Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 3
Abstract
This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-mode interleaving algorithms. In this algorithm adjust the sleep mode parameter. This algorithm guarantees the bandwidth efficiency of the audio video files. Second one is Energy efficiency substream selection algorithm. This algorithm focus on two research problems one is to Maximizes the video quality and next one is Minimize energy consumption of receivers. EESA algorithm reduces the energy consumption for receivers. The EESA algorithm transmits the selected sub-streams in bursts, so energy is saved by the receivers. Since EESA algorithm not only focuses on energy savings, quality factor is also considered. Simulation result shows that comparing the performance of these two algorithms EESA performs better.
Authors and Affiliations
V. Esakkimuthu S elvi
Web Mining using Artificial Ant Colonies : A Survey
Web mining has been very crucial to any organization as it provides useful insights to business patterns. It helps the company to understand its customers better. As the web is growing in pace, so is its importance and h...
Dynamic Grouping of Semantically Similar User Search Histories
Users over Internet make queries continuously for various kinds of information. Such information might be about various tasks and that is done through existing search engines. When queries are made by users continuously,...
A Presumption Mold of Visual Cryptography Design with Dynamic Groups
Visual cryptography is a secret sharing scheme where an image is encoded into transparencies. The Secret information can be revealed from the encoded image only when the correct set of images is given as an input and if...
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...