Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2456-2459.DOI: 10.11772/j.issn.1001-9081.2014.09.2456
• Network and communications • Previous Articles Next Articles
Received:
2014-03-24
Revised:
2014-05-21
Online:
2014-09-30
Published:
2014-09-01
Contact:
NAN Jing
孙毅,南婧,武昕,陆俊
通讯作者:
南婧
作者简介:
基金资助:
国家科技重大专项基金资助项目;中央高校基本科研业务费专项资金资助项目
CLC Number:
SUN Yi NAN Jing WU Xin LU Jun. Cluster-based and energy-balanced time synchronization algorithm for wireless sensor networks[J]. Journal of Computer Applications, 2014, 34(9): 2456-2459.
孙毅 南婧 武昕 陆俊. 基于簇的能量均衡无线传感器网络时间同步算法[J]. 计算机应用, 2014, 34(9): 2456-2459.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2456
[1]REN F, HUANG H, LIN C. Wireless sensor networks [J]. Journal of Software, 2003, 14(7): 1282-1291. (任丰原,黄海宁,林闯.无线传感器网络[J].软件学报, 2003, 14(7): 1282-1291.)
[2]ELSON J, GIROD L, ESTRIN D. Fine-grained network time synchronization using reference broadcast [C]// Proceedings of the Fifth Symposium Operating Systems Design and Implementation. New York: ACM, 2002, 147-163.
[3]GANERIVAL S, KUMAR R, SRIVASTAVA M B. Timing-sync protocol for sensor networks [C]//. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. New York: ACM, 2003:138-149.
[4]PING S. Delay measurement time synchronization for wireless sensor networks, IR-TR-64 [R]. Intel Research Centre, 2003.
[5]MAROTIM M, KUSY B, SIMON G, et al.The flooding time synchronization protocol [C]// Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. New York: ACM, 2004:39-49.
[6]NI Z, YAO F, ZHANG L, et al.Improved average time synchronization algorithm in wireless sensor networks [J]. Computer Technology and Development, 2013, 23(5):42-46. (倪泽宇,姚放吾,张磊,等.改进的无线传感器网络平均时间同步算法[J].计算机技术与发展,2013,23(5):42-46.)
[7]QI H, WANG H, LIU J, et al.Changeable cycle for improvement based on the Bayes estimation of the TPSN algorithm [J]. Chinese Journal of Sensors and Actuators, 2013,26(3):407-410. (齐华,王恒,刘军,等.可变周期的基于贝叶斯估计的TPSN改进算法[J].传感技术学报,2013,26(3):407-410.)
[8]SHI C, QIU H, CHEN D, et al.Simple distributed time synchronization scheme for wireless sensor networks [J]. Journal of Xidian University: Natural Science Edition, 2013,40(1):93-99,147. (师超,仇洪冰,陈东华,等.一种简单的分布式无线传感器网络时间同步方案[J].西安电子科技大学学报:自然科学版,2013,40(1):93-99,147.)
[9]GAUTAM G C, SHARMA T P, KATIYAR V, et al.Time synchronization protocol for wireless sensor networks using clustering [C]// Proceedings of the 2011 IEEE International Conference on Recent Trends in Information Technology.Piscataway:IEEE,2011:417-422.
[10]GUAN X, ZHANG X, LIU Z. Low-power clustering-based time synchronization mechanism for multi-hop WSN [J]. Computer Engineering, 2010,36(9):111 -113. (关新平,张晓静,刘志新.基于分簇的低功耗多跳WSN时间同步机制[J].计算机工程, 2010,36(9):111 -113.)
[11]LI Y, WANG Y. Cluster-based energy-efficient time synchronization algorithm for wireless sensor networks [J]. Transducer and Microsystem Technologies, 2013,32(7):109-112. (李玉飞,王玉秀.基于分簇的高能效无线传感器网络时间同步算法[J].传感器与微系统,2013,32(7):109-112.)
[12]XU S, WANG P, HUANG X, et al.Design of clustering time synchronization algorithm in wireless sensor networks [J]. Journal of Fujian Normal University: Natural Science Edition, 2012,28(1):38-40. (徐世武,王平,黄晞,等.无线传感器网络中分簇时间同步算法的设计[J].福建师范大学学报:自然科学版,2012,28(1):38-40.) |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||