1616 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 V. CONCLUSION Energy sav<strong>in</strong>g <strong>in</strong> WSNs has attracted a lot of attention <strong>in</strong> the recent years. Extensive research has been conducted to address these limitations by develop<strong>in</strong>g schemes that can improve resource efficiency. In this paper, we have <strong>in</strong>troduced an optimal energy-efficient sleep schedul<strong>in</strong>g scheme for WSNs. Without accurate geography <strong>in</strong>formation, the two-hop neighbors are considered. Simulation results show that our schedul<strong>in</strong>g scheme has improved the sleep ratio and extended the network lifetime. But <strong>in</strong> the simulation experiments, we discovered that there is approximately 17% residual energy when the network died. Consider<strong>in</strong>g the death spread from the border of the monitor region to the central, we believe that there is still space to improve. So, one of our future works is to f<strong>in</strong>d a solution to alleviate the <strong>in</strong>equality sleep of the boundary nodes. ACKNOWLEDGMENTS This work was supported under the National Science Foundation of Ch<strong>in</strong>a (50904070, 51104157); The Ch<strong>in</strong>a Postdoctoral Science Foundation (20100471412). REFERENCES [1] Liu, X. Jiang, S. Horiguchi, T. T. Lee, "Analysis of random sleep scheme for wireless sensor networks", International Journal of Sensor Networks, Vol. 7, No.1/2, pp. 71 - 84 , 2010. [2] Ossama You nis, Srimivasan Ramasubramanian, and Marwan Krunz, “Location-Unaware Sens<strong>in</strong>g Range Assignment <strong>in</strong> Sensor Netwroks”, Network<strong>in</strong>g 2007, pp. 120-131, 2007. [3] Liu C, Wu k, Xiao Y, et al, “Random coverage with coverage with guaranteed connectivity: jo<strong>in</strong>t schedul<strong>in</strong>g for wireless sensor networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, pp.562-575, 2006 [4] Jiang J, Li F, et al, “Random schedul<strong>in</strong>g for wireless sensor networks”, ISPA’09, Sydney: IEEE CS Press, pp.324-332, 2009 [5] L<strong>in</strong> JW, Chen YT, “Improv<strong>in</strong>g the coverage of randomized schedul<strong>in</strong>g <strong>in</strong> wireless sensor networks”, IEEE Transactions o Wireless Communications, Vol.7, No. 12, pp. 4807-481, 2008 [6] Q<strong>in</strong>g L, Zhi T, “M<strong>in</strong>imum node degree and k-connectivity of a wireless multi-hop network <strong>in</strong> bounded area”, GLOBECOM’07, NEW York: IEEE Press, pp. 1296-1301, 2007 [7] Xu Y, Heidemann J, Estr<strong>in</strong> D, “Geography-<strong>in</strong>formed energy conservation for ad hoc rout<strong>in</strong>g”, Proceed<strong>in</strong>gs of ACM Conference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g, USA:ACM, pp.16-21,2001 [8] F.Ye,Zhong, S. Lu, L. Zhang, “PEAS : A robust energy conserv<strong>in</strong>g protocol for long-lived sensor networks”, <strong>in</strong> Proc. of the ACM MobiCom Conf, pp.129-143,2004 [9] GAO Shan, CHINH T U, LI Y<strong>in</strong>g-shu, et al, “Sensor schedul<strong>in</strong>g for k-coverage <strong>in</strong> wireless sensor networks”, Mobile Ad-hoc and Sensor Networks, vol. 43, no.25, pp.268-280, 2006 [10] Wei Wei, Hui Yang, Hao Wang, etc, “Queu<strong>in</strong>g Schedule for Location Based on Wireless Ad-hoc Networks with D-Cover Algorithm”, International Journal of Digital Content Technology and its Applications, vol.5, no.1, pp.356-363, 2011 [11] Gao Y, Wu K, Li F, “Analysis on the Redundancy of Wireless Sensor Networks”. WSNA’03[C]. New York: ACM Press, pp.108-114, 2003 [12] KUI Wu, et al, “Lightweight Deployment-Aware Schedul<strong>in</strong>g for Wireless Sensor Networks”, Mobile Networks And Application, vol.10, no.6, pp.837-852, 2005 [13] Younis O, Krunz M, Ramasubramanian S, “Location-Unaware Coverage <strong>in</strong> Wireless Sensor Networks”, Ad Hoc Networks, vol.6, no.7, pp.1078-1097, 2008 [14] Li-Hs<strong>in</strong>g Yen, Yang-M<strong>in</strong> Cheng, “Range-Based Sleep Schedul<strong>in</strong>g (RBSS) for Wireless Sensor Networks”, Wireless Pers Commun, Vol 48, No. 3, pp.411-423, 2009 [15] Cheng Tie Ee, Ruzena Bajcsy, “Congestion control and fairness for many-to-one rout<strong>in</strong>g <strong>in</strong> sensor networks”, Proc of the 2nd ACM Conf on Embedded Networked Sensor Systems (SenSys).Baltimore:ACM Press,pp.148-161, 2004 [16] Khaled Matrouk, Bjorn Landfeldt, “RETT-gen:a globally efficient rout<strong>in</strong>g protocol for wireless sensor networks by equalis<strong>in</strong>g sensor energy and avoid<strong>in</strong>g energy holes”, Ad Hoc Networks,vol.7, No.3, pp.514-536, 2009 [17] Wu X B,Chen G,Das S K, “Avoid<strong>in</strong>g energy holes <strong>in</strong> wireless sensor netw0rks with non-uniform node distribution”, IEEE Transactions on Parallel and Distributed Systems,vol 19, No. 5, pp.710-720, 2007 [18] Li J,Mohapatra P, “An analytical model for the energy hole problem <strong>in</strong> many-to-one sensor networks”, Proceed<strong>in</strong>gs of the IEEE Vehicular Technology Conference. Dallas,TX,pp.2721- 2725, 2005 [19] WEN C Y, MORRIS R D, SETHARES W A. “Distance estimation us<strong>in</strong>g bidirectional communications without synchronous clock<strong>in</strong>g”, IEEE Transactions on Signal Process<strong>in</strong>g, vol.55, no.5, pp.1927-1939, 2007 [20] H. Zhang, J.C. Hou, “Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g sens<strong>in</strong>g coverage and connectivity <strong>in</strong> large sensor networks”, Ad Hoc and Sensor Wireless Networks, vol.1, no.1, pp.89-124, 2005 [21] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Networked Sensors”, ACM SIGPLAN Notices, vol.35, no.11, pp.93-104, 2000 [22] Tian D, Georganas N, “Location and calculation-free node-schedul<strong>in</strong>g schemes <strong>in</strong> large wireless sensor networks”, Ad Hoc Networks, vol.2, no.1, pp.65-85, 2004 [23] Fan Gao-juan, Sun Li-juan, Wang Ru-chuan, et al, “Non-uniform distribution node schedul<strong>in</strong>g scheme <strong>in</strong> wireless sensor networks”, Journal on Communications, vol.32, No.3, pp.10-17, 2011 [24] Fan Gao-juan, Wang Ru-chuan, Huang Hai-p<strong>in</strong>g, et al, “Tolerable Coverage Area Based Node Schedul<strong>in</strong>g Algorithm <strong>in</strong> Wireless Sensor Networks”, ACTA ELECTRONICA SINICA, Vol. 39, No.1, pp. 89-94, 2011 [25] Jiang Chang-jiang, Shi Wei-ren, Tang Xian-lun, et al, “Energy-Balanced Unequal Cluster<strong>in</strong>g Rout<strong>in</strong>g Protocol for Wireless Sensor Networks”, Journal of Software, vol. 23, No. 5, pp.1222-1232, 2012 [26] Shao-feng Jiang, M<strong>in</strong>g-hua Yang, Han-tao Song, et al, “An Enhanced perimeter coverage based density control algorithm for wireless sensor network”, Proceed<strong>in</strong>gs of the Third International Conference on Wireless and Mobile Communications (ICWMC’07), Wash<strong>in</strong>gton: IEEE Computer Society, 2007 © 2013 ACADEMY PUBLISHER
JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1617 Shan-shan Ma, was born <strong>in</strong> 1978, is currently a lecturer <strong>in</strong> Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology. She received the B.S. <strong>in</strong> Electronic and Information Technology from Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, Xuzhou, Ch<strong>in</strong>a, <strong>in</strong> 2000 and the M.S. <strong>in</strong> Communication and Information Eng<strong>in</strong>eer<strong>in</strong>g from Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, Xuzhou, Ch<strong>in</strong>a, <strong>in</strong> 2003. She is currently pursu<strong>in</strong>g the Ph. D. degree at Computer Application Technology <strong>in</strong> College of Computer Science and Technology, University of M<strong>in</strong><strong>in</strong>g and Technology, from 2007. Her research <strong>in</strong>terests <strong>in</strong>clude wireless sensor network and <strong>in</strong>formation process<strong>in</strong>g. Yan-J<strong>in</strong>g Sun, was born <strong>in</strong> 1977, is currently a professor <strong>in</strong> Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology. He received his Ph.D. degree <strong>in</strong> Communication and Information System from Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology <strong>in</strong> 2007. His research <strong>in</strong>terest <strong>in</strong>cludes wireless sensor network and embedded real-time system. Jian-sheng Qian, was born <strong>in</strong> 1964, is a professor and Ph.D. candidate tutor <strong>in</strong> Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology currently. He received the Ph. D degree <strong>in</strong> Control Theory and Control Eng<strong>in</strong>eer<strong>in</strong>g from Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, Ch<strong>in</strong>a, <strong>in</strong> 2003. His research <strong>in</strong>terest <strong>in</strong>cludes m<strong>in</strong>e communication and wireless sensor network. © 2013 ACADEMY PUBLISHER
- Page 1 and 2:
Journal of Computers ISSN 1796-203X
- Page 3:
Corn Moisture Measurement using a C
- Page 6 and 7:
1378 JOURNAL OF COMPUTERS, VOL. 8,
- Page 8 and 9:
1380 JOURNAL OF COMPUTERS, VOL. 8,
- Page 10 and 11:
1382 JOURNAL OF COMPUTERS, VOL. 8,
- Page 12 and 13:
1384 JOURNAL OF COMPUTERS, VOL. 8,
- Page 14 and 15:
1386 JOURNAL OF COMPUTERS, VOL. 8,
- Page 16 and 17:
1388 JOURNAL OF COMPUTERS, VOL. 8,
- Page 18 and 19:
1390 JOURNAL OF COMPUTERS, VOL. 8,
- Page 20 and 21:
1392 JOURNAL OF COMPUTERS, VOL. 8,
- Page 22 and 23:
1394 JOURNAL OF COMPUTERS, VOL. 8,
- Page 24 and 25:
1396 JOURNAL OF COMPUTERS, VOL. 8,
- Page 26 and 27:
1398 JOURNAL OF COMPUTERS, VOL. 8,
- Page 28 and 29:
1400 JOURNAL OF COMPUTERS, VOL. 8,
- Page 30 and 31:
1402 JOURNAL OF COMPUTERS, VOL. 8,
- Page 32 and 33:
1404 JOURNAL OF COMPUTERS, VOL. 8,
- Page 34 and 35:
1406 JOURNAL OF COMPUTERS, VOL. 8,
- Page 36 and 37:
1408 JOURNAL OF COMPUTERS, VOL. 8,
- Page 38 and 39:
1410 JOURNAL OF COMPUTERS, VOL. 8,
- Page 40 and 41:
1412 JOURNAL OF COMPUTERS, VOL. 8,
- Page 42 and 43:
1414 JOURNAL OF COMPUTERS, VOL. 8,
- Page 44 and 45:
1416 JOURNAL OF COMPUTERS, VOL. 8,
- Page 46 and 47:
1418 JOURNAL OF COMPUTERS, VOL. 8,
- Page 48 and 49:
1420 JOURNAL OF COMPUTERS, VOL. 8,
- Page 50 and 51:
1422 JOURNAL OF COMPUTERS, VOL. 8,
- Page 52 and 53:
1424 JOURNAL OF COMPUTERS, VOL. 8,
- Page 54 and 55:
1426 JOURNAL OF COMPUTERS, VOL. 8,
- Page 56 and 57:
1428 JOURNAL OF COMPUTERS, VOL. 8,
- Page 58 and 59:
1430 JOURNAL OF COMPUTERS, VOL. 8,
- Page 60 and 61:
1432 JOURNAL OF COMPUTERS, VOL. 8,
- Page 62 and 63:
1434 JOURNAL OF COMPUTERS, VOL. 8,
- Page 64 and 65:
1436 JOURNAL OF COMPUTERS, VOL. 8,
- Page 66 and 67:
1438 JOURNAL OF COMPUTERS, VOL. 8,
- Page 68 and 69:
1440 JOURNAL OF COMPUTERS, VOL. 8,
- Page 70 and 71:
1442 JOURNAL OF COMPUTERS, VOL. 8,
- Page 72 and 73:
1444 JOURNAL OF COMPUTERS, VOL. 8,
- Page 74 and 75:
1446 JOURNAL OF COMPUTERS, VOL. 8,
- Page 76 and 77:
1448 JOURNAL OF COMPUTERS, VOL. 8,
- Page 78 and 79:
1450 JOURNAL OF COMPUTERS, VOL. 8,
- Page 80 and 81:
1452 JOURNAL OF COMPUTERS, VOL. 8,
- Page 82 and 83:
1454 JOURNAL OF COMPUTERS, VOL. 8,
- Page 84 and 85:
1456 JOURNAL OF COMPUTERS, VOL. 8,
- Page 86 and 87:
1458 JOURNAL OF COMPUTERS, VOL. 8,
- Page 88 and 89:
1460 JOURNAL OF COMPUTERS, VOL. 8,
- Page 90 and 91:
1462 JOURNAL OF COMPUTERS, VOL. 8,
- Page 92 and 93:
1464 JOURNAL OF COMPUTERS, VOL. 8,
- Page 94 and 95:
1466 JOURNAL OF COMPUTERS, VOL. 8,
- Page 96 and 97:
1468 JOURNAL OF COMPUTERS, VOL. 8,
- Page 98 and 99:
1470 JOURNAL OF COMPUTERS, VOL. 8,
- Page 100 and 101:
1472 JOURNAL OF COMPUTERS, VOL. 8,
- Page 102 and 103:
1474 JOURNAL OF COMPUTERS, VOL. 8,
- Page 104 and 105:
1476 JOURNAL OF COMPUTERS, VOL. 8,
- Page 106 and 107:
1478 JOURNAL OF COMPUTERS, VOL. 8,
- Page 108 and 109:
1480 JOURNAL OF COMPUTERS, VOL. 8,
- Page 110 and 111:
1482 JOURNAL OF COMPUTERS, VOL. 8,
- Page 112 and 113:
1484 JOURNAL OF COMPUTERS, VOL. 8,
- Page 114 and 115:
1486 JOURNAL OF COMPUTERS, VOL. 8,
- Page 116 and 117:
1488 JOURNAL OF COMPUTERS, VOL. 8,
- Page 118 and 119:
1490 JOURNAL OF COMPUTERS, VOL. 8,
- Page 120 and 121:
1492 JOURNAL OF COMPUTERS, VOL. 8,
- Page 122 and 123:
1494 JOURNAL OF COMPUTERS, VOL. 8,
- Page 124 and 125:
1496 JOURNAL OF COMPUTERS, VOL. 8,
- Page 126 and 127:
1498 JOURNAL OF COMPUTERS, VOL. 8,
- Page 128 and 129:
1500 JOURNAL OF COMPUTERS, VOL. 8,
- Page 130 and 131:
1502 JOURNAL OF COMPUTERS, VOL. 8,
- Page 132 and 133:
1504 JOURNAL OF COMPUTERS, VOL. 8,
- Page 134 and 135:
1506 JOURNAL OF COMPUTERS, VOL. 8,
- Page 136 and 137:
1508 JOURNAL OF COMPUTERS, VOL. 8,
- Page 138 and 139:
1510 JOURNAL OF COMPUTERS, VOL. 8,
- Page 140 and 141:
1512 JOURNAL OF COMPUTERS, VOL. 8,
- Page 142 and 143:
1514 JOURNAL OF COMPUTERS, VOL. 8,
- Page 144 and 145:
1516 JOURNAL OF COMPUTERS, VOL. 8,
- Page 146 and 147:
1518 JOURNAL OF COMPUTERS, VOL. 8,
- Page 148 and 149:
1520 JOURNAL OF COMPUTERS, VOL. 8,
- Page 150 and 151:
1522 JOURNAL OF COMPUTERS, VOL. 8,
- Page 152 and 153:
1524 JOURNAL OF COMPUTERS, VOL. 8,
- Page 154 and 155:
1526 JOURNAL OF COMPUTERS, VOL. 8,
- Page 156 and 157:
1528 JOURNAL OF COMPUTERS, VOL. 8,
- Page 158 and 159:
1530 JOURNAL OF COMPUTERS, VOL. 8,
- Page 160 and 161:
1532 JOURNAL OF COMPUTERS, VOL. 8,
- Page 162 and 163:
1534 JOURNAL OF COMPUTERS, VOL. 8,
- Page 164 and 165:
1536 JOURNAL OF COMPUTERS, VOL. 8,
- Page 166 and 167:
1538 JOURNAL OF COMPUTERS, VOL. 8,
- Page 168 and 169:
1540 JOURNAL OF COMPUTERS, VOL. 8,
- Page 170 and 171:
1542 JOURNAL OF COMPUTERS, VOL. 8,
- Page 172 and 173:
1544 JOURNAL OF COMPUTERS, VOL. 8,
- Page 174 and 175:
1546 JOURNAL OF COMPUTERS, VOL. 8,
- Page 176 and 177:
1548 JOURNAL OF COMPUTERS, VOL. 8,
- Page 178 and 179:
1550 JOURNAL OF COMPUTERS, VOL. 8,
- Page 180 and 181:
1552 JOURNAL OF COMPUTERS, VOL. 8,
- Page 182 and 183:
1554 JOURNAL OF COMPUTERS, VOL. 8,
- Page 184 and 185:
1556 JOURNAL OF COMPUTERS, VOL. 8,
- Page 186 and 187:
1558 JOURNAL OF COMPUTERS, VOL. 8,
- Page 188 and 189:
1560 JOURNAL OF COMPUTERS, VOL. 8,
- Page 190 and 191:
1562 JOURNAL OF COMPUTERS, VOL. 8,
- Page 192 and 193:
1564 JOURNAL OF COMPUTERS, VOL. 8,
- Page 194 and 195: 1566 JOURNAL OF COMPUTERS, VOL. 8,
- Page 196 and 197: 1568 JOURNAL OF COMPUTERS, VOL. 8,
- Page 198 and 199: 1570 JOURNAL OF COMPUTERS, VOL. 8,
- Page 200 and 201: 1572 JOURNAL OF COMPUTERS, VOL. 8,
- Page 202 and 203: 1574 JOURNAL OF COMPUTERS, VOL. 8,
- Page 204 and 205: 1576 JOURNAL OF COMPUTERS, VOL. 8,
- Page 206 and 207: 1578 JOURNAL OF COMPUTERS, VOL. 8,
- Page 208 and 209: 1580 JOURNAL OF COMPUTERS, VOL. 8,
- Page 210 and 211: 1582 JOURNAL OF COMPUTERS, VOL. 8,
- Page 212 and 213: 1584 JOURNAL OF COMPUTERS, VOL. 8,
- Page 214 and 215: 1586 JOURNAL OF COMPUTERS, VOL. 8,
- Page 216 and 217: 1588 JOURNAL OF COMPUTERS, VOL. 8,
- Page 218 and 219: 1590 JOURNAL OF COMPUTERS, VOL. 8,
- Page 220 and 221: 1592 JOURNAL OF COMPUTERS, VOL. 8,
- Page 222 and 223: 1594 JOURNAL OF COMPUTERS, VOL. 8,
- Page 224 and 225: 1596 JOURNAL OF COMPUTERS, VOL. 8,
- Page 226 and 227: 1598 JOURNAL OF COMPUTERS, VOL. 8,
- Page 228 and 229: 1600 JOURNAL OF COMPUTERS, VOL. 8,
- Page 230 and 231: 1602 JOURNAL OF COMPUTERS, VOL. 8,
- Page 232 and 233: 1604 JOURNAL OF COMPUTERS, VOL. 8,
- Page 234 and 235: 1606 JOURNAL OF COMPUTERS, VOL. 8,
- Page 236 and 237: 1608 JOURNAL OF COMPUTERS, VOL. 8,
- Page 238 and 239: 1610 JOURNAL OF COMPUTERS, VOL. 8,
- Page 240 and 241: 1612 JOURNAL OF COMPUTERS, VOL. 8,
- Page 242 and 243: 1614 JOURNAL OF COMPUTERS, VOL. 8,
- Page 246 and 247: 1618 JOURNAL OF COMPUTERS, VOL. 8,
- Page 248 and 249: 1620 JOURNAL OF COMPUTERS, VOL. 8,
- Page 250 and 251: 1622 JOURNAL OF COMPUTERS, VOL. 8,
- Page 252 and 253: 1624 JOURNAL OF COMPUTERS, VOL. 8,
- Page 254 and 255: 1626 JOURNAL OF COMPUTERS, VOL. 8,
- Page 256 and 257: 1628 JOURNAL OF COMPUTERS, VOL. 8,
- Page 258 and 259: 1630 JOURNAL OF COMPUTERS, VOL. 8,
- Page 261: Call for Papers and Special Issues
- Page 264: (Contents Continued from Back Cover