2009 International Symposium on Computer Network and Multimedia Technology 2009
DOI: 10.1109/cnmt.2009.5374811
|View full text |Cite
|
Sign up to set email alerts
|

Chain Routing Based on Coordinates-Oriented Clustering Strategy in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…The long chain in PEGASIS causes large delays. Zheng and Hu [9] propose CRBCC which makes use of simulated annealing to build the chain. It also incorporates a clustering mechanism which aims to break the single long chain into multiple ones thereby reducing delay.…”
Section: Pegasis Variantsmentioning
confidence: 99%
“…The long chain in PEGASIS causes large delays. Zheng and Hu [9] propose CRBCC which makes use of simulated annealing to build the chain. It also incorporates a clustering mechanism which aims to break the single long chain into multiple ones thereby reducing delay.…”
Section: Pegasis Variantsmentioning
confidence: 99%
“…Based on PEGASIS, many improved algorithms have been proposed. A large part of these algorithms are related to the chain-cluster based approach, such as CCM (Chain-Cluster based Mixed routing) [7], CRBCC (Chain routing based on coordinatesoriented cluster) [8]. This kind of protocol combines the advantages of the chain-based architecture and the cluster-based.…”
Section: Fig 4 Data Collection In Pegasismentioning
confidence: 99%
“…A large part of these algorithms are related to the chain-cluster based approach, such as CCM (Chain-Cluster based Mixed routing) [8] in Fig. 5, CRBCC (Chain routing based on coordinates-oriented cluster) [9] in Fig. 6.…”
Section: A Chain-based Architecturementioning
confidence: 99%
“…The chain construction in BCBRP has four phases. First, the network is divided into different [9] equal parts. Second, the closest nodes to the boundary are elected as bridge nodes which connect with the others subnetworks.…”
Section: A Chain-based Architecturementioning
confidence: 99%