Computer Science ›› 2020, Vol. 47 ›› Issue (5): 260-264.doi: 10.11896/jsjkx.190400108
Special Issue: Network and communication
• Computer Network • Previous Articles Next Articles
NI Xiao-jun, SHE Xu-hao
CLC Number:
[1]CHUNAWALE A,SIRSIKAR S.Minimization of average energy consumption to prolong lifetime of Wireless Sensor Network[C]//2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN).Lonavala,2014:244-248. [2]IRMAK E,KÖSE A,GÖÇMEN G.Simulation and ZigBee based wireless monitoring of the amount of consumed energy at smart homes[C]//2016 IEEE International Conference on Renewable Energy Research and Applications (ICRERA).Birmingham,2016:1019-1023. [3]KUMAR R,MALIK A,SINGH S,et al.Reversible data hiding scheme for LZW codes using even-odd embedding strategy[C]//2016 International Conference on Computing,Communication and Automation (ICCCA).Noida,2016:1399-1403. [4]MARKSTEINER S,JIMENEZ V J E,VALIANT H,et al.An overview of wireless IoT protocol security in the smart home domain[C]//2017 Internet of Things Business Models,Users,and Networks.Copenhagen,2017:1-8. [5]LI S,LIAN G,PENG Z.Research on the loss-less Compression algorithm of the ultrasonic testing of rail[C]//2015 Symposium on Piezoelectricity,Acoustic Waves,and Device Applications (SPAWDA).Jinan,2015:458-461. [6]MANJULA Y,SHIVAKUMAR K B.Enhanced secure imagesteganography using double encryption algorithms[C]//2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).New Delhi,2016:705-708. [7]SANGEETHA M,BETTY P,KUMAR G S N.A biometrie iris image compression using LZW and hybrid LZW coding algorithm[C]//2017 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS).Coimbatore,2017:1-6. [8]KAUR G,KAD S.Improved Bee-Inspired routing protocol using Lzw based lossless compression[C]//2015 2nd International Conference on Recent Advances in Engineering & Computatio-nal Sciences (RAECS).Chandigarh,2015:1-6. [9]PAN G,HE J,WU Q,et al.Automatic stabilization of Zigbee network[C]//2018 International Conference on Artificial Intelligence and Big Data (ICAIBD).Chengdu,2018:224-227. [10]ALAM M A,FAKHRUL A,ATEEQ-UR-RAHMAN S,et al.Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing[C]//2018 Joint 7th International Conference on Informatics,Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging,Vision & Pattern Recognition (icIVPR).Kitakyushu,Japan,2018:272-275. [11]PRABU S,MAHESWARI R.Improving wireless sensor net-work lifespan by efficient routing algorithm and LZW compression[C]//International Conference on Information Communication and Embedded Systems (ICICES2014).Chennai,2014:1-5. [12]MALIK A,KUMAR R,SINGH S.Reversible Data HidingScheme for LZW Codes using LSB Flipping Strategy[C]//Proceedings of the International Conference on Advances in Information Communication Technology & Computing (AICTC'16).New York:ACM,2016. [13]NAGPURKAR A W,JAISWAL S K.An overview of WSN and RFID network integration[C]//2015 2nd InternationalConfe-rence on Electronics and Communication Systems (ICECS).Coi-mbatore,2015:497-502. [14]LI Y M,LIANG Y.Temporal Lossless and Lossy Compression in Wireless Sensor Networks[J].ACM Transactions on Senser Networks,2016,37:1-35. [15]KUMAR R,CHAND S,SINGH S.An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes[J].Multimedia Tools and Applications,2019,78(16):22977-23001. [16]LI S H,YEN D C,CHUANG Y P.A Real-Time Audit Mechanism Based on the Compression Technique[J].ACM Trans.Manage.Inf.Syst.,2016,4:1-25. [17]SINGH S,PANDEY P.Enhanced LZW technique for medical image compression[C]//2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).New Delhi,2016:1080-1084. [18]GALHOTRA K,KAUR K.Extending IAMCTD using data fusion and lossless data compression for UWSN[C]//2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).Noida,2015:526-531. |
[1] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[2] | HUANG Ying-qi, CHEN Hong-mei. Cost-sensitive Convolutional Neural Network Based Hybrid Method for Imbalanced Data Classification [J]. Computer Science, 2021, 48(9): 77-85. |
[3] | WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316. |
[4] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[5] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[6] | GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313. |
[7] | WANG Dong, WANG Hu and JIANG Qian-li. Low Power Long Distance Marine Environment Monitoring System Based on 6LoWPAN [J]. Computer Science, 2020, 47(6A): 596-598. |
[8] | ZHANG Jie, LIANG Jun-bin, JIANG Chan. Research Progress on Key Technologies of Data Storage Based on Wireless Sensor Networks inWide-Area Complex Fluid Systems [J]. Computer Science, 2020, 47(5): 242-249. |
[9] | LIU Ning-ning,FAN Jian-xi,LIN Cheng-kuan. Address Assignment Algorithm for Tree Network Based on Address Space [J]. Computer Science, 2020, 47(2): 239-244. |
[10] | CHEN Jia,OUYANG Jin-yuan,FENG An-qi,WU Yuan,QIAN Li-ping. DoS Anomaly Detection Based on Isolation Forest Algorithm Under Edge Computing Framework [J]. Computer Science, 2020, 47(2): 287-293. |
[11] | SU Fan-jun,DU Ke-yi. Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks [J]. Computer Science, 2020, 47(2): 300-305. |
[12] | ZHOU Wen-xiang, QIAO Xue-gong. Anycast Routing Algorithm for Wireless Sensor Networks Based on Energy Optimization [J]. Computer Science, 2020, 47(12): 291-295. |
[13] | LI Zheng-yang, TAO Yang, ZHOU Yuan-lin, YANG Liu. Energy-balanced Multi-hop Cluster Routing Protocol Based on Energy Harvesting [J]. Computer Science, 2020, 47(11A): 296-302. |
[14] | HOU Ming-xing,QI Hui,HUANG Bin-ke. Data Abnormality Processing in Wireless Sensor Networks Based on Distributed Compressed Sensing [J]. Computer Science, 2020, 47(1): 276-280. |
[15] | WANG Gai-yun, WANG Lei-yang, LU Hao-xiang. RSSI-based Centroid Localization Algorithm Optimized by Hybrid Swarm Intelligence Algorithm [J]. Computer Science, 2019, 46(9): 125-129. |
|