Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Wireless sensor network energy efficiency is the important factor of the network lifetime, most of the sensor nodes are present in an isolated urban fields to sensing the data in particular area .These sensor nodes are working in typical condition. In this paper we address the problems of cluster node failure. When a cluster node fails because of energy depletion we need to choose alternative cluster for that particular region. In periodical time each sensor node in the cluster should possess the next cluster head re-election based on energy to avoid node failure
Authors and Affiliations
G. Sunil, , Mrs. D. Jasmine David,
AN OVERVIEW & ANALYSIS COMPARISION OF INTERNET PROTOCAL TCP\IP V/S OSI REFRENCE MODAL
Basically network is a set number of interconnected lines presenting a net, and a network’s roads |an interlinked system, a network of alliances. Today, computer networks are the core of modern communication. A...
An efficient unobservable routing scheme resistant against DoS attacks
Privacy protection for ad hoc networks with low-power wireless devices and lowbandwidth network connection is a very challenging task. A number of anonymous routing schemes have been proposed for ad hoc networks to...
Improved wavelet based compression with adaptive lifting scheme using Artificial Bee Colony algorithm
Abstract—The increment in the sizes of the images by the technological advances accompanies high demand for large capacities, high performance devices, high bandwidths etc. Therefore, image compression techniques are ess...
A SURVEY ON AD-HOC IN WIRELESS SENSOR NETWORKS
- This paper says the performance of wireless ad hoc network. A wireless network has several types in it. For more expedient usage in the wireless trait ad hoc network is introduced. Ad-hoc network is a collection...
“SPOOFING”……. Headache to IT world.
The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security...