Advanced Search
Volume 29 Issue 12
Jan.  2011
Turn off MathJax
Article Contents
Changhong CHEN, Tengfei PENG, Zongliang GAN. Aurora Image Classification and Retrieval Method Based on Deep Hashing Algorithm[J]. Journal of Electronics & Information Technology, 2020, 42(12): 3029-3036. doi: 10.11999/JEIT190984
Citation: Tian Le, Xie Dong-liang, Ren Biao, Zhang Lei, Cheng Shi-duan. Routing Void Problem of Greedy Forwarding Strategy in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2007, 29(12): 2996-3000. doi: 10.3724/SP.J.1146.2006.00672

Routing Void Problem of Greedy Forwarding Strategy in Wireless Sensor Networks

doi: 10.3724/SP.J.1146.2006.00672
  • Received Date: 2006-05-16
  • Rev Recd Date: 2006-10-16
  • Publish Date: 2007-12-19
  • Greedy Forwarding (GF) is an important routing strategy among those routing protocols based on location information in Wireless Sensor Networks (WSN). But there is routing void problem while using greedy forwarding. This paper deduces the probability of a node to be a routing void node theoretically within deterministic deployment and random deployment WSNs, and get the probability of encountering the routing void node while setting up a path randomly. From the analysis the conclusion can be come that when the average number of neighbors is greater than 10, the modified GF algorithm with backoff method is good enough to meet the requirement of WSN applications.
  • Ward A, Jones A, and Hopper A. A new location technique for the active office. IEEE Personal Communications, 1997, 4(5): 42-47.[2]Savvides A, Han Chih-Chieh, and Strivastava M B. Dynamic fine-grained localization in ad hoc networks of sensors. In Proceedings of the Seventh ACM Annual International Conference on Mobile Computing and Networking, ROME, Italy, 2001: 166-179.[3]Bulusu N, Heidemann J, and Estrin D. Gps-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 2000, 7(5): 28-34.[4]Priyantha N B, Chakraborty A, and Balakrishnan H. The cricket location-support system. In Proceedings of the ACM Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000: 32-43.Karp B and Kung H T. GPSR: Greedy Perimeter Stateless Routing for wireless networks. In Proceedings of the Sixth ACM Annual International Conference on Computing and Networking, Boston, MA, 2000: 243-254.[5]Bose P, Morin P, and Stojmenovic I, et al.. Routing with guaranteed delivery in Ad hoc wireless networks. In Proceedings of Discrete Algorithms and Methods for Mobility, Seattle, 1999: 48-55.[6]Datta S, Stojmenovic I, and Wu J. Internal node and shortcut based routing with guaranteed delivery in wireless networks. In Proc. of IEEE International Conference on Distributed Computing and Systems Workshops, Phoenix, AR, 2001: 461-466.[7]Kuhn F, Wattenhofer R, and Zollinger A. Worst-case optimal and average-case efficient geometric Ad-Hoc routing. In Proceedings of the Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, Maryland, 2003: 267-278.Kuhn F, Wattenhofer R, and Zhang Y, et al.. Geometric Ad hoc routing: of theory and practice. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing, Boston, 2003: 63-72.[8]Toussaint G. The relative neighborhood graph of a finite planar set[J].Pattern Recognition.1980, 12(4):261-268[9]Gabriel K and Sokal R. A new statistical approach to geographic variation analysis[J].Systematic Zoology.1969, 18:259-278[10]Xing Guoliang, Lu Chenyang, and Pless R, et al.. On greedy geographic routing algorithms in sensing covered networks. In Proceedings of the Tenth ACM Annual International Conference on Mobile Computing and Networking, Tokyo, Japan, 2004: 31-42.[11]Bettstetter C, Hartenstein H, and Perez-Costa X. Stochastic properties of the random waypoint mobility model: epoch length, direction distribution, and cell change Rate. In Proceedings of the Fifth ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Atlanta, GA, 2002: 7-14.Mainwaring A, Polastre J, and Szewczyk R, et al.. Wireless sensor networks for habitat monitoring. In Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, 2002: 88-97.[12]Szewczyk R, Mainwaring A, and Polastre J, et al.. An analysis of a large scale habitat monitoring application. In Proceedings. of the Third ACM Conference on Embedded Networked Sensor Systems, Baltimore, MD, 2004: 214-226.[13]Tolle G, Turner N, and Tu K, et al.. A macroscope in the redwoods. In Proc. of the Fourth ACM Conference on Embedded Networked Sensor Systems, San Diego, CA, 2005: 51-63.
  • Cited by

    Periodical cited type(11)

    1. 刘传升,丁卫平,程纯,黄嘉爽,王海鹏. ViTH:面向医学图像检索的视觉Transformer哈希改进算法. 西南大学学报(自然科学版). 2024(05): 11-26 .
    2. 赵永晖,胡海根. 基于子空间关系学习的跨模态哈希检索方法. 计算机应用与软件. 2024(10): 304-313 .
    3. 蒋伟进,孙永霞,朱昊冉,陈萍萍,张婉清,陈君鹏. 边云协同计算下基于ST-GCN的监控视频行为识别机制. 南京大学学报(自然科学). 2022(01): 163-174 .
    4. 宋志平,朱亚俐,吾尔尼沙·买买提,库尔班·吾布力. 一种海量图像下的高精度特征检索算法. 计算机仿真. 2022(04): 185-188+302 .
    5. 李然,杨玉婷,张志强,刘鹰,黄健隆,李浩淼. 智能鱼类信息共享平台的构建. 大连海洋大学学报. 2022(03): 497-504 .
    6. 汤德林. 一种图像降重系统在近视治疗仪故障检测中的实现. 信息记录材料. 2022(08): 59-62 .
    7. 张壮领,陈彩娜,毕明利. 基于ARM+FPGA方案的便携式智能勘灾设备的设计. 工业仪表与自动化装置. 2021(03): 55-60 .
    8. 袁浩. 基于深度字典学习的图像分类方法. 信息与电脑(理论版). 2021(12): 55-57 .
    9. 高晶,曹福凯,闫明,Muhd Khaizer Omar. 信息相似性下网络对抗文本重复数据分级索引. 计算机仿真. 2021(10): 462-465+470 .
    10. 顾广华 ,霍文华 ,苏明月 ,付灏 . 基于非对称监督深度离散哈希的图像检索. 电子与信息学报. 2021(12): 3530-3537 . 本站查看
    11. 杨月. 数字图书馆交互式信息分类检索模型设计. 科技通报. 2021(12): 112-116 .

    Other cited types(8)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3876) PDF downloads(1412) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return