Advanced Low Energy Adaptive Clustering Hierarchy
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
The use of Wireless Sensor Networks (WSNs) is anticipated to bring enormous changes in data gathering, processing and dissemination for different environments and applications. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. rolonging the network lifetime depends on efficient management of sensing node energy resource. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical routing protocols greatly minimize energy consumed in collecting and disseminating data. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the fundamental protocols in this class. In this paper we propose Advanced LEACH (A-LEACH), a heterogeneous-energy protocol to decrease probability of failure nodes and to prolong the time interval before the death of the first node (we refer to as stability period) and increasing the lifetime in heterogeneous WSNs, which is crucial for many applications.
Authors and Affiliations
EZZATI ABDELLAH , SAID BENALLA , ABDERRAHIM BENI HSSANE , MY LAHCEN HASNAOUI
ADAPTIVE RESONANCE THEORY (ART1) APPROACH IN CBIR SYSTEM
In these days an image retrieval system has become a challenging task. Many systems based on the text based retrieval but the need of image based retrieval system that takes an image as the input query and retrieves imag...
Explore the Performance of the ARM Processor<br /> Using JPEG
Recently, the evolution of embedded systems has shown a strong trend towards application- specific, single- chip solutions. The ARM processor core is a leading RISC processor architecture in the embedded domain. The ARM...
Web Services Security Architectures Composition and Contract Design using RBAC
Service Oriented Architecture’s Web Services authorization traditionally is done using common access control models like Role-Based Access Control. In thinking of a composite application that stitches together the capabi...
Elliptic Curve Cryptography Enabled Security for Wireless Communication
Neal Koblitz and Victor Miller independently proposed elliptic curve cryptography (ECC). This is an efficient technique, which provides security for wireless communication. Earlier we were using wired equivalent privacy...
Integral System for Automation of Education Board and IT Association using Cloud and Mobilink.
Most of the educational boards and IT associates still use traditional and inefficient intellectual E-administration system for communicating with their valued clients. The clients may include the students in case of edu...