Wireless Sensor Grids Energy Efficiency Enrichment UsingQuorum Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wirelesssensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, itis crucial for them to efficiently use their battery resources. Most of the existing power-saving protocolsachieve power savings by periodically putting sensor nodes to sleep. Such a regular sleep/awakemechanism f a i l s to adjust a s e n s o r node ’s snooze period based on its traffic congestion, thus causingeither inferior power efficacy or higher latency. Furthermore, sensors may be positioned in antagonisticatmospheres and may thus surprisingly fail. Most power-saving protocols do not promptly react to suchlink breakage, resulting in long transmission delays. This paper, proposes a quorum-based medium accesscontrol (QMAC) protocol that enables sensor nodes to snooze longer under light loads. As the flow is towardsthe sink node i.e., the next-hop group, is also proposed to reduce transmission latency. Results authenticatethat the planned QMAC hoards more energy and keeps the communication potential low.
Authors and Affiliations
Manas Srivastava , C. Jawahar Sandeep
Next Generation Genetic Algorithm for Maximum Clique Problem
Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...
Providing The Security Against The DDOS Attack In Mobile AdHoc Networks
Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
Wireless network is the latest and popular technology nowadays. Due to its ample advantage in various fields, it has always been the prime target for hackers and attackers to break through its security and the...
A Survey on Load Balancing Techniques in Cloud Computing
Abstract : Load Balancing is the one of the most significant parts in distributed environments. As Cloud Computing is one of the best platform that gives storage of data in very minimal cost and accessible for all time...
A Challenge to Analyze and Detect Altered Human Fingerprints
The deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has escalated the need for ensuring that these systems are not compromised. Several proble...