Review Study of Leach Protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
WSN is a wireless Sensor Network which is a power constrained system. In WSN nodes have limited power batteries which depend upon energy efficiency. In WSN there is major issue of energy efficiency. Energy can be consumed by various protocols in WSN. LEACH is one of them. It works on clustering technique. Now a day’s so many versions of LEACH occur. From these versions a few latest versions are discussed in this which are A-LEACH, K-LEACH, O-LEACH and V-LEACH, EELBCRP are discussed. All the three are performed best to reduce the consumption of energy. Also helps in increasing the network life time. This paper gives the review study of the latest versions of leach protocol. These are discussed below in different sections of paper.
Authors and Affiliations
Sarbpreet Kaur, Er. Harinderpal Singh
Experimental Investigation for Thermal Conductivity Enhancement of Ethylene Glycol Based Nano Fluid Containing ZnO Nanoparticles
Experimental study of effective thermal conductivity of ZnO based Nano fluid is presented in this research. The Nano fluid was prepared by dispersing ZnO nanoparticles in ethylene glycol using a sonicator and adding sur...
Efficient Monitoring Of Transportation Networks by Mobile Sensors
Morden day traffic management systems need to be sophisticated to handle the traffic issues efficiently. We have seen in the past till the recent days that fixed sensors were used to monitor the transportation network....
Review: Recommender System
Internet users are increasing at an amazing speed. With increasing use of internet, the use of online sites for the purchase, sale of products such as movies, songs, books, videos, apparels etc. has also increased. This...
An IOT Enabled Smart Inverter
Inverters and routers are commonly found in most households applications in today’s life. However this work we discuss the implementation of a IOT enabled smart inverter i.e. a solar charged inverter that uses Wi-Fi tec...
Secure Outsourced Comparison Scheme for Partitioned Databases
In different applications that uses cloud, studies a range of data analysis techniques. The most popular data analysis techniques were association rule mining and frequent itemset mining. In this paper we focus on outso...