Load and Energy Consumption based Scheduling Algorithm for Wireless Sensor Networks (LECSA)
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 6
Abstract
Sleep/Wake up scheduling for Wireless Sensor Networks has become an essential part for its working. In this paper, the Low Energy Adaptive Clustering Hierarchy (LEACH) which introduced the concept of clustering in sensor networks, Energy-Efficient Clustering routing algorithm based on Distance and Residual Energy for Wireless Sensor Networks (DECSA) which describes about scheduling based on distance and energy and the Energy efficient clustering algorithm for data aggregation (EECA) were discussed and their merits and demerits were compared. LECSA-Load and Energy Consumption based Scheduling Algorithm which gives a simplified method for scheduling using a single deciding parameter has been introduced and detailed. Keywords: Sensors, Schedule, Wireless Sensor Networks, Centralized, Distributed Radio, etc...
Authors and Affiliations
R. Rathna , A. Sivasubramanian , Vinoth Kumar
NETWORK INTRUSION DETECTION SYSTEM USING REDUCED DIMENSIONALITY
Intrusion Detection System (IDS) is the science of detection of malicious activity on a computer network and the basic driver for network security. It is defined as a process of monitoring the events occurring in a compu...
Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network
This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, usin...
WEB BASED E-LEARNING IN INDIA: THE CUMULATIVE VIEWS OF DIFFERENT ASPECTS
In the presence of great social diversity in India, it is difficult to change the social background of students, parents and their economical conditions. Therefore the only option left for us is to provide uniform or sta...
UNIVERSAL STEGANALYSIS: DEFEND AGAINST ADAPTIVE STEGANOGRAPHIC ATTACK USING MX-QUADTREE NEIGHBOR FINDING MECHANISM
In the world of information security, Trapping of Illegal secret communication plays an imperative role. Especially, defending against such type of attacks plays important role in the area of defense. Steganalysis is the...
EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK
MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing pro...