支持异构的网络环境;设计了可视化网络管理平台,提高了网络管理的易用性和工作效率.实验表明,该网络管理系统充分利用了有限的网络资源,可提高无线传感器网络应用系统的服务质量.【期刊名称】《吉林大学学报(理学版)》【年(卷),期】2012(050)004【总页数】5页(P757-761)【关键词】无线传感器网络;ZigBee协议;网络管理;代理【作者】何丽莉;孙冰怡;姜宇;张健;胡成全【作者单位】吉林大学计算机科学与技术学院,符号计算与知识工程教育部重点实验室,长春130012;吉林大学计算机科学与技术学院,符号计算与知识工程教育部重点实验室,长春130012;吉林大学计算机科学与技术学院,符号计算与知识工程教育部重点实验室,长春130012;吉林大学计算机科学与技术学院,符号计算与知识工程教育部重点实验室,长春130012;吉林大学计算机科学与技术学院,符号计算与知识工程教育部重点实验室,长春130012【正文语种】中文【中图分类】TP315无线传感器网络(wireless sensor network, WSN)由大量微型、廉价、具有无线通信能力的传感器节点组成, 这些节点部署在监视区域上, 相互协作完成特定的监控任务. 传感器网络具有监测高精度、高容错性、大覆盖区域、可远程监控等分布式处理的优点, 应用广泛[1-2].世界上第一个无线传感器网络管理框架MANNA是由Ruiz等[3]提出的. 但目前对于WSN网络管理的研究, 尚无统一标准. Song等[4]提出一种基于UPnP协议的无线传感器网络管理系统BOSS, 通过在UPnP控制点和WSN间建立桥接架构使得资源有限的WSN能接入UPnP网络, 同时这种架构也使用户可通过多种UPnP 控制点对WSN进行管理, 从而极大提高了WSN的易用性. 但BOSS需要终端用户根据网络状态频繁手动做出相应的管理操作, 并且集中式的管理结构也不适用于各种异构的设备和服务. Lee等[5]提出一种自适应的基于策略的无线传感器网络管理系统WinMS, 其体系结构包含底层的MAC和路由协议、局部网络管理和中央网络管理. WinMS网络管理功能包括配置管理、故障管理、性能管理和计费管理等. WinMS采取先应式监测方式为传感器节点提供自治能力, 利用中央管理器分析网络状态并执行更正和预防管理. 由于其采用了自有的非标准底层协议, 因此限制了其推广应用. Wagenknecht等[6]提出一个异构无线传感器网络管理体系结构MARWIS, 支持异构WSN环境, 且支持普通的管理任务, 包括监测、配置和程序代码更新等. 该方案的骨干网是一种无线Mesh网, 是进行异构无线传感器网络有效管理的前提, 对许多应用环境是一种局限.本文基于WINNA网络管理抽象模型, 结合ZigBee协议的应用特征, 提出一个新的无线传感器网络管理框架, 该网络管理系统充分利用了有限的网络资源, 可提高无线传感器网络应用系统的服务质量.图1 网络管理的基本结构Fig.1 Basic structure of network management1 基于ZigBee的WSN网络管理体系结构IEEE 802.15.4定义了MAC和PHY层协议, ZigBee[7]在此基础上, 对NWK层[8]、应用支持APS层及其上的规范进行了定义. ZigBee由于其独特的性质, 在环境监测、工业控制、智能家居、楼宇自动化、自动抄表、医疗监护、智能电网、物流和建筑物监测等领域应用前景广阔[9].网络管理体系结构是定义网管系统结构及系统成员间相互关系的规则集合[10]. 现代计算机网络的网络管理基本采用管理者(Manager)-代理(Agent)结构[11], 如图1所示. 代理指驻留在被管设备上协助网络管理系统完成网络管理任务的一个守护进程, 主要功能是对管理者发送来的请求做出响应, 同时根据设置向网络管理者发送中断或通知消息.图2 系统的物理结构Fig.2 Physical structure of the system网络管理系统结构有3种, 分别是集中式体系结构、分层式体系结构和分布式体系结构. 本文系统采用分层式体系结构, 基于ZigBee规范, 构建了可伸缩性强、支持多应用扩展、支持异构的无线传感器网络管理系统, 系统的整体结构如图2所示.该系统允许用户在客户端浏览器上实时监测来自ZigBee无线传感器网络的状态.系统分为基于ZigBee的无线传感器网络和管理终端两部分. 基于ZigBee的无线传感器网络包括3类设备:基站、路由和终端节点[12-15]. 其中终端节点为简化功能设备, 一般是能源资源有限的终端, 具有感知和通信功能;路由器为全功能设备, 一般为能源资源丰富的终端, 具有感知、通信及路由功能;基站是带有网络协调器的PC机, 负责ZigBee网络与管理终端的数据转发功能. 根据MANNA对于网络管理功能的抽象模型[16], 结合ZigBee无线传感器网络应用特征[17], 本文定义无线传感器网络管理功能框架如图3所示.图3 无线传感器网络管理功能框架Fig.3 Network management framework of WSN配置管理包括对系统的拓扑控制及重编程管理;故障管理包括传感器故障、通信故障和传感器节点故障;安全管理包括数据机密性、数据完整性及入侵检测和密钥管理;性能管理包括能量管理、生存周期和通信质量管理. 这些管理都遵循无线传感器网络管理协议.本文系统基于MANNA的网络管理与网络应用分离的设计思想, 使网络管理系统能适应不同的应用环境. 体系结构由管理站、路由节点和传感器节点组成, 其中管理站带有用户访问接口和ZigBee网络管理应用软件系统, 实现对ZigBee网络的集中式管理和基于Web的访问与控制, 并同时具有网关功能, 允许Internet与ZigBee网络的通信;路由节点具有ZigBee网络管理模块, 能建立簇状网络, 并提供子网的管理功能. 传感器节点具有一个代理模块, 负责网络管理信息的搜集与网管命令的执行.2 基于ZigBee的WSN可视化网络管理平台设计无线传感器网络可视化管理平台软件采用基于MVC模型的三层Web结构, 如图4所示. 在管理功能上包含配置管理、故障管理、安全管理、性能管理和可视化工具集.图4 基于Web的无线传感器网络可视化管理逻辑结构Fig.4 Visual management structure based on Web of WSN1) 配置管理模块: 包括拓扑控制(拓扑发现、睡眠周期管理、成簇管理)、重编程(参数调整)和Agent调度等; 2) 故障管理模块: 包括传感器故障管理、通信故障管理和传感器节点故障管理等; 3) 安全管理模块: 包括消息认证、访问控制和密钥管理等; 4) 性能管理模块: 包括生存周期管理(能量消耗)、通信QoS管理(丢包率、时延、实时)和网络感知QoS管理(网络覆盖率)等; 5) 可视化工具: 包括拓扑结构的可视化、能量的可视化和节点状态的可视化等; 6) 数据库: 包括网络拓扑数据、节点属性表、配置信息和覆盖区域信息等.3 基于ZigBee的WSN网络管理系统嵌入式软件设计3.1 基于Agent的终端节点嵌入式软件设计目前, 对基于Agent的嵌入式体系结构研究尚处于探索阶段, 还没有成熟的产品; 已有的框架都侧重解决某一局部问题和算法, 没有从WSN应用开发的全局考虑, 因此不具有通用性.基于Agent的面向服务处理机制, 其终端节点的嵌入式中间件架构采用异步多对多的通信模型, 适合大规模的WSN. 采用半有序层级结构, 每层只能调用同层或下层, 层向上的调用和模块及应用间的调用以事件为通信方法, 上层可跨层调用下层的服务, 体系结构如图5所示.图5 终端节点嵌入式架构Fig.5 Embedded framework of terminal node该嵌入式体系结构基于ZigBee参考模型. 尽管硬件设计可能不同, 但所有的WSN 节点硬件都实现一个共性的功能集合. 为了实现对节点上不同操作系统和硬件的兼容, 在应用支撑层APS中, 采用基于Agent的设计. 对不同的硬件, 只需实现这些面向服务的Agent, 即可保证向上的透明性. 对于特殊节点的特殊功能, 属于相关应用, 由应用程序直接调用, 也可定制和包装为应用相关的服务Agent, 供指定应用程序调用. 按照功能不同, APS层Agent分为管理Agent和功能Agent两类. 功能Agent提供应用所需的所有功能, 根据应用的不同, 可通过配置管理Agent动态配置各个功能Agent.基于WSN网络管理功能框架, 本文设计4种管理Agent, 即配置管理Agent、故障管理Agent、性能管理Agent和安全管理Agent.1) 配置管理Agent: 负责设置终端节点的网络运行参数、代码更新和节点状态等;2) 故障管理Agent: 传感器网络通常需要在无人干预的环境下长时间运行, 而传感器节点众多、自身资源受限, 使得网络中可能随时存在故障节点, 因此, 故障管理Agent负责节点系统自检、故障检测和故障报告等操作; 3) 性能管理Agent: QoS 是检验节点性能的重要特性, 交叉于各层中, 并包含于各种功能服务Agent中, 如数据管理服务Agent要求可靠且高精确度; 用于度量WSN中QoS基础结构的典型参数, 包括消息时延、延时抖动、丢包率、网络带宽、吞吐量及滞后时间等; 用于度量WSN中QoS应用的典型参数, 包括数据精确度、聚合延迟、覆盖量和系统寿命等信息; 性能管理Agent负责收集并报告各种QoS信息; 4) 安全管理Agent: 负责管理节点的信息安全, 包括消息的机密性、完整性、身份认证、入侵检测和访问控制等.3.2 基于Agent的路由节点嵌入式软件设计基于终端节点的嵌入式体系结构是基于Agent的路由节点体系结构, 如图6所示. 除具有终端节点所有的功能Agent外, 增加了路由管理Agent和消息管理Agent, 其网络管理Agent功能也更丰富.图6 路由节点嵌入式软件体系结构Fig.6 Embedded framework of router node 路由管理Agent负责建立和维护其所属子网节点的路由表, 消息管理Agent负责管理其所属子网节点所传输的消息, 如遇到网络不通或阻塞的情况, 可缓存部分最新消息并提供重发机制. 网络管理Agent除具有终端节点的所有管理功能外, 还具有管理其所属子网的状态、拓扑结构等特殊管理功能.综上所述, 本文基于WINNA管理框架, 结合ZigBee协议设计并开发了一个基于ZigBee的无线传感器网络管理系统. 该系统基于Agent技术, 包括终端节点的嵌入式设计和路由节点的嵌入式设计;通过基站的双向转发, 设计了可视化的网络管理平台, 实现了WSN的配置管理、故障管理、安全管理和性能管理等核心网络管理功能.参考文献【相关文献】[1] SONG He-ping, HU Cheng-quan, FAN Dong-xia, et al. Cluster-Based Key Management Scheme for Wireless Sensor Networks [J]. Journal of Jilin University: Information Science Edition, 2011, 29(3): 231-236. (宋和平, 胡成全, 樊东霞, 等. 基于簇的无线传感器网络密钥管理方案 [J]. 吉林大学学报: 信息科学版, 2011, 29(3): 231-236.)[2] YANG Jing, XIONG Wei-li, QIN Ning-ning, et al. Energy-Efficient Data Gathering Algorithm for Wireless Sensor Networks [J]. Journal of Jilin University: Engineering and Technology Edition, 2011, 41(6): 1720-1725. (杨靖, 熊伟丽, 秦宁宁, 等. 用于无线传感器网络的高能效数据收集算法 [J]. 吉林大学学报: 工学版, 2011, 41(6): 1720-1725.)[3] Ruiz L B, Nogueira J M, Loureiro A A F. MANNA: A Management Architecture for Wireless Sensor Networks [J]. Journal of the IEEE Communications, 2003, 41(2): 116-125.[4] Song H, Kim D, Lee K, et al. UPnP-Based Sensor Network Management Architecture[C]//Proceedings of the Second International Conference on Mobile Computing and Ubiquitous Networking. Osaka: ICMU, 2005.[5] Lee W, Datta A, Cardell-Oliver R. WinMS: Wireless Sensor Network Management System: An Adaptive Policy-Based Management for Wireless Sensor Networks [R]. [S.l.]: The University of Western Australia, 2006.[6] Wagenknecht G, Anwander M, Braun T, et al. MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks [C]//Proceedings of the 6th International Conference on Wired/Wireless Internet Communications. Berlin: Springer-Verlag, 2008: 177-188.[7] ZigBee Alliance. ZigBee Specification [DB/OL]. 2005-06-27. .[8] LIU Dan, QIAN Zhi-hong, LIU Ying. Tree Routing Improvement Algorithm in ZigBee Network [J]. Journal of Jilin University: Engineering and Technology Edition, 2010, 40(5): 1392-1396. (刘丹, 钱志鸿, 刘影. ZigBee网络树路由改进算法 [J]. 吉林大学学报: 工学版, 2010, 40(5): 1392-1396.)[9] PANG Na, CHENG De-fu. Design of Greenhouse Monitoring System Based on ZigBee Wireless Sensor Networks [J]. Journal of Jilin University: Information Science Edition, 2010,28(1): 55-60. (庞娜, 程德福. 基于ZigBee无线传感器网络的温室监测系统设计 [J]. 吉林大学学报: 信息科学版, 2010, 28(1): 55-60.)[10] MENG Luo-ming. Network Management: Problems, Progress and Prospect [J]. Journal of Beijing University of Posts and Telecommunications, 2003, 26(2): 1-8. (孟洛明. 网络管理研究中的问题、现状和若干研究方向 [J]. 北京邮电大学学报, 2003, 26(2): 1-8.)[11] LI Ye-wen, MENG Luo-ming, QI Feng. The Study and Perspective of Mobile Agent Applications in Network Management Environment [J]. Acta Electronica Sinica, 2002, 30(4): 564-569. (李冶文, 孟洛明, 亓峰. 网络管理环境下移动代理技术应用研究的现状、问题与展望 [J]. 电子学报, 2002, 30(4): 564-569.)[12] CUI Li, JU Hai-ling, MIAO Yong, et al. Overview of Wireless Sensor Networks [J]. Journal of Computer Research and Development, 2005, 42(1): 163-174. (崔莉, 鞠海玲, 苗勇, 等. 无线传感器网络研究进展 [J]. 计算机研究与发展, 2005, 42(1): 163-174.)[13] ZHOU Ying. Research on Architecture of Network Management and Relative Technologies for Wireless Sensor Network [D]: [Ph D Thesis]. Wuhan: Wuhan University of Technology, 2008: 72-93. (周颖. 无线传感器网络的网络管理体系结构及相关技术的研究 [D]: [博士学位论文]. 武汉: 武汉理工大学, 2008: 72-93.)[14] LI Jian-zhong, GAO Hong. Survey of Wireless Network Research [J]. Journal of Computer Research and Development, 2008, 45(1): 1-15. (李建中, 高宏. 无线传感器网络的研究进展 [J]. 计算机研究与发展, 2008, 45(1): 1-15.)[15] SHI Jun-feng, ZHONG Xian-xin, CHEN Shuai, et al. Architecture and Characteristics of Wireless Sensor Networks [J]. Journal of Chongqing University: Natural Science Edition, 2005, 28(2): 16-19. (石军锋, 钟先信, 陈帅, 等. 无线传感器网络结构及特点分析 [J]. 重庆大学学报: 自然科学版, 2005, 28(2): 16-19.)[16] YU Hai-bin, ZENG Peng, WANG Zhong-feng, et al. Study of Communication Protocol of Distributed Sensor Network [J]. Journal of China Institute of Communications, 2004,25(10): 102-110. (于海斌, 曾鹏, 王忠锋, 等. 分布式无线传感器网络通信协议研究 [J]. 通信学报, 2004, 25(10): 102-110.)[17] DUAN Shang-wei, YUAN Xiao-bu. Exploring Hierarchy Architecture for Wireless Sensor Networks Management [C]//Proc of the Third IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2006). Bangalore, India: IEEE Press, 2006: 6.。

能量均衡的无线传感器网络非均匀分簇路由协议

能量均衡的无线传感器网络非均匀分簇路由协议

10.3724/SP.J. 1001.2012.04061 能量均衡的无线传感器网络非均匀分簇路由协议蒋畅江1石为人2唐贤伦1王平1向敏11(工业物联网与网络化控制教育部重点实验室(重庆邮电大学),重庆4000652(重庆大学自动化学院,重庆400030Energy-Balanced Unequal Clustering Routing Protocol for Wireless Sensor Networks JIANG Chang-JiangSHI Wei-RenTANG Xian-LunWANG PingXIANG Min摘要:提出了一种能量高效均衡、非均匀分簇和簇间多跳路由有机结合的无线传感器网络分布式分簇路由协议DEBUC(distributed energy-balanced unequal clustering routing protocol).该协议采用基于时间的簇头竞争算法,广播时间取决于候选簇头的剩余能量和其邻居节点的剩余能量.同时,通过控制不同位置候选簇头的竞争范围,使得距离基站较近的簇的几何尺寸较小.这样,网络中不同位置节点之间的簇内和簇间通信能耗得以互相补偿.DEBUC采用簇间多跳路由,根据节点剩余能量、簇内通信代价和簇间通信代价,每个簇头在邻居簇头集合中运用贪婪算法选择其中继节点.仿真实验结果表明,DEBUC能够有效地节约单个节点能量、均衡网络能耗、延长网络生存周期.无线传感器网络;路由协议;分簇TP393A*基金项目:国家自然科学基金(60905066);国家教育部重大专项培育基金(708074);重庆市科委自然科学基金(CSTC2011jjA40028);重庆邮电大学博士启动基金(A2011-43)于候选簇头的剩余能量和其邻居=f1.3无线通信能耗模型2.1簇的形成图2簇头选择算法伪代码(6) (10)‘结合考图4 DEBUC生成的簇头的数量图6存活节点数量的变化曲线4总结@@ [1] Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-Efficient communication protocol for wireless microsensor networks. In: Proc. of the 33rd Hawaii Int'l Conf. on System Science (HICSS 2000). 2000. 3005-3014. [doi: 10.1109/HICSS.2000.926982]@@ [2] Ye M, Li CF, Chen GH, Wu J. Arn energy efficient clustering scheme in wireless sensor networks. In: Proc. of the IEEE Int'l Performance Computing and Communications Conf. 2005. 535-540. [doi: 10.1109/PCCC.2005.1460630]@@ [3] Soro S, Heinzelman WB. Prolonging the lifetime of wireless sensor networks via unequal clustering. In: Proc. of the 19th IEEE Int'l Parallel and Distributed Processing Symp., 2005. Denver: IEEE Computer Society Press, 2005. 236-244. [doi: 10.1109/ IPDPS.2005.365] @@[4] Li CF, Ye M, Chen GH, Wu J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In: Proc. of the  IEEE Int'l Conf. on Mobile Adhoc and Sensor Systems. Washington, 2005. 597-604. [doi: 10.1109/MAHSS.2005.1542849] @@[5] Zhang RB, Cao JF. Uneven clustering routing algorithm for wireless sensor networks based on ant colony optimization.Journal of Xi'an Jiaotong University, 2010,44(6):33-38 (in Chinese with English abstract).@@ [6] Wang Y, Zhang DY, Liang TT. Cell energy balanced uneven clustering hierarchy scheme for wireless sensor networks. Journal of Xi'an Jiaotong University, 2008,42(4):389-394 (in Chinese with English abstract).@@ [7] Yang J, Zhang DY. A data transmission mechanism for wireless sensor networks using unequal clustering. Journal of Xi'an  Jiaotong University, 2009,43(4):14-17 (in Chinese with English abstract).@@ [8] Xiang M, Shi WR, Jiang C J, Zhang Y. Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks AEU-Int'l Journal of Electronic and Communication, 2010,64(4):289-298 [doi: 10.1016/j.aeue.2009.01.004]@@ [9] Hill J, Szewczyk R, Woo A, Hollar S, Culler DE, Pister KSJ. System architecture directions for networked sensor. ACM SIGPLAN Notices, 2000,28(5):93-104.@@[10] Zheng J. Research on periodic data gathering in wireless sensor networks [Ph.D. Thesis]. Hefei: University of Science and  Technology of China, 2010 (in Chinese wit English abstract)@@[11] Shih E, Cho SH, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A Physical layer driven protocol and algorithm design for  energy-efficient wireless sensor networks. In: Proc. of the ACM MobiCom 2001 Rome, 2001. 272-286. [doi: 10.1145/381677. 381703]@@[12] Heinzelman WB, Chandrakasan AP, Balakrishnan H. An application-specific protocol architecture for wireless microsensor  networks IEEE Trans. on Wireless Communications, 2002,1(4):660 670. [doi: 10.1109/TWC.2002.804190]@@[5]张荣博,曹建福.利用蚁群优化的非均匀分簇无线传感器网络路由算法西安交通大学学报,2010,44(6):33-38.@@[6]王毅,张德运,梁涛涛.无线传感器网络分区能耗均衡的非均匀分簇算法西安交通大学学报,2008,42(4):389-394.@@[7]杨军,张德运.非均匀分簇的无线传感器网络数据传送机制.西安交通大学学报,2009,43(4):14-17.@@[10]郑杰.无线传感器网络周期性数据收集研究[博士学位论文].合肥:中国科学技术大学,2010.蒋畅江(1976-),男,四川安岳人,博士,讲师,主要研究领域为无线传感器网络,智能算法.石为人(1948-),男,教授,博士生导师,主要研究领域为普适计算与无线传感器网络.唐贤伦(1977-),男,博士,副教授,主要研究领域为无线传感器网络,智能算法.王平(1963-),男,博士,教授,博士生导师,CCF高级会员,主要研究领域为无线传感器阿络,网络化控制.向敏(1974-),男,博士,副教授,主要研究领域为无线传感器网络,网络化控制.万方数据能量均衡的无线传感器网络非均匀分簇路由协议作者:蒋畅江, 石为人, 唐贤伦, 王平, 向敏, JIANG Chang-Jiang, SHI Wei-Ren, TANG Xian-Lun, WANG Ping, XIANG Min作者单位:蒋畅江,唐贤伦,王平,向敏,JIANG Chang-Jiang,TANG Xian-Lun,WANG Ping,XIANG Min(工业物联网与网络化控制教育部重点实验室(重庆邮电大学),重庆,400065), 石为人,SHI Wei-Ren(重庆大学自动化学院,重庆,400030)刊名:软件学报英文刊名:Journal of Software年,卷(期):2012,34(5)被引用次数:102次1.Heinzelman WR;Chandrakasan A;Balakrishnan H Energy-Efficient communication protocol for wireless microsensor networks 20002.Ye M;Li CF;Chen GH;Wu J Arn energy efficient clustering scheme in wireless sensor networks 20053.Soro S;Heinzelman WB Prolonging the lifetime of wireless sensor networks via unequal clustering 20054.Li CF;Ye M;Chen GH;Wu J An energy-efficient unequal clustering mechanism for wireless sensor networks 20055.张荣博,曹建福利用蚁群优化的非均匀分簇无线传感器网络路由算法[期刊论文]-西安交通大学学报 2010(6)6.王毅,张德运,梁涛涛无线传感器网络分区能耗均衡的非均匀分簇算法[期刊论文]-西安交通大学学报 2008(4)7.杨军,张德运非均匀分簇的无线传感器网络数据传送机制[期刊论文]-西安交通大学学报 2009(4)8.Xiang M;Shi WR;Jiang C J;Zhang Y Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks 2010(04)9.Hill J;Szewczyk R;Woo A;Hollar S Culler DE Pister KSJ System architecture directions for networked sensor 2000(05)10.Zheng J Research on periodic data gathering in wireless sensor networks 201011.Shih E;Cho SH;Ickes N;Min R,Sinha A,Wang A,Chandrakasan A Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks 200112.Heinzelman WB;Chandrakasan AP;Balakrishnan H An application-specific protocol architecture for wireless microsensor networks 2002(04)13.张荣博,曹建福利用蚁群优化的非均匀分簇无线传感器网络路由算法[期刊论文]-西安交通大学学报 2010(6)14.王毅,张德运,梁涛涛无线传感器网络分区能耗均衡的非均匀分簇算法[期刊论文]-西安交通大学学报 2008(4)15.杨军,张德运非均匀分簇的无线传感器网络数据传送机制[期刊论文]-西安交通大学学报 2009(4)16.郑杰无线传感器网络周期性数据收集研究[学位论文] 20101.王非引入优化压缩思维的无线视频传感器网络路由协议[期刊论文]-科技通报 2015(07)2.陈行,张建德,宣慧无线传感器网络中基于信号博弈模型的队列管理机制研究[期刊论文]-科学技术与工程2014(29)3.李群利用ACO改进的无线传感器网络集中式LEACH路由协议[期刊论文]-微型电脑应用 2015(11)4.刘珂,杨锋英基于模糊K均值和自适应混合蛙跳算法的分簇路由设计[期刊论文]-河南理工大学学报(自然科学版) 2015(01)5.王鑫,王梦莹,蒋华一种基于簇首成链的分层分簇路由协议[期刊论文]-微电子学与计算机 2014(10)6.王文发,富文军,李晓英,尹斌斌无线传感网络覆盖盲区检测方法的研究与仿真[期刊论文]-计算机仿真 2015(9)7.刘同来,刘伟强无线传感器网络中基于扇形的非匀均分簇路由协议[期刊论文]-微电子学与计算机 2015(02)8.曾闵,江虹,陈帅,周英平基于能量优化的LEACH路由协议改进[期刊论文]-电子技术应用 2014(09)9.梁青,李卓冉,曹晓民,熊伟无线传感器网络中改进的GAF算法及其性能分析[期刊论文]-半导体光电 2014(03)10.陈海南,刘广聪,吴晓鸰,黄婷婷,李聪一种基于遗传算法与概率转发的分簇协议[期刊论文]-计算机科学2015(03)11.梁青,李卓冉,曹晓民,熊伟无线传感器网络基于相交圆结构的改进GAF算法[期刊论文]-计算机工程与设计2014(12)12.张雅琼,张慧无线传感器网络路由协议LEACH的研究与改进[期刊论文]-计算机与现代化 2014(04)13.张雅琼,张慧无线传感器网络分簇路由协议研究[期刊论文]-现代电子技术 2014(08)14.兰恒武,彭舰,刘唐基于分簇的移动协助无线传感器网络路由协议[期刊论文]-传感器与微系统 2015(02)15.赵继军,谷志群,薛亮,李志华,关新平WSN中层次型拓扑控制与网络资源配置联合设计方法[期刊论文]-自动化学报 2015(03)16.卢先领,王莹莹,王洪斌,徐保国基于查询的无线传感器网络多源单汇路由算法[期刊论文]-计算机应用2013(10)17.宋子超,刘志杰基于全局均衡策略的无线传感器网络路由算法[期刊论文]-福建电脑 2015(01)18.张文梅,廖福保改进的无线传感器网络非均匀分簇路由算法?[期刊论文]-传感技术学报 2015(05)19.陈树,韩进,蒋伟低冗余度WSN非均匀分簇算法应用研究[期刊论文]-计算机工程 2014(8)20.曾华圣,熊庆宇,杜敏,李浩一种分布式能量高效的WSNs非均匀分簇路由协议[期刊论文]-传感器与微系统2014(03)21.余成波,赵西超,杨佳,田引黎,晏绍奎,代琪怡基于QEA优化的WSNs簇间路由策略[期刊论文]-传感器与微系统2014(02)22.侯华,任艳娜,周武旸满足业务实时性要求的路由设计[期刊论文]-传感技术学报 2014(09)23.韩进,陈树受限节点的WSNs非均匀分簇算法应用研究[期刊论文]-传感器与微系统 2014(02)24.刘伟强,蒋华,王鑫基于“热”节点轮转的无线传感器网络协议[期刊论文]-传感器与微系统 2014(11)25.无线传感器网络基于分簇的路由协议概述[期刊论文]-微型机与应用 2014(12)26.张燕玲,温卫敏,王涛,许合利基于元胞自动机的同构无线传感网络生命周期仿真与分析[期刊论文]-河南理工大学学报(自然科学版) 2014(01)27.张世伟,张海涛,张士杰基于固定分簇和能量均衡的无线传感器网络多跳路由算法[期刊论文]-传感器与微系统2013(08)28.卢先领,王莹莹,王洪斌,徐保国无线传感器网络能量均衡的非均匀分簇算法[期刊论文]-计算机科学 2013(05)29.林梅金,苏彩红,李如雄一种新的高能效无线传感器网络数据收集协议[期刊论文]-自动化与信息工程 2012(05)30.邬春学,杨洋,杨桂松基于距离和能量感知的WSN非均匀分簇路由协议[期刊论文]-数据通信 2015(5)31.孙龙,徐汀荣,马菲一种新的基于链簇式的WSN不均匀分簇路由协议[期刊论文]-计算机应用与软件 2015(01)32.陆亚芳,易可夫,冯绪,万江文基于模糊理论的无线传感器网络多层分簇式路由算法[期刊论文]-传感技术学报2014(7)33.蒋文贤压缩感知的能量异构WSN分簇路由协议[期刊论文]-传感技术学报 2013(06)34.王伟长距离带状无线传感器网络路由协议设计[期刊论文]-计算机工程 2014(03)35.刘方爱,张春花,吴楠WSN中基于能量和距离的自适应分层路由算法[期刊论文]-计算机应用研究 2014(11)36.李明,曹晓莉,胡卫军基于多目标和声搜索的无线传感器网络分簇路由算法[期刊论文]-仪器仪表学报 2014(01)37.林启中,张冬梅,王聪,许魁基于位置信息的双簇头路由算法[期刊论文]-计算机应用 2015(03)38.李辉,刘书吉基于节点度和距离的WSN分簇路由算法[期刊论文]-计算机工程 2014(03)39.周萌,陈跃东,陈孟元能耗最优的LEACH协议改进[期刊论文]-计算机工程与应用 2014(23)40.吴黎兵,杜锦,聂雷,谢永无线传感器网络动态k值簇头选择方法[期刊论文]-华中科技大学学报(自然科学版)2015(10)41.余欢,刘群基于异构的无线传感器网络能量空洞缓解研究[期刊论文]-计算机工程与设计 2014(07)42.孙庆中,余强,宋伟基于博弈论能耗均衡的WSN非均匀分簇路由协议[期刊论文]-计算机应用 2014(11)43.张伟龙,郭成芳基于能量均衡的无线传感器网络路由算法[期刊论文]-激光杂志 2014(12)44.孙彦清,彭舰,刘唐,陈晓海基于动态分区的无线传感器网络非均匀成簇路由协议[期刊论文]-通信学报2014(01)45.牛佳佩,程良伦节点信息感知的非均匀分簇路由算法[期刊论文]-计算机科学 2013(z2)46.侯冰俏,刘方爱,张春花,申志远一种基于聚合度模型的WSNs双簇头分簇路由协议[期刊论文]-传感器与微系统2013(11)47.钱开国,戴祖诚,申时凯非均匀分布的无线传感器网络分簇路由算法[期刊论文]-计算机应用 2013(12)48.张亚楠,马世欢基于能量均衡的无线传感器网络分簇路由协议[期刊论文]-计算机与现代化 2015(07)49.吕红芳,张浩能量均衡的簇间多跳路由协议[期刊论文]-信息与控制 2014(3)50.叶润,王缓缓能量均衡多跳分簇路由算法[期刊论文]-智能系统学报 2014(05)51.魏春娟,杨俊杰,张志美一种分布式能量有效的无线传感器网络分簇路由协议[期刊论文]-传感技术学报2013(07)52.周晓斐改进粒子群算法优化低功耗自适应集簇分层的路由算法[期刊论文]-激光杂志 2014(12)53.曹立志,陈莹基于学习自动机的无线传感网能量均衡分簇算法[期刊论文]-传感技术学报 2013(11)54.闫会芹,何加铭,郑紫微,曾兴斌无线传感器网络模糊逻辑分簇路由协议[期刊论文]-无线电通信技术 2013(06)55.冒志敏,郑洪源,丁秋林一种基于分簇技术的数据融合算法[期刊论文]-计算机与现代化 2015(01)56.唐翠微能量均衡的无线传感器网络节点路由算法[期刊论文]-计算机与现代化 2015(01)57.彭玲玲电池供电无线Mesh网络中基于能量平衡的跨层流量及编码优化[期刊论文]-科学技术与工程 2014(24)58.饶元,朱军,傅雷扬星地传感网QoS路由机制研究进展[期刊论文]-长江大学学报(自然版)理工卷 2013(05)59.窦萌萌无线传感器网络路由协议的研究与设计[学位论文]硕士 201360.张霞,周刚,于宏毅一种协作和中继混合的传感网寿命最大化路由算法[期刊论文]-软件学报 2013(12)61.王飞,许魁,徐友云,张冬梅大数据无线通信面临的几点挑战与对策[期刊论文]-电子技术应用 2015(03)62.孙龙基于层次结构的WSN节能算法的研究[学位论文]硕士 201463.曾华圣无线传感器网络非均匀分簇路由算法研究[学位论文]硕士 201464.古欣无线传感器网络分簇算法与仿真研究[学位论文]硕士 201365.何传波无线传感器网络关键技术的研究[学位论文]硕士 201466.崔国栋无线传感器网络节点定位与路由协议研究[学位论文]硕士 2013引用本文格式:蒋畅江.石为人.唐贤伦.王平.向敏.JIANG Chang-Jiang.SHI Wei-Ren.TANG Xian-Lun.WANG Ping. XIANG Min能量均衡的无线传感器网络非均匀分簇路由协议[期刊论文]-软件学报 2012(5)。

无线传感器网络分簇路由协议

无线传感器网络分簇路由协议

⽆线传感器⽹络分簇路由协议ISSN1000.9825.CODENRUXUEWJournalofSoftware,V01.17,No.7,July2006,PP.1588—1600DOI:10.1360/josl71588@2006byJournalofSoftware.Allrightsreserved.⽆线传感器⽹络分簇路由协议⽔沈波+,张世永,钟亦平(复旦⼤学计算机与信息技术系,上海200433)Cluster-BasedRoutingProtocolsforWirelessSensorNetworksSHENBo+,ZHANGShi—Yong,ZHONGYi—Ping(DepartmentofComputingandInformationTechnology,FudanUniversity,Shanghai200433,China)+Correspondingauthor:Phn:+86—21—65643235,E—mail:042021165@fudan.edu.ca,http://www.fudan.edu.caE-mail:jos@iscas.ac.cnhttp://www.jos.org.caT乩,Fax:+86.10—62562563ShenB,ZhangSY,ZhongYP.Cluster-Basedroutingprotocolsforwirelesssensornetworks.JournalofSoftware,2006,17(7):1588—1600.http://www.jos.org.cn/1000-9825/17/1588.htmAbstract:Routingtechnologyatthenetworklayerispivotalinthearchitectureofwirelesssensornetworks.Asanactivebranchofroutingtechnology,cluster-basedroutingprotocolsexcelinnetworktopologymanagement,energyminimization,dataaggregationandSOon.Inthispaper,cluster-basedroutingmechanismsforwirelesssensornetworksareanalyzed.Clusterheadselection,clusterformationanddatatransmissionarethreekeytechniquesincluster-basedroutingprotocols.Asviewedfromthethreetechniques,recentrepresentativecluster-basedroutingprotocolsarepresented,andtheircharacteristicsandapplicationareasarecompared.Finally,thefutureresearchissuesinthisareaarepointedout.Keywords:wirelesssensornetwork;cluster-basedroutingprotocol;cluster;clusterhead摘要:在⽆线传感器⽹络体系结构中,⽹络层的路由技术⾄关重要.分簇路由具有拓扑管理⽅便、能量利⽤⾼效、数据融合简单等优点,成为当前重点研究的路由技术.分析了⽆线传感器⽹络分簇路由机制,着重从簇头的产⽣、簇的形成和簇的路由⾓度系统地描述了当前典型的分簇路由算法,并⽐较和分析了这些算法的特点和适⽤情况.最后结合该领域当前研究现状,指出分簇路由算法未来的研究重点.关键词:⽆线传感器⽹络;分簇路由协议;簇;簇头中图法分类号:TP393⽂献标识码:A作为⼀种新的信息获取⽅式和处理模式,⽆线传感器⽹络(wirelesssensornetwork,简称WSN)Ⅲ⽬前已成为国内外备受关注的研究热点.作为⼀种典型的普适计算(pervasivecomputing)应⽤,WSN通过⼤量部署在监测区域内的传感器节点,采集⽹络覆盖区域内感知对象的信息,通过多跳的⽆线通信⽅式,将收集、处理后的信息提供给终端⽤户.WSN不需要固定的⽹络⽀持,具有快速展开、抗毁性强等特点,可⼴泛应⽤于军事侦察、环境监测、医疗监护、农业养殖和其他商业领域,以及空间探索和灾难抢险等特殊领域【2,3】.Received2005—12—20;Accepted2006—02—23沈波等:⽆线传感器⽹络分簇路由协议15891WSN分簇路由协议概述在WSN体系结构中,⽹络层的路由技术对WSN的性能好坏有着重要影响.随着国内外WSN的研究发展,许多路由协议被提了出来,从⽹络拓扑结构的⾓度我们可以⼤体把它们分为两类:平⾯路由协议和分簇路由协议.在平⾯路由协议中所有⽹络节点的地位是平等的,不存在等级和层次差异.它们通过相互之间的局部操作和信息反馈来⽣成路由.在这类协议中,⽬的节点(sink)向监测区域的节点(source)发出查询命令,监测区域内的节点收到查询命令后,向⽬的节点发送监测数据.平⾯路由的优点是简单、易扩展,⽆须进⾏任何结构维护⼯作,所有⽹络节点的地位平等,不易产⽣瓶颈效应,因此具有较好的健壮性.典型的平⾯路由算法有DD(directeddiffusion)[41,SAR(sequentialassignmentrouting)[51,SPIN(sensorprotocolsforinformationvianegotiation)[61,RomorRouting[7】等.平⾯路由的最⼤缺点在于:⽹络中⽆管理节点,缺乏对通信资源的优化管理,⾃组织协同⼯作算法复杂,对⽹络动态变化的反应速度较慢等【8】.在分簇路由协议中,⽹络通常被划分为簇(cluster).所谓簇,就是具有某种关联的⽹络节点集合.每个簇由⼀个簇头(clusterhead)和多个簇内成员(clustermember)组成,低⼀级⽹络的簇头是⾼⼀级⽹络中的簇内成员,由最⾼层的簇头与基站BS(basestation)通信(如图1所⽰).这类算法将整个⽹络划分为相连的区域.Fig.1Topologicalarchitectureofcluster—basedroutingprotocols图1分簇路由协议拓扑结构在分簇的拓扑管理机制下,⽹络中的节点可以划分为簇头节点和成员节点两类.在每个簇内,根据⼀定的机制算法选取某个节点作为簇头,⽤于管理或控制整个簇内成员节点,协调成员节点之间的⼯作,负责簇内信息的收集和数据的融合处理以及簇间转发.分簇路由机制具有以下⼏个优点【9,103:(1)成员节点⼤部分时间可以关闭通信模块,由簇头构成⼀个更上⼀层的连通⽹络来负责数据的长距离路由转发.这样既保证了原有覆盖范围内的数据通信,也在很⼤程度上节省了⽹络能量;(2)簇头融合了成员节点的数据之后再进⾏转发,减少了数据通信量,从⽽节省了⽹络能量;(3)成员节点的功能⽐较简单,⽆须维护复杂的路由信息.这⼤⼤减少了⽹络中路由控制信息的数量,减少了通信量:(4)分簇拓扑结构便于管理,有利于分布式算法的应⽤,可以对系统变化作出快速反应,具有较好的可扩展性,适合⼤规模⽹络:(5)与平⾯路由相⽐,更容易克服传感器节点移动带来的问题.2WSN分簇路由协议解析学术界对Adhoc⽹络的研究⽐WSN要早,⽬前已有很多针对Adhoc⽹络的分簇路由协议被提了出来.然1590JournalofSoftware软件学报V01.17,No.7,July2006⽽,由于WSN特性不同于Adhoc⽹络,特别是WSN节点能量更为有限,因此,针对WSN的特性,必须研究新的分簇算法.LEACH(10w.energyadaptiveclusteringhierarchy)[…是WSN中最早提出的分簇路由协议.它的成簇思想贯穿于其后发展出的很多分簇路由协议中,如TEEN(thresholdsensitiveenergyefficientsensornetworkprotoc01)[12】,HEED(hybridenergy.efficientdistributedclustering)[13】等.当然,还有很多分簇路由协议是独⽴开发的,如ACE(algorithmforclusterestablishment)t”J,LSCP(1ightweightsensingandcommunicationprotocols)t”1等.LEACH的基本思想是:通过等概率地随机循环选择簇头,将整个⽹络的能量负载平均分配到每个传感器节点,从⽽达到降低⽹络能量耗费、延长⽹络⽣命周期的⽬的.LEACH的执⾏过程是周期性的,每轮循环的基本过程是:在簇的建⽴阶段,每个节点选取⼀个介于0和1之间的随机数,如果这个数⼩于某个阈值,该节点成为簇头.然后,簇头向所有节点⼴播⾃⼰成为簇头的消息.每个节点根据接收到⼴播信号的强弱来决定加⼊哪个簇。

关于questionare的英语作文

关于questionare的英语作文

关于questionare的英语作文Questionnaires have become an integral part of our modern society, serving as a powerful tool for gathering information and gaining insights into various aspects of human behavior, attitudes, and experiences. As a research method, questionnaires offer a structured and efficient way to collect data from a large number of respondents, making them invaluable in fields such as market research, social sciences, and public health.One of the primary advantages of using questionnaires is their ability to reach a wide audience. By distributing questionnaires through various channels, such as online platforms, mail, or in-person interactions, researchers can gather data from a diverse pool of participants, ensuring a more representative and comprehensive understanding of the topic under investigation. This broad reach allows for the collection of a substantial amount of information, which can then be analyzed to identify patterns, trends, and correlations.Moreover, questionnaires provide a standardized format for datacollection, ensuring that all respondents are asked the same set of questions. This consistency in the data-gathering process enhances the reliability and comparability of the results, making it easier to draw meaningful conclusions and generalize the findings to a larger population. The structured nature of questionnaires also allows for the efficient organization and analysis of the collected data, as the responses can be easily coded, tabulated, and subjected to statistical analysis.Another key advantage of questionnaires is their flexibility in terms of question types and formats. Researchers can design questionnaires that incorporate a variety of question styles, such as multiple-choice, Likert scale, open-ended, or a combination thereof. This versatility enables the collection of both quantitative and qualitative data, providing a more comprehensive understanding of the research topic. For instance, multiple-choice questions can yield numerical data that can be statistically analyzed, while open-ended questions can reveal deeper insights and nuanced perspectives from the respondents.Furthermore, questionnaires offer a cost-effective and time-efficient method of data collection compared to other research methods, such as in-depth interviews or focus groups. By leveraging online platforms or self-administered questionnaires, researchers can gather data from a large number of participants without incurringsignificant travel or personnel costs. Additionally, the automated data-collection process and the ability to analyze responses electronically can significantly reduce the time and resources required for the research project.However, it is important to acknowledge the potential limitations and challenges associated with questionnaires. One such limitation is the risk of low response rates, particularly in cases where the questionnaire is distributed online or through other impersonal channels. Respondents may choose not to participate due to a lack of motivation, time constraints, or concerns about privacy and confidentiality. Researchers must carefully design and pilot their questionnaires to ensure that they are engaging, user-friendly, and address the respondents' concerns to mitigate this issue.Another challenge is the potential for response bias, where respondents may provide answers that they perceive as socially desirable or that align with their own biases, rather than reflecting their true attitudes or experiences. This can be particularly problematic in sensitive or controversial topics, where respondents may be reluctant to share their honest opinions. Researchers must be mindful of this bias and employ strategies, such as ensuring anonymity, using neutral language, and providing clear instructions, to encourage truthful and unbiased responses.Furthermore, the quality of the data collected through questionnaires can be influenced by the wording, structure, and order of the questions. Poorly designed questions or a lack of clarity in the instructions can lead to misinterpretations or inconsistent responses, compromising the validity and reliability of the data. Careful attention to the questionnaire design, including pilot testing and expert review, is crucial to mitigate these issues.Despite these challenges, questionnaires remain a valuable research tool, and their importance is likely to continue growing in the future. As technology advances, the use of online and mobile-based questionnaires is becoming increasingly prevalent, allowing for more efficient data collection, real-time analysis, and the incorporation of multimedia elements to enhance the respondent experience.Moreover, the integration of questionnaires with other research methods, such as interviews, focus groups, or observational studies, can provide a more holistic and complementary understanding of the research topic. By combining multiple data-gathering techniques, researchers can triangulate their findings, strengthening the validity and reliability of their conclusions.In conclusion, questionnaires are a powerful research tool that offer numerous advantages, including the ability to reach a wide audience, collect standardized data, and analyze responses efficiently. Whilethere are limitations and challenges associated with their use, careful design, implementation, and the integration of multiple research methods can help researchers overcome these obstacles and unlock valuable insights. As the demand for data-driven decision-making continues to grow, the role of questionnaires in various fields is likely to become even more significant in the years to come.。

gathermate

gathermate

gathermateGatherMate: A Comprehensive Guide to Efficient Resource Gathering in GamesIntroductionResource gathering is a crucial aspect of many games that involve crafting, building, or resource management. Being able to efficiently collect resources not only speeds up the progression of the game but also enhances the overall gameplay experience. In this comprehensive guide, we will explore the popular resource gathering addon called GatherMate and how it can optimize the resource gathering process.Section 1: Understanding GatherMate1. What is GatherMate?- GatherMate is a popular addon for games that enables players to track and collect resources efficiently.- It allows players to mark resource nodes on their map, making it easier to locate and gather them.- GatherMate is customizable and supports various resource types, including herbs, ore, treasure chests, fishing pools, and more.2. Features and Benefits- GatherMate features a user-friendly interface that is easy to navigate and configure.- It offers the ability to import and export data, allowing players to share and exchange resource node locations.- The addon supports plugins and is compatible with other addons, providing additional functionalities and enhancing the gaming experience.- GatherMate helps optimize resource gathering by displaying resource node respawn timers, minimizing wasted time between collections.Section 2: Installing and Setting Up GatherMate1. Installation Process- Step-by-step instructions on how to download and install GatherMate addon for your game.- Explanation of addon compatibility and requirements, as well as any dependencies required.2. Configuration and Customization- How to configure and customize GatherMate according to personal preferences.- Overview of the different options available, such as node icons, minimap integration, and sound notifications.- Tips on which settings to adjust for optimal resource gathering efficiency.Section 3: Maximizing Resource Gathering Efficiency1. Resource Node Tracking- How to mark resource nodes on the game's map using GatherMate.- Explanation of different node icons and colors and their significance.- Techniques to efficiently navigate and locate resource nodes using the addon's map functionality.2. Data Import and Export- Instructions on how to import and export resource node data using GatherMate.- Explanation of the benefits of sharing and exchanging data with other players.- Discussion on community-driven databases and how they can enhance the addon's effectiveness.3. Optimizing Gather Routes- Tips on planning and executing efficient gather routes for maximum productivity.- Guidelines for grouping resource nodes and creating customized routes using GatherMate's waypoint system.- Strategies for prioritizing resource nodes based on rarity, value, or personal needs.4. Understanding Respawn Timers- Explanation of resource node respawn timers and their impact on resource gathering.- How GatherMate's display of respawn timers can optimize collection efficiency.- Insights into factors that can influence respawn timers and how to utilize this information.ConclusionGatherMate is an essential tool for resource gathering enthusiasts in various games. By providing valuable information and efficient tracking functionalities, this addon streamlines the resource gathering process, saving players time and effort. With its user-friendly interface and customizable features, GatherMate empowers players to maximize their resource collection efficiency, ultimately enhancing their gameplay experience. So, if you are committed to gathering resources effectively, installing and utilizing GatherMate should be your next step.。

2024年耕地保护图斑核实工作部署会范文

2024年耕地保护图斑核实工作部署会范文

2024年耕地保护图斑核实工作部署会范文The Deployment Plan for Verification of Farmland Protection Plots in 2024Introduction:In light of the need to protect and manage farmland effectively, the deployment plan for verification of farmland protection plots in 2024 has been carefully formulated. This plan aims to ensure accurate data collection and assessment of the country's arable land resources. By implementing this plan, authorities can monitor changes in land use patterns, enforce proper land management practices, and address potential issues that may threaten food security.Procedure for Verification:To achieve comprehensive verification of farmlandprotection plots, a multi-step approach will be adopted. First, it is essential to establish clear criteria for identifying farmland protection plots based on factors such as land ownership, agricultural production activities, soilquality, and ecological functions. These criteria should be scientifically sound and practical to apply acrossdifferent regions.In the next step, competent authorities at various levels will be responsible for organizing field surveys to collect relevant information on these protection plots. The surveys should include detailed information about the size, location, and usage status of each plot. Furthermore, environmental indicators such as soil quality and biodiversity assessments should also be conducted during this process.Data Processing and Analysis:Once all required data is collected from the field surveys, it is crucial to process and analyze this information effectively. Utilizing advanced information technology systems will enable efficient data gathering and analysis at a larger scale. Geographic Information System (GIS)tools can assist in consolidating all collected data into comprehensive databases that allow decision-makers to visualize land-use changes accurately.Authorities should also consider employing remote sensing technology as an additional tool for monitoring farmland protection plots' status over time. Remote sensing data can provide valuable insights into spatial patterns and changes within designated areas without requiring extensive ground surveys.Quality Control Measures:To ensure accurate results throughout the verification process, strict quality control measures must be put in place. Standardized protocols should guide both field surveys and data processing. Training programs should be organized to equip personnel with the necessary skills and knowledge to perform accurate assessments.Moreover, regular checks and audits should be conducted by independent third parties to verify the accuracy and integrity of the collected data. This will provide an additional layer of assurance regarding the reliability of the gathered information.Reporting and Implementation:Once the verification process is complete, comprehensive reports showcasing the findings and analyses should be prepared. These reports will serve as valuable referencesfor policymakers and local authorities alike. Key issues, challenges, and potential solutions should be highlightedin these reports to facilitate effective decision-making.Based on the verification results, relevant authorities can develop targeted policies or interventions to address any identified issues threatening farmland protection. Close collaboration among government agencies, scientificresearch institutions, and local communities will help ensure successful implementation of these policies.Conclusion:The deployment plan for verification of farmland protection plots in 2024 plays a critical role in safeguarding China's arable land resources. Through a structured procedure for collecting and analyzing data, we can accurately assess changes in land use patterns, enforce proper land management practices, and protect food security effectively.By implementing this plan comprehensively, China canachieve sustainable development while ensuring sufficient agricultural production capacity for future generations.中文翻译:引言:为了有效保护和管理耕地,已经认真制定了2024年耕地保护图斑核实工作部署计划。

关于如何改善城市的英语作文

关于如何改善城市的英语作文

关于如何改善城市的英语作文Title: Enhancing Urban Environments: A Path Towards Sustainable and Livable CitiesIn the constantly evolving landscape of urban development, the quest for improved quality of life in cities has become a pressing issue. Across the globe, city planners, policymakers, and community members are striving to devise innovative strategies that can transform urban centers into sustainable, livable, and resilient hubs of human civilization. This essay aims to outline several crucial steps that must be taken to achieve such an objective, focusing on environmental sustainability, efficient infrastructure, enhanced public services, and fostering social cohesion.To begin with, environmental sustainability is the cornerstone upon which the future of our cities rests. It is imperative for urban areas to embrace green technologies and practices that reduce carbon footprints and promoteeco-friendly living. Implementing comprehensive recycling programs, investing in renewable energy sources such as solar and wind power, and creating green spaces like parks and community gardens are vital steps towards this goal. Moreover, stricter regulations on waste management and industrialemissions, coupled with incentives for sustainable business practices, can significantly improve air and water quality within urban boundaries.Efficient infrastructure is another essential component of enhancing urban environments. Modern cities require reliable and efficient public transportation systems that reduce congestion and pollution. Investing in mass transit networks, such as subways, light rails, and bus rapid transit systems, not only alleviates traffic issues but also provides affordable commuting options for all residents. Additionally, upgrading existing infrastructures—roads, bridges, and utilities—with a focus on durability and reduced maintenance costs can lead to long-term savings and improved resident satisfaction.Enhancing public services is equally important. Education, healthcare, and public safety are fundamental to the wellbeing of city inhabitants. Allocation of resources towards these sectors should be prioritized to ensure accessible andhigh-quality services for all. In the educational sector, investing in technology and teacher training can prepare students for the challenges of the future. In terms of healthcare, establishing community health centers and promoting preventive care can lead to a healthier population.Meanwhile, modernizing law enforcement techniques and technologies can increase efficiency and trust between the police and the community.Social cohesion is the glue that binds a city together. Promoting inclusivity, diversity, and cultural richness creates a vibrant urban atmosphere where everyone feels valued and respected. Community events, public art installations, and support for local businesses can strengthen the sense of belonging among residents. Furthermore, encouraging civic participation through initiatives like neighborhood watch programs or city planning forums can give residents a voice in shaping their environment, leading to more tailored and effective policies.Finally, it is paramount to recognize that no single solution fits all cities. The needs of a densely populated metropolis differ significantly from those of a medium-sized city. Tailored approaches that consider the unique characteristics of each urban area are necessary. Gathering data through surveys, utilizing technology to analyze urban patterns, and adapting strategies based on feedback and outcomes are crucial in ensuring that improvements are both relevant and effective.In conclusion, improving the quality of life in cities is amultifaceted endeavor that requires a collaborative effort from all stakeholders. By focusing on environmental sustainability, efficient infrastructure, enhanced public services, and fostering social cohesion, cities can move towards becoming models of livability and sustainability. It is through informed planning, community involvement, and continuous adaptation that urban environments can thrive in harmony with the needs of their inhabitants.。

蚂蚁分工介绍英文作文

蚂蚁分工介绍英文作文

蚂蚁分工介绍英文作文英文:Ants are amazing creatures that have a highly organized society and an efficient division of labor. Each ant has a specific role to play in the colony, and they work together to achieve their common goals. The division of labor in an ant colony is based on the ant's age, size, and abilities.For example, the worker ants are responsible for gathering food, caring for the young, and maintaining the nest. The soldier ants are responsible for protecting the colony from predators, while the queen ant is responsible for laying eggs and reproducing. Each ant has a specific job to do, and they do it with incredible efficiency.What's even more impressive is that ants communicate with each other using chemical signals called pheromones. These signals allow ants to coordinate their activities and work together as a team. For example, when a worker antfinds food, it leaves a trail of pheromones for other ants to follow, which leads them directly to the food source.Overall, the division of labor in an ant colony is a fascinating example of how teamwork and communication can lead to incredible efficiency and productivity.中文:蚂蚁是一种令人惊叹的生物,它们拥有高度组织化的社会和高效的分工合作。

调研软件英语作文模板

调研软件英语作文模板

调研软件英语作文模板英文回答:Software Survey: A Comprehensive Guide。

Introduction。

In the rapidly evolving world of technology, software plays a pivotal role in shaping our daily lives. From operating systems to business applications and entertainment platforms, software has become an indispensable part of modern society. To ensure efficient and effective software development, it is crucial to conduct thorough software surveys to gather valuable insights and make informed decisions.What is a Software Survey?A software survey is a systematic method of collecting information about software products, including theirfeatures, functionality, performance, and user experience. By conducting surveys, organizations can gain a comprehensive understanding of the software landscape, identify areas for improvement, and make strategic decisions regarding software selection and development.Types of Software Surveys。

advisory

advisory

advisoryAdvisory: An Essential Guide to Effective Decision-MakingIntroduction:In today's complex and rapidly changing business environment, companies and individuals face numerous challenges that require careful consideration and effective decision-making. This advisory document serves as a comprehensive guide to help individuals and organizations make informed decisions that align with their goals and objectives. By understanding the advisory process, leveraging diverse perspectives, and implementing best practices, one can enhance the quality and impact of their decisions.I. Understanding the Advisory Process:1.1 Defining the Role of an Advisor:An advisor plays a crucial role in providing guidance and support to individuals or organizations in making informed decisions. They bring expertise, experience, and a fresh perspective that enriches the decision-making process.Understanding the advisor's role is essential to leverage their expertise effectively.1.2 Identifying the Purpose of Advisory:Before seeking advisory services, it is crucial to identify the purpose and specific areas where guidance is needed. This clarity ensures that the advisory process is targeted, efficient, and effective.1.3 Establishing Trust and Confidentiality:Trust and confidentiality are the cornerstones of a successful advisory relationship. Creating an environment where open and honest discussions can occur fosters trust and encourages stakeholders to share sensitive information freely.II. Leveraging Diverse Perspectives:2.1 The Importance of Diverse Perspectives:In decision-making, diverse perspectives are invaluable. They challenge assumptions, introduce new ideas, and reduce blind spots. By actively seeking out diverse perspectives, individuals and organizations can enhance their decision-making abilities.2.2 Effective Stakeholder Engagement:Stakeholder engagement is crucial for informed decision-making. Engaging stakeholders in the decision-making process not only provides a broader range of perspectives but also fosters ownership and commitment to the decisions made.2.3 Encouraging Constructive Debate:Constructive debate is essential for robust decision-making. Encouraging stakeholders to express their views, challenge assumptions, and provide critical feedback promotes a healthy decision-making environment. It allows for a comprehensive evaluation and consideration of alternatives.III. Implementing Best Practices:3.1 Gathering and Analyzing Information:An important aspect of effective decision-making is the comprehensive gathering and analysis of relevant information. This process involves identifying reliable sources, evaluating data quality, and analyzing potential implications.3.2 Assessing Risk and Uncertainty:Decision-making often involves an element of risk and uncertainty. Conducting a thorough risk assessment, weighing the potential consequences, and considering alternative scenarios is essential for making informed decisions.3.3 Evaluating Alternatives and Impacts:Evaluating available alternatives and their potential impacts is critical for decision-making. Considering short-term and long-term effects, costs, benefits, and trade-offs enables individuals and organizations to select the most suitable option.3.4 Monitoring and Adapting:Effective decision-making extends beyond making a choice. Regular monitoring, evaluating outcomes, and adapting decisions based on new information or changing circumstances are essential for ensuring continued success.Conclusion:Making effective decisions is a critical skill in today's complex and fast-paced business environment. This advisorydocument has provided a comprehensive guide to making better decisions by understanding the advisory process, leveraging diverse perspectives, and implementing best practices. By following these guidelines, individuals and organizations can enhance their decision-making capabilities and achieve their desired outcomes. Remember, wise decisions are the foundation of long-term success.。

Innovative Approaches to Research

Innovative Approaches to Research

Innovative Approaches to Research Research is a fundamental aspect of human progress, driving innovation and discovery across all fields of study. As the world becomes increasingly complex and interconnected, traditional research methods are being challenged to keep pace with the rapid advancements in technology and the growing demands for moreefficient and effective ways of gathering and analyzing data. In response to these challenges, researchers are exploring innovative approaches to research that leverage new technologies, interdisciplinary collaboration, and creative methodologies to push the boundaries of knowledge and uncover new insights. One of the most exciting developments in research is the use of big data andartificial intelligence to analyze vast amounts of information and identify patterns and trends that would be impossible to detect using traditional methods. By harnessing the power of machine learning algorithms, researchers can quickly process and analyze data from diverse sources, enabling them to make more informed decisions and generate new hypotheses. This approach has revolutionized fields such as healthcare, finance, and marketing, where the ability to analyze large datasets has led to breakthroughs in disease diagnosis, risk assessment, and customer segmentation. In addition to big data and AI, researchers are also embracing interdisciplinary collaboration as a way to tackle complex problems that require expertise from multiple fields. By bringing together researchers with diverse backgrounds and skill sets, interdisciplinary teams can approach research questions from different perspectives, leading to more comprehensive and innovative solutions. This collaborative approach has been particularly effective in fields such as environmental science, where researchers from disciplines such as biology, chemistry, and engineering work together to address pressing environmental challenges such as climate change and biodiversity loss. Another innovative approach to research is the use of citizen science, which involves engaging members of the public in scientific research projects. By enlisting the help of volunteers to collect and analyze data, researchers can gather information on a scale that would be impossible to achieve with traditional research methods. Citizen science projects have been successful in fields such as astronomy, where volunteers have helped discover new planets and galaxies, as well as in ecology,where volunteers have monitored wildlife populations and tracked environmental changes over time. Virtual reality (VR) and augmented reality (AR) are also being used as innovative tools in research, allowing researchers to create immersive environments for data visualization and experimentation. By simulating complex scenarios in a virtual environment, researchers can study human behavior, test hypotheses, and explore new ideas in ways that would be difficult or impossible in the real world. VR and AR have been used in fields such as psychology, where researchers have used virtual environments to study phobias and PTSD, as well as in architecture and urban planning, where researchers have used VR to design and evaluate new buildings and city layouts. As researchers continue to push the boundaries of knowledge and explore new frontiers in their respective fields, it is essential that they remain open to new ideas and approaches to research. By embracing innovation and creativity, researchers can unlock new insights, challenge existing paradigms, and drive progress in ways that were previously unimaginable. Whether through the use of big data and AI, interdisciplinary collaboration, citizen science, or virtual reality, the future of research is bright and full of exciting possibilities for those willing to think outside the box and push the limits of what is possible.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Contributed PaperManuscript received April 15, 2010 Current version published 06 29 2010;Electronic version published 07 06 2010. 0098 3063/10/$20.00 © 2010 IEEEAn Efficient Data Gathering Routing Protocol in Sensor NetworksUsing the Integrated Gateway NodeSung-Hwa Hong, and Byong-Kug KimAbstract — In the future ubiquitous home network, sensorswill collect various home environment data in the home. Since the sensor nodes are equipped with small, often irreplaceable, batteries with limited power capacity, it is essential that the network be energy-efficient in order to maximize its lifetime. Our study, described in this paper, was divided into two classes: the primary class was to set a gateway-selection level and the secondary class was to propose an offer of a home automation using a routing technique centered on a sensor network to set a flooding level. The proposed scheme is to increase the life time of the sensor network with the integrated gateway node. The IGN increases the life time of the networkto integrate the multiple gateway nodes 1.Index Terms — Home Network, Wireless Sensor Networks, Sensor Routing, Home Automation, Zigbee.I. INTRODUCTIONWith the rapid advance in semiconductor production and communications technologies, the variety of consumer electronics used at home has been and continues to become digital. Developers of these digital home appliances have pursued providing their users with better services in the manner of interworking based on data communications, rather than having these devices operate independently. In this context, home networking plays a key role in these evolutionary processes. Wireless home networking is coming into the spotlight, as a consequence of the inconvenience of in-home hard wiring, and the convenience of wireless’ innate mobility, in spite of the presence of several proposed home-networking techniques. Technologies intended to implement wireless home networking include: IEEE 802.11 wireless local area network (LAN), Bluetooth, IEEE 1394, UWB(Ultra WideBand)-based wireless network, and ZigBee used primarily to control all kinds of home appliances. Currently, there are several ongoing studies on ubiquitous sensor networks for context-aware-based home services. However, we expect that wireless home networking based on the IEEE 802.11 wireless LAN and Bluetooth, which have been adopted almost universally due to their technical maturity, will be predominant in the foreseeable future.1 Sung-Hwa Hong is with the Dep. of Software Engineering, Dongyang Technical College, Seoul, Korea. (email: shhong@dongyang.ac.kr)Byoung-Kug Kim is with the Dep. of Electronics and ComputerEngineering, Korea University, Seoul, Korea. (email: dearbk@final.korea.ac.kr)As mobile communication devices and communicationtechnology are developing, the demand for wireless communication network on a small scale besides existing network of infra-structure. Especially, the need for wireless network on a small scale is increasing in environments such as inside buildings and mountain area, where wired facilities are unavailable. Wireless sensor network is one example. Unlike network of infra-structure, there is no router that relays packet transport in wireless sensor, but each sensor node performs both the roles of host and router. Since the transport range of each node's wireless frequency is limited in wireless sensor network, there are times when event packets are unavailable tobe sent from the start node to the end node. In such case, eventpackets are transported via multiple sensor nodes that work asa router. Such method is called multi-hop and routing protocol is required for multi-hop method in wireless sensor network. The most important thing in wireless sensor network is an efficient energy use in network environment and there are efficient routing and MAC protocols introduced. Routing can be largely classified into flat structure and hierarchical structure. In hierarchical structure, although energy data-aggregation and data-aggregation is very efficient as well as in-network processing is easy, there are problems that the overhead to make hierarchical structure is large and hierarchical structure is not maintained and needs to be created again because energy use is focused on nodes like cluster head. In addition, it is energy-efficient because all sensor nodes are not used in communication but it intensively uses energy because of a large amount of data processing in header node as well as it is hard to synchronize between header node and other nodes. Flat-structure Routing Protocol has easier multi-hop communication than hierarchical structure and each sensor node uses even amount of energy because there are no nodes that intensively use energy like cluster header in hierarchical structure. However, it is energy-inefficient than hierarchical structure because there are frequent packet collisions if event packets for Interest take place a lot and the number of re-transports increases due to the loss through multi-hop and all sensor nodes are always used tocommunicate. And there is also a problem that each node uses a lot of energy since sensor nodes installed in the same area all perform sensing as well as most flat-structure protocols have to have all sensor nodes in network routable for communication. Therefore, in this study, a method to make energy use efficient with router protocols of cluster concept and flat-structure that put a multiple sensor nodes in one group withoutchanging the purpose and function of existing network and performance analysis for the method is conducted.In Section II, we describe related works. In Section III, we describe our system model, and in Section IV, we present detailed operation of the proposed algorithm. Finally, we give concluding remarks in Section V.II.RELATED WORKSSupporting the mobility of sensor nodes is one of the most important factors to enable ubiquitous sensor networks, since mobile wireless sensor nodes can be attached to the human body, vehicles, and other mobile objects. So, the network layer should be implemented with the viewpoint of an efficient routing algorithm for wireless mobile sensor nodes [6]-[9].To efficiently maintain the routing path between a sink node and sensor nodes, various routing algorithms have been proposed. The hierarchical routing algorithm is one of them. Typical hierarchical routing algorithms are LEACH and LEACH-C.Direct communication is the simplest and the most intuitive way to send and collect sensor data. In a direct connection, each sensor sends data to the base station directly. It is simple, but may consume a large amount of energy for nodes further away from the base station. Based on the first order radio model, the energy drains more rapidly as the distance from the base station grows.Low-Energy Adaptive Clustering Hierarchy (LEACH) [3] divides the entire network into clusters. Each cluster has a cluster head. Nodes in each cluster send their data to the cluster head. The cluster head then collects the data and relays it to the base station. Each cluster uses different CDMA codes to avoid collisions.LEACH is a branch-based protocol, which is simple and scalable. However, this protocol is not very energy efficient for nodes. Besides, the radio of cluster heads must be turned on all the time to receive packets from the nodes in its cluster. This drains power more rapidly.In contrast to LEACH, Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [4] organizes the sensor nodes by a single chain. Messages are sent hop-by-hop along the chain starting with the node farthest away from the base station. PEGASIS is often referred to as a chain-based protocol.The main advantage of PEGASIS protocol is the small total energy dissipation as nodes only need to communicate with their neighbors. However PEGASIS assumes every node has the global knowledge of the other nodes, which is not feasible. The delay also gets longer when the chain grows longer.III.THE SYSTEM MODELIn most cases, it is reasonable to assume that the sensor nodes have fixed and relatively short transmission range. In this case, an energy-efficient multi-hop routing mechanism is essential, and cluster organization becomes more complex than in the single-hop condition stated above. Efficient clustering algorithms for WSN have to satisfy several requirements, such as:1. Clusters should cover entire sensor field.2. Average cluster size should be as large as possible tomaximize data aggregation efficiency.3. The clusters should be repeatedly reorganized to balanceenergy consumption among the nodes.4. Clustering overhead should be small.5. Clustering algorithm should be simple enough to beperformed by low performance processor with small available memory space.Clustered structure of a network is very beneficial to energy conservation as shown in [10]. The benefit comes from the data aggregation of cluster heads. Aggregation efficiency increases as more data packets are aggregated. This benefit, however, is limited in multi-hop networks since cluster size is limited by the radio transmission range of the nodes. On the other hand, clustering overhead increases since clustering becomes more complex. The complexity comes mainly from the following two reasons: First, in multi-hop networks, it is difficult to re- cluster in a synchronized way as in single-hop networks. Second, when one cluster is reorganized, i.e. the role of a cluster head shift from one node to another, physical region the cluster head covers is also changed. This may necessitate reorganization of other clusters to satisfy the above requirements 1 and 2. These two requirements are for efficiency of the clusters. To better satisfy these requirements, however, more signaling and processing is required. But, requirements 4 and 5 prevent increasing the overhead and complexity.Requirement 3 says that the clustering overhead should be continually generated for fair energy consumption among the nodes. Moreover, if the nodes have mobility, clustering overheads will be far more increased. Thus, the benefit of clustering can be cancelled by the clustering overhead. In single-hop networks node mobility does not affect any network operation as long as the node does not move out of the transmission range of any other node. Among many of the previous researches, the network models for hierarchical protocols for WSNs are single-hop networks in [10-12] and those for flat routing protocols are multi-hop networks [13-14]. Clustering complexity in multi-hop networks can be one explanation for this research trend in sensor networks.We consider for the following network and application model.1. A lot of sensor nodes are dispersed randomly on aninterested region.2. Sink nodes are placed at some convenient places in ornear the sensor field. The users can get theinformation from the sensor field and control itthrough the sink nodes by direct or remote access toit. Thus the sink nodes should have user interface orcapabilities to communicate with remote users withhigh powered radio or wired connection. The numberof sink nodes is very small compared with thenumber of sensor nodes. Thus they can have specialcapability, battery with larger capacity or externalpower supply.3. The sensor nodes have limited processing andcommunication capabilities in order to satisfy thelow-cost condition. Thus very complex and/or energyconsuming algorithm is difficult to be adopted.4. All the sensor nodes have the same constanttransmission ranges.5. Users request data from the sensor network bydisseminating query packets through the sink nodes.And, the data sensed from each node is gathered bysink nodes through cluster heads so that users canaccess it through the sink nodes.IV.IGCP—A I NTEGRATED G ATEWAY-NODE C ONTROLP ROTOCOLAlthough the hierarchical structure is energy-efficient and great in data-aggregation as well as in-network processing is easy, the hierarchical-structure cannot be maintained for a long time and needs to be created again because of intense energy use in nodes like cluster head. The flat-structure has easier multi-hop communication that the hierarchical-structure and allows even energy use of each node. However, the most important aspect of wireless sensor network, energy use, is very inefficient because all sensor nodes should always be used for communication. This study suggests the IGN (Integrated Gateway Node) Algorithm to compensate the vulnerability of two structures. It is an Algorithm in which virtual gateway nodes consisting of several nodes like the cluster of hierarchical-structure routing protocol and allows the flat-structure routing protocols between virtual nodes.A. The initial flooding process:Routing information is flooded from the sink nodes. The procedure of each node to set the routing information for each sink node is similar to the distance vector algorithm. In the routing information packet, the number of hops to a specific sink node and the address of transmitting node are included. When a node receives routing information from a neighbor node, it increases the number of hops by one and uses the number as its own number of hops to the sink node, and then, retransmit this information with its own address. When different number of hops is received from different neighbor nodes, the smallest number of them is used. If a node receives smaller number after it has retransmitted routing information, the smaller number should be again retransmitted to correct the propagated errors. Through this procedure, each node can know its own number of hops to a specific sink and the address of the next hop node to the sink.B.Clustering:The initial clustering occurs during the initial routing information distribution. In a routing information packet, energy state information of the transmitting node should be included. When a node has transmitted routing information, every neighbor of the node, except those who have previously transmitted the information, will retransmit the information. The node can gather information about the energy states of every neighbor node with the routing information packet, and compare them with its own energy state. When a node has found that it has the local maximum amount of energy, it becomes cluster head and broadcast a cluster head advertisement (CHAD) message to its neighbors. Before a node decides to be a cluster head, it has to wait for a sufficient time to gather the energy state information from all the neighbor nodes. The nodes that decided not to be a cluster head wait for a CHAD message from any other node. If a node waiting for a CHAD message cannot receive one for a pre-determined time period, it repeats the exchange procedure of energy state information with other nonaffiliated nodes. This procedure is repeated until every node is affiliated with one cluster head. Any nonaffiliated node affiliates with the node whose CHAD massage it first receives.C.Gateway-Selection:One cluster head has one gateway node to a sink node. A gateway node is selected by cluster head among the nodes which are one hop closer to the sink node right after the cluster head is elected. The gateway node may be or not be a cluster member of the cluster head which selects it as a gateway. A cluster head sends a gateway selection (GWS) message to a selected gateway node, and thus the selected node can know whose gateway it is. Query dissemination from a sink node and data gathering to a sink node is performed through cluster heads and gateway nodes.D.Integrated Gateway nodeAlthough the hierarchical structure is energy-efficient and great in data-aggregation as well as in-network processing is easy, the hierarchical-structure cannot be maintained for a long time and needs to be created again because of intense energy use in nodes like cluster head. The flat-structure has easier multi-hop communication than the hierarchical-structure and allows even energy use of each node. However, the most important aspect of wireless sensor network, energy use, is very inefficient because all sensor nodes should always be used for communication. This study suggests the IGN (Integrated Gateway Node) Algorithm to compensate the vulnerabilities of two structures. It is an Algorithm in which virtual gateway nodes consisting of several nodes like the cluster of hierarchical-structure routing protocol and allows the flat-structure routing protocols between virtual nodes.E. Link setting Cluster head advertisement (CHAD) is largely classified into the busy status and static status. The busy status is a status in which IGN is operating as IGNH(Integrated Gateway Node Head) and the static status is a status in which IGN is operating as IGNM(Integrated Gateway Node Member) because there is no need of the IGNH role. The busy status occurs when different IGN's are created, adjacent IGN's are newly created, or the routing table of adjacent IGN's is changed. It also becomes the busy status when it is short of IGNM nodes and needs to borrow IGNM nodes from IGN with many IGNM nodes. In the busy status, IGNM does not play the role of IGNM node but plays the IGN role only and always stays awaken. IGNH in the busy status has many roles thus it does not play any role for data communication but only works for Control Signal Communication. It is to even out the energy use of all sensor nodes within virtual nodes. The staticstatus occurs when IGNH does not have any controlcommunication signals between IGNH's during thecommunication period of IGN. The communication period isas shown Picture 4.5 and consists of Frame and Sync. Frameis the time for virtual nodes to communicate and Sync is thetime for schedule re-configuration and error process. Sync is alot shorter than Frame. IGNH does not have many roles in thestatic status and IGNH works as IGNM node.Once the initialization level is over and virtual nodes arecreated, it becomes the busy status of Gradient Level. Theoperations that require IGNM transport between virtual nodes orIGNH information take place. In the first busy status, it does notmove on to the static status until a routing table is created.Although Routing Table Configuration take place whensending query or broadcasting just like other flat-structureprotocols, there is a bit of difference in the configurationmethod. If virtual nodes receive query or packets inbroadcasting, it first checks that received nodes are receivedwith less than one-half power of the transport distance. Arouting table is created if the nodes are received with morepower and it is ignored otherwise. Also, routing table information is saved up to 2 hops of virtual nodes. The reason that virtual nodes require receiving power is because of the communication limit mentioned earlier. In fig.1, the process of the integrated gateway node initialization shows. Node B operates as IGNH, node A and C are operates as IGNM.Node A Node BNode C4F. Flooding level Above all, once cluster formation has been completed, the flooding process is not executed. Based on the level acquiredthrough flooding, nodes piggyback their own levels in the data transmitted to update them. This level-updating process is seen in Fig. 2.(a) (b) (c)Fig. 2 The level-updating procedure.In this figure, (a) indicates the levels of child nodes ifthe root (or parent) node equals level 1. This figure showsavailable connections between individual nodes and rootor child nodes. However, in the event that the node withlevel 3 malfunctions, of child nodes detecting that, thenode whose upstream connection has relied only on aconnection with the faulty node finds out a node with thehighest-layer level, i.e., with the lowest level value amongits adjacent nodes. This node, then, sets its own level tothe result of adding 1 to the existing level. Theseprocesses are happen for a level update. The processes(a), (b), and (c) represent level-dependent datatransmission from usual low-layer sensor nodes to a high-layer gateway node.G. Data transmission Once a cluster has been formed, as a rule, all of its operations are controlled by the gateway node. The information, detected and obtained in the cluster, is transmitted to the gateway node. Then, the gateway node transmits the data via data aggregation to the relay node. Next, the relay node simply transmits the data to a selected upper link. This facilitates significantly in setting upper links. Mostinterestingly, the upstream nodes of a cluster go towards thesink node.IV. A Performance Evaluation We create a simulator with C++and make sensor nodes as one class object. Each class contains a handler that processeseach event and operates differently according to the type of the handler. It is also possible for the class which represents sensor nodes to create virtual nodes proposed in this study andapply operation algorithm. Packets are also a class object and inherit events to be configured. There are various types depending on packet's function and packets are processed in the node object. An arbitrary node object is selected, and if the object is in inactive status or is already a member of other virtual node then next object is selected. If the selected object is not a member of virtual node or in inactive status, algorithm defined in the node object is performed. With a repetition of such process, virtual node algorithm is applied till all node objects are selected. Data of sensor field with virtual nodes created are set to take place in Sync node. The packet type can be either 'interest' or 'query' depending on the flat=structure routing protocol and the size can be changed to be suitable for application. Also, packets can be transported in a certain period of time in CBR method. We will look at the applied parameter values for simulation.Fig. 3 Our simulator program.This simulation analyzes the energy amount used when existing routing protocols are operating and the energy amount used after the algorithm suggested in this study isapplied. This simulation does not consider the energy amountused in the initialization level to create virtual nodes. It is because it is a very small energy amount comparing to the total energy amount used.D i s s i p a t e d e n e r g y i n t h e s e n s o r n e t w o rk (J o u l e )Simulation time(sec)Fig. 4 The simulation results of the energy comparison between GeneralFlooding.D i s s i p a t e d e n e r g y i n t h e s e n s o r n e t w o r k (J o u l e )Simulation time (sec)Fig. 5 The simulation results of the energy comparison between SPIN.In this simulation, one 1024-byte packet is created in Syncand, this packet is sent to entire network and the energy used in the process is analyzed. The routing protocols used are Flooding and Spin. Parameters used in Verse 5.1.2 are used to experiment under the same condition as other simulations. The figure 4 shows the energy comparison between General Flooding in which virtual node algorithm is not used and Flooding via Virtual Node in which virtual node algorithm is applied. As shown in the figure 4, there is up to 55% of energy saving effect when the IGN algorithm is applied. Also, the energy efficiency is increasing in a long run. The figure 5 is when Spin algorithm is applied in the same way. Theenergy used is different by the size of meta-data because Spinhas a lot of meta-data. This simulation sets the size of meta-data to 32 bytes. Like Flooding, Spin protocol (Spin via virtual node) [15]with virtual node algorithm suggested in this study shows up to 32% of energy saving effect. V. C ONCLUSION Many ways of energy-efficient routing for wireless sensor network are suggested and are largely divided into the hierarchical-structure algorithm and flat-structure algorithm.Each algorithm has own advantages and disadvantages.This study suggests a mixed algorithm with virtual gateway nodes, which includes both the advantages ofexisting hierarchical-structure algorithm and flat-structure algorithm in wireless sensor network. The suggestedalgorithm communicates with application of flat-structure typeprotocols after bundling up several nodes like the hierarchical-structure cluster and making them work as one node. Virtualgateway node algorithm allows efficient energy managementsince it not only increases the energy efficiency which isconsidered important in wireless sensor network but alsocreates virtual nodes. In addition, various applications can berealized. It also makes up the disadvantages of existinghierarchical-structure routing protocols by allowing even energy use of each node as well as performing dataaggregation and in-network that are characterized in existing sensor network routing protocols.The algorithm suggested in this study allows easily to create virtual nodes with simple MAC protocols since control signals that create virtual nodes are not complicated and also allows smooth packet flows since not many sensor nodes are used for communication and there are less packet collisions and less re-transports. But, it is not possible to use the algorithm in environments with sensor nodes in which RSSI is not supported because RSSI is needed to create virtual nodes and form routing tables.As analyzed in the simulation, it shows a great performance in energy use and does not use a lot of energy to create virtual nodes. It is more efficient in long-distance transport environments.The algorithm suggested in this study is expected to be used in a number of application fields of sensor network since it has many characteristics and advantages. However, it will be efficient only in the environments suggested in this study, which is only a small part of many application fields of sensor network. In the future, it will be necessary to have more studies on many types of algorithm that can work in many more application fields with more efficient energy use if we look at infinite possibilities of sensor network used in numerous fields with numerous environment and application factors.R EFERENCES[1]I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wirelesssensor networks: a survey," Computer Networks 38 (2002)[2]Praveen Rentala, Ravi Musunnuri, Shashidhar Gandham, Udit Saxena,"Survey on Sensor Networks"[3]W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks"Proceedings of the Hawaii International Conference on System Science, ,page 1-10, Jan, 2000.[4]S. Lindsey and C. S. Raghavendra, "Pegasis: Power-efficient gatheringin sensor information systems," in IEEE Aerospace Conference, March 2002.[5]K. Du, J. Wu, and D. Zhou, "Chain-based protocols for databroadcasting and gathering in sensor networks," in Proceedings of Workshop on Parallel and Distributed Scientic and Engineering Computing with Applications (in conjunction with IPDPS), April 2003. [6] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: AScalable and Robust Communication Paradigm for Sensor Networks,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 2000. [7]J. Kulik, W. R. Heinzelman, and H. Balakrishnan, “Negotiation-BasedProtocols for Disseminating Information in Wireless Sensor Networks,”ACM Wireless Networks, vol. 8, no. 2-3, pp. 169–185, 2002.[8]K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for Self-Organization of a Wireless Sensor Network,” IEEE Personal Comm.Mag., vol. 7, no. 5, Oct. 2000.[9]Z. Haas and S. Tabrizi, “On Some Challenges and Design Choices inAd-Hoc Communications,” in IEEE MILCOM’98, October 1998.[10]Huseyin Ozgur Tan, Ibrahim Korpeoglu, "Power Efficient DataGathering and Aggregation in Wireless Sensor Networks", ACM SIGMOD Record, Vol. 32, No. 4, Pages 66-71, December, 2003.[11] A. Manjeshwar, D. P. Agrawal, "TEEN: a routing protocols forenhanced efficiency on wireless sensor networks." International Proceedings of 15th Parallel and Distributed Processing Symposium, page 2009-2015, 2001[12] A. Manjeshwar, D. P. Agrawal, "APTEEN: A Protocol for EfficientRouting and Comprehensive Information Retrieval in Wireless Sensor Networks," Proceedings of the 2nd Int. Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2002[13] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: AScalable and Robust Communication Paradigm for Sensor Networks,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 2000.[14]J. Kulik, W. R. Heinzelman, and H. Balakrishnan, “Negotiation-BasedProtocols for Disseminating Information in Wireless Sensor Networks,”ACM Wireless Networks, vol. 8, no. 2-3, pp. 169–185, 2002.[15]W. R. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive Protocolsfor Information Dissemination in Wireless Sensor Networks," Proc.ACM MobiCom '99, Seattle, WA, 1999, pp. 174-85.BIOGRAPHIESSung-Hwa Hong received his B.S.degree in ComputerScience from Seoul, Korea University, 1996 and his M.S.degrees in Information and Communication Engineeringfrom Hankuk Aviation University, in 2002. Since 2002, hehas been in the Ph.D program in Electronics and ComputerEngineering at Korea University, Seoul, Korea. Hisresearch interests include the Home Network, WLANs, ad-hoc networks.Byoungguk Kim received his B.S. degree in ComputerEngineering from Won Kwang University, Iksan, Korea,2002, and his M.S. degree in Electronics and ComputerEngineering from Korea University, Seoul, Korea, 2004.Since 2004, he has been in the Ph.D program in Electronicsand Computer Engineering at Korea University, Seoul,Korea. His research interests include Bluetooth, embedded-system, ad-hoc and sensor networking, and ubiquitous computing.。

相关文档
最新文档