BASE STATION DRIVEN ROUTING PROTOCOL EVALUATION USING TOSSIM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2010, Vol 1, Issue 3
Abstract
Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz. data collection and data dissemination protocols. This paper compares two collection protocols: Base Station (BS) driven routing protocol [1] and a modified version of Low energy adaptive clustering hierarchy (LEACH) protocol [2]. The simulation results show that utilizing BS driven routing protocol, less time is spent compared to LEACH protocol.
Authors and Affiliations
Gaurav Kumar Nigam
Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique
The aim of this research is to design a steganography algorithm which not only hide the message behind the image but also provide more security than others. For the purpose of security, encryption technique is used with...
Design of 2.4 GHz Oscillators In CMOS Technology
oscillators are essential components of RF circuits also the integral part of various electronic systems. An oscillator is an electronic device used for the purpose of generating a signal robust, high performance oscilla...
Paramount role of sequencing in Ubiquitous forms of Nucleotide
Protein microarrays allow biologist to measure the characteristics of amino acid sequence on a small chip. It generates voluminous of data and new intelligent methods are needed to analyze them. Sequence alignment is cha...
A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network
The handwritten symbol recognition plays an important role in present communication systems. In the data communication systems, all the data have to be recorded, encoded and will be communicated with other systems. Prese...
Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key
Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when user...