A New Multi-hop approach for sensing coverage in wireless sensor network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 9
Abstract
Sensor networks provide a strong combination of distributed sensing, computing and communication. Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied widely and usefully applied in many applications like military surveillance, environmental monitoring etc. This paper deals with the coverage problem of wireless sensor network. In WSNs, a large number of sensor nodes are scattered over a considered area; therefore, coverage problem occur in the network. In our method, we have used the clustering technique- K-means algorithm and the concept of gateway node to collect, receive and transferring data. In this paper, we propose a new multi-hop cluster based routing protocol and compare it with single-hop protocol LEACH.
Authors and Affiliations
Er. AMLAN JYOTI BARUAH
STUDY ON GREEN CLOUD COMPUTING WITH ITS DIFFERENT BEHAVIOUR AND ARCHITETURE
Cloud computing, as the term indicates, is a style of computing whereas vibrantly scalable and oftentimes visualized resources are supplied as a provider above the net. those offerings could be ate up via each person abo...
Energy Efficient Routing Protocols for MANETs: A Survey
MANET (Mobile Ad hoc Network) is a type of ad hoc network that can change location and configure itself arbitrarily. MANET is a wireless infrastructure less network environment. The nodes or devices are moves independent...
Empirically Investigating the Effect Of Design Metrics On Fault Proneness in Object Oriented Systems
In the era of software metrics demand for quality software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtua...