Energy-Balanced Transmission Policies for Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
Wireless Sensor Network’s lifetime depends on the energy levels of individual nodes in the network. The energy usage depends on the MAC and routing protocols, topology, and transmission policy. The transmission policies in WSN as of now cause irregular usage of energy and it results in the reduction of energy levels of nodes in the network. Gradually it leads to the reduction of lifetime of the network. This paper presents a new method to overcome this problem. It divides the transmission distance into two parts based on the concentric rings which are formed around the sink as part of transmission mechanisms in WSN. The two parts are namely ring thickness and hop size. Here we consider the network lifetime as a kind of optimization problem. To achieve this we analyze the energy consumption in the transmission process and decide the optimal hop size and ring thickness. The empirical results revealed that through our energy balanced transmission policies, the network lifetime is increased substantially.
Authors and Affiliations
Y. Aswini , S. P. Anandaraj , V. Ramana , S. P. Poornima
Non-Linear Segmentation of Touched Roman Characters Based on Genetic Algorithm
The segmentation accuracy of Roman cursive characters, especially touched characters, is essential for the high performance of Optical Character Recognition Systems. This paper presents a new approach for non-linear seg...
Identity Recognizing using Iris Scan with multiple frames of Video
The field of iris biometrics has been significant research over the last decade. At this point, iris capture has become a main stream technology with wide acceptance. A general iris recognition system works with four dif...
Efficient Secured Hash Based Password Authentication in Multiple Websites
The most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user’s plaintext password to a remote web server, often using secure socket layer. Even when used over a...
CONTEXT INDEXING IN SEARCH ENGINE USING BINARY SEARCH TREE
Indexing in search engines is an active area of current researches and the aim of search engines is to provide the most relevant documents to the users in least possible time. In this paper a context based indexing is pr...
Comparison of Pre-fetched Pages Before and After Path Completion
In this study we uses an approach for increasing web performance by analyzing and predicting the user behavior from user access log , identifying the missing paths in the logs and completing the same using a web structur...