Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Recent advancement in wireless communication has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (such as health, military, home and etc.,). In earlier research, an energy-efficient cluster-based adaptive time-division multiple access (TDMA) medium-access-control (MAC) protocol, named EA-TDMA, has been developed. In this work, a new protocol, named E-BMA, which achieves even better energy efficiency for low and medium traffic by minimizing the idle time during the contention period has been proposed. Simulation results for the energy consumption of TDMA, EA-TDMA, BMA, and E-BMA have been presented to demonstrate the superiority of the E-BMA protocols
Authors and Affiliations
Dr. K. Ramasamy
Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological da...
Computer Forensic Investigation on Hard Drive Data Recovery: A Review Study
Abstract: Computer Forensics is a science of seeking evidence found in computers and digital storage media. The main challenge before computer forensic investigatorsis to examine digital media with the aim of finding, co...
The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing
Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...
The effect of Encryption algorithms Delay on TCP Traffic overdata networks
Abstract: Security is a big concern for data networks users. Data encryption considered to be one of the bestsolutions for security issues. There are some standard encryption algorithms that used to encrypt transfe...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...