[1]
|
J. L. Zhou, Q. Y. Cao, R. C. Huang, et al., “A Genetic Algorithm Based on Extended Sequence and Topology Encoding for the Multicast Protocol in Two-tiered WSN,” Expert Systems with Applications, Vol. 37, No. 2, 2010, pp. 1684-1695.
doi:10.1016/j.eswa.2009.06.043
|
[2]
|
C. Y. Chong and S. P. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,” Proceedings of the IEEE, Vol. 91, No. 8, 2003, pp. 1247-1256.
doi:10.1109/JPROC.2003.814918
|
[3]
|
J.-J. Chen and P. Jiang, “Algorism for Wireless Sensor Network Based on Fuzzy C-Means,” Computer Engineering, Vol. 37, No. 12, 2011, pp. 62-67. (in Chinese)
|
[4]
|
O. Youni and S. Fahmy, “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 3, No. 4, 2004, pp. 366-379.
doi:10.1109/TMC.2004.41
|
[5]
|
A. Manjeshwar and D. P. Agrawal, “TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Net-works,” Proceedings of 15th IEEE International Parallel and Distributed Processing Symposium, San Francisco, 23-27 April 2001, pp. 2009-2015.
|
[6]
|
S. Lindsey and C. S. Raghavendra, “Pegasis: Power Efficient Gathering in Sensor Information Systems,” Proceedings of the IEEE Aerospace, Los Angeles, 2002, pp. 1125-1130.
|
[7]
|
C.-F. Li, G.-H. Chen, M. Ye and J. Wu, “An Uneven Cluster-Based Routing Protocol for Wireless Networks,” Chinese Journal of Computers, Vol. 30, No. 1, 2007, pp. 27-36.
|
[8]
|
Z.-Q. Pan, L.-L. Liu and D. Zhang, “An Energy Efficient Routing Protocol Based on Uneven Clustering for Wireless Sensor Networks,” Microelectronics & Computer, Vol. 29, No. 1, 2012, pp. 93-96.
|
[9]
|
H.-B. Li, C.-B. Yu, J.-H. Yan and Y.-L. Li, “Clustering Strategy for Energy Balance of Wireless Sensor Networks Based on Improved Particle Swarm Optimization Clustering Algorithm,” Application Research of Computer, Vol. 28, No. 2, 2011, pp. 657-660.
|
[10]
|
S. L. Chiu, “Fuzzy Model Identification Based on Cluster Estimation,” Journal of Intelligent and Fuzzy Systems, Vol. 2, No. 3, 1994, pp. 267-278.
|
[11]
|
R.-C. Wang, W.-S. Juang and C.-L. Lei, ?Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key,” Computer Communications, Vol. 34, No. 3, 2011, pp. 274-280.
doi:10.1016/j.comcom.2010.04.005
|