A Deterministic Heterogeneous Clustering Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The energy supply of nodes will be limited strictly in the wireless sensor networks (WSN). Manyalgorithms propose to increase the efficiency of Sensor Networks. Many Clustering protocols have beenproposed to improve system throughput and system delay, and increase energy saving. This work proposes toimprove the life of a heterogeneous sensor network. Earlier work in this field e.g. LEACH (Low EnergyAdaptive Clustering Hierarchy) protocol and SEP (A Stable Election Protocol) use probabilistic algorithm. Thispaper uses a deterministic approach. It takes into consideration of many factors such as current energy ofsensor node, percentage of nodes that not have been selected as Cluster Heads (CHs) in each round due tolocation reason and number of consecutive rounds in which a node has not been cluster-head. The proposedprotocol is simulated and the results show a significant reduction in network energy consumption compared toheterogeneous network setup with LEACH and SEP protocol
Authors and Affiliations
Shikalgar I. A. , Dixit M. R
Quality Enhancement of Video Denoising Algorithm withCombined Effect of Different Views
Abstract: An unwanted factor in digital images and videos called as Noise is responsible for hiding the detailsand destroying image information. Hence denoising has great importance in the detail restoration and to...
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...
A Review of DOS Attacks in Cloud Computing
Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to...
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
Implementing bigdata analytics for small and medium enterprise (SME) regional growth
Abstract: In all economies, especially in developing and transition economies, there is now a consensus among state policy makers, development economists as well as international development partners that small andmedium...