2009
DOI: 10.1016/j.comcom.2008.11.014
|View full text |Cite
|
Sign up to set email alerts
|

Distributed topology control algorithm based on one- and two-hop neighbors’ information for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…These issues are related to limited battery resource. In this section, the NMST is compared with two existing topology control algorithms, including OTTC [16] and DIA [18]. Simulations are implemented by using Matlab.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…These issues are related to limited battery resource. In this section, the NMST is compared with two existing topology control algorithms, including OTTC [16] and DIA [18]. Simulations are implemented by using Matlab.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The following metrics are considered for comparative evaluation of the abovementioned algorithms: node degree, transmission range, and stretch factor and power stretch mean psm. The sf of node and V is determined as sf( , V) = ( , V)/ ( , V) where ( , V) represents the energy cost of the shortest path between nodes and V on the topology network of and the initial graphs, respectively [16]. In addition, the psm is determined as psm( , V) = ∑ ,V∈ ( ( , V)/ ( , V))/ 2 where denotes the number of nodes [16].…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For simplicity, the vast majority of studies based on the idealized unit-disk graph (UDG) network model, where any two sensors can directly communicate with each other if and only if their geographic distance is smaller than a predetermined radio range. Examples of these research include geo-routing protocols [12,13], localization algorithms [8,14], and topology control techniques [15,16]. Similarly, most of the works related to the hop-distance relationship have been investigated assuming the UDG model [11,[17][18][19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%