A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each node has a limited energy and a random mobilization. Since the energy consumption is a very important factor, the Hierarchical protocols can solve this problem for instance the LEACH protocol. W-LEACH is a LEACH extension which extends the network lifetime but this protocol uses sensor location to organize the network so it is not effective in an area where the location of nodes is impossible with mobility. In this paper, we improve an old algorithm (W-LEACH) to a new protocol called W-LEACH Decentralized to increase network lifetime without the use of maps. Besides, we are going to compare this protocol with LEACH in term of network lifetime and energy dissipation using Network Simulator.
Authors and Affiliations
Fameela. K. A , Reshma. V. K
Studying the Performance of a Local Area Network through a Statistical Results of a Simulation Program
The ring topology was selected among several topologies,since in the ring topology easy to isolate faults and it has good performs under heavy network load, but the most problem that face in the ring topology is th...
Microcontroller-Based Remote Temperature Monitoring System
Abstract: There is increase in death rate in hospitals due to inadequate attention to the patients, insufficient number of doctors as well as poor state of equipment make it difficult for the patients to receive proper...
Clustering Engine for Desktop Usability
Although search and information retrieval techniques are already widely used in the Internet, its application inpersonal computers is still incipient. The management of information is relatively difficult when it c...
Enhanced Data Processing Using Positive Negative Association Mining on AJAX Data
Knowledge discovery is the process of analyzing data from different perspectives and summarizing it into useful information. [1] Association rule mining is a data mining process used widely in traditional databases to fi...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Routing In Wireless Sensor Networks For Energy Efficient Data Collection
In Wireless sensor network sensor nodes have a limited battery life and their efficient utilization is a very much importent task. Their are many ways are proposed for efficient utilization of energy.For efficie...