Research on Data Packets Clustering Algorithm in the Wireless Multiple Hop Network

Article Preview

Abstract:

In view of the problems existing in the wireless multiple hop network such as consumption imbalance of node power, disunity of node transmission data efficiency, unfixed life within the scope of network, it has put forward the trade-off relationship between the wireless multiple hop network node energy consumption and multiple factors based on the k-means clustering method. The principle of steps and characteristics of the k-means clustering algorithm are first introduced; Then model the influence of the K-means polymerization on VoIP service quality, then use the k-means clustering method to make cluster analysis for network node data package, and mine the trade-off relationship between data transmission service quality and multiple hops node energy consumption; Finally carry on the simulation experiment to test the performance of this method. Simulation results show that the method not only improves the data transmission service quality of VoIP service, but also reduces the energy consumption of nodes and prolongs the life span of the wireless network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1905-1908

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Geng, J. He, K. Pahlavan, Modeling the Effect of Human Body on TOA Based Indoor Human Tracking[J], International Journal of Wireless Information Networks, 2012(4): 306-317.

DOI: 10.1007/s10776-013-0227-3

Google Scholar

[2] Ghosh A K, Michael C, Schatz M . Areal-time intrusion system based on learning program behavior [C] /Debar H, Wu S F (eds). Recent Advances in Intrusion Detection(RAID 2000). Toulouse: Spinger - Verlag, 2000: 93-109.

DOI: 10.1007/3-540-39945-3_7

Google Scholar

[3] K. M. Faraoun, A. Boukelif. International Journal of Computational Intelligence[J]. Neural Networks Learning Improvement using the Clustering Algorithm to Detect Network Intrusions, 2007, 3(2), 161-168.

Google Scholar

[4] Richhariya, Vineet; Sharma, Nupur. Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and Clustering[J]. International Journal of Computer Science & Network Security, 2014, 14(1), 54-58.

Google Scholar