Decentralized Distribution Update Algorithm Based on Compressibility-controlled Wireless Sensor Network

نویسندگان

  • Hehua Li
  • Chunling Wu
  • Wei Wei
  • Buddha Khoukhi
چکیده

Sensor network adopts the lossy compression techniques to collect long-term data, analyze the data tendency and the interested specific data model. In these applications, the sensor is established to collect large numbers of continuous data, and allow the access to the lossy and untimely data. In addition, the neighbor sensor data is correlated both in time and in space. Therefore, the data sensed by the sensor itself in the intermediate node and the data will be lossy compressed for prolonging the system operation lifetime. To study the optimal distributed problem of the bite-rate and the lossy degree. When the optimal distribution problem between the bit-rate and the lossy degree is discussed, how to make the optimal decision distributes the compressibility of all sensors in the satisfaction of the acceptable data distorted condition. For adopting the minimum transmittal bit-rate to collect the top-quality data. The optimal solution is introduced for the distribution problem, and the decentralized distribution algorithm is introduced in terms of the optimal solution. Compared with the average distribution strategy, the simulation result shows that the optimal solution and the decentralized actually can reduce large numbers of the network transmittal data volume.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A multiple criteria algorithm for planning the itinerary of mobile sink in wireless sensor networks

The mobile sink can increase the efficiency of wireless sensor networks. It moves in a monitored environment and collects the network nodes information. Thus, by the sink we can balance the power consumption and increases the network lifetime. Determining path of the sink's movement is usually modeled as an optimization problem where finding optimal solutions require collecting value of all the...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Energy optimization based on routing protocols in wireless sensor network

Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this ...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013