Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (8): 13-15    DOI:
Current Issue | Archive | Adv Search |
Sink Node Location Optimization for WSNs Based on Improved Three Chain Hybrid Genetic Algorithm
Liu Yan
Jiaying University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In the design and layout of Wireless Sensor Networks (WSNs), multiple Sink node locating is the key step in network topology. It is very important to control energy-consumption of network communication. By analyzing the layout of Sink node model, an improved three chain hybrid genetic algorithm is proposed to solve the Sink node’s optimal location problem. The experimental results show that compared with the enumeration algorithm, the three chain hybrid genetic algorithm for the Sink node has better solutions and higher efficiency of the algorithm, which can reduce the energy consumption of wireless sensor networks and improve the network performance.
Key wordswireless sensor networks (WSNs)      Sink node locating      three chain hybrid genetic algorithm     
Published: 13 November 2017
ZTFLH:  TP393  

Cite this article:

Liu Yan. Sink Node Location Optimization for WSNs Based on Improved Three Chain Hybrid Genetic Algorithm. Computer & Telecommunication, 2016, 1(8): 13-15.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I8/13

[1] LI Jia-Qi SU Li-na. Research on Science and Technology Information Service platform of Comprehensive Sci-tech Journals based on Mobile Interconnection and its Architecture[J]. 电脑与电信, 2019, 1(6): 42-46.
[2] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] FANG Yong. Research on the IPv6 Remote Network Monitoring and Communication System[J]. 电脑与电信, 2019, 1(3): 62-65.
[6] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[7] Wang Gang. A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow[J]. 电脑与电信, 2018, 1(12): 70-73.
[8] CHEN Si-qi. Fine Grained Image Localization Based on Bilinear Convolutional Neural Network [J]. 电脑与电信, 2018, 1(11): 78-80.
[9] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[10] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
[11] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[12] ZHANG Yun. Design of Intelligent Supervision and Evaluation System Based on Cloudview[J]. 电脑与电信, 2018, 1(4): 43-46.
[13] FANG Zi-ling, KUANG Fang-jun. Data Analysis on NetEase Ballad Lyrics Based on Python[J]. 电脑与电信, 2018, 1(4): 53-56.
[14] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[15] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd