DBET: Demand Based Energy efficient Topology for MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic conditions. The first method is not effective in high traffic conditions. Similarly, the second method is not effective in low traffic networks. So, in this paper we propose a Demand Based Energy efficient Topology (DBET) to reduce the energy consumption for mobile ad hoc network, by dynamically adjusting the topology for various network traffic conditions. We have simulated our proposed protocol DBET by using AODV [8] as routing protocol in network simulator ns2.33 [1] and compared with AODV and SPAN [3]. The simulation studies revealed that the proposed scheme perform better in terms of energy, delay, and delivery ratio.in this paper newly we are implementing the security factor while sending the packets. For that we using RSA algorithm.
Authors and Affiliations
Pawar Priyanka , Auti Sarika, , Jadhav Roshana , Dighe Snehal
Image Multi-Classification using PHOW Features
Abstract: Automatic labeling and classification of a vast number of images is a huge challenge, so machines are used as a part of image classification and annotation is turned into a prerequisite to adapt to the high imp...
Empirical Evaluation of machine learning techniques for software effort estimation
Accurate estimation of software development effort is a very difficult job.Both under estimation as well as over estimation can lead to serious consequences. So its very important to find a technique which can yiel...
Clustering Of Images Based On Image Properties
Abstract: Image Properties are used for the analysis of quality of the given image. The Intensity images, Contrast images, Weibull images and Fractal images are extracted from the input images. Eight basic image properti...
Comparative Study of Clustering Algorithms Used in CounterTerrorism
Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in thepro...
M-Wallet Security using Cued Click Points
Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential in...