Fuzzy-based Leader Selection for Topology Controlled PEGASIS Protocol for Lifetime Enhancement in Wireless Sensor Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 3
Abstract
Wireless sensor Networks present a new generation of real time embedded systems with limited computation, energy and memory resources that are being used in wide variety of applications where traditional networking infrastructure is practically infeasible. Legitimate leader selection can drastically improve the lifetime of the sensor network. This paper proposes fuzzy logic methodology for leader election in PEGASIS based protocol PEGASIS-TC [1] based on two descriptors- residual energy of node and its proximity to Base Station. Simulation results show that depending on network configuration, a substantial increase in stability of network lifetime can be accomplished as compared to PEGASIS-TC.
Authors and Affiliations
Vibha Nehra, Raju Pal, Ajay K Sharma
A Review of Security Threats by The Unauthorized in The E-Learning
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavorin...
Monitoring Pareto Type IV SRGM using SPC
The Reliability of the Software Process can be monitored efficiently using Statistical Process Control (SPC). SPC is the application of statistical techniques to control a process. SPC is a study of the best ways of des...
Comparison of Various Window Functions Used in FIR Filter Designing
In this study, 2-parameter cosh window is modified to improve its spectral characteristic in terms of the ripple ratio by proposing a new additional parameter. It is observed that an increase in the new parameter results...
EXTENDED SUBCLASS OF CYCLIC SEPARABLE GOPPA CODES
In 2013[4]a new subclass of cyclic Goppa code with Goppa polynomial of degree 2 is presented by Bezzateev and Shekhunova. They proved that this subclass contains all cyclic codes of considered length. In the present work...
Proof of Logic: Correctness of Next Generation Security Mechanisms
In this paper, three security mechanisms developed to form the UDT (UDP-Data Transfer protocol) Security Architecture are evaluated and analyzed. An approach is utilized to ascertain the applicability and secrecy propert...