An Energy Balanced Routing Method Based On Adaptive Heed for Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
We present a protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads according to a hybrid of the node residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED terminates in O(1) iterations, incurs low message overhead, and achieves fairly uniform cluster head distribution across the network. We prove that, with appropriate bounds on node density and intra-cluster and inter-cluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks. Simulation results demonstrate that our proposed approach is effective in prolonging the network lifetime and supporting scalable data aggregation.
Authors and Affiliations
Anusha . P, B. V. Subbayamma
Novel Implementation of Low Power Test Patterns for In Situ Test
Test vector generation, its application to CUT and its response analysis are the tasks done by the In Situ Test. A new and efficient approach for the Generation of all one bit changing random input patterns for in sit...
Automated Leukemia Detection using Contour Signature in Blood Microscopic Images
Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell whe...
Performance Analysis of Thirteen Level Asymmetrical Multi String Multi Level Inverter Fed Three Phase Induction Motor Drive
The concept of multilevel inverters, introduced about 20 years ago entails performing power conversion in multiple voltage steps to obtain improved power quality, lower switching losses, better electromagnetic compat...
Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire net...
EFFICIENT APPROACH FOR PRIVACY PRESERVING MICRODATA PUBLISHING USING SLICING
Many agencies and organizations are willing to release the data they collected to other parties for research and the formulation of public policies. Data often contains personally identifiable information and therefor...