slugMaximizing Network Lifetime of Wireless Sensor Network-A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2013, Vol 1, Issue 4
Abstract
Wireless sensor networks are becoming increasingly important in recent years due to their ability to detect and convey realtime information for many civilian and military applications. Wireless sensor network deployed thousand of nodes in not easily accessible places that operate with batteries. It can be difficult or impossible to replace or recharge the batteries of the sensor nodes. So to maximize the network lifetime has become a big challenge in the Wireless network. This paper presents a brief survey on various techniques employed for maximizing network lifetime of a wireless sensor networks. We also address some other challenges related to network lifetime of wireless sensor networks that need to be considered in future designs.
Authors and Affiliations
Deepika Thakral
Seismic Analysis & Design of Multistorey Steel Building
Steel is one of the most widely used material for building construction in the world .The inherent strength, toughness and high ductility of steel are characteristics that are ideal for seismic design. To utilize these...
Design and Implementation of Dc-Dc Buck Boost Converter by using 8051 Microcontroller
This paper presents design and implementation of DC-DC Buck Boost converter by using 8051 microcontroller. The switched mode dc-dc converters are most widely used electronic circuits for its high conversion efficiency a...
slugFuzzy Logic Controller based Shunt Active Filter
In this analysis Shunt Active Power Filter (APF) is proposed for the compensation of harmonic currents and reactive power. For this purpose, a fuzzy logic controller is developed to adjust the energy storage of the dc v...
Analysis on Security Evaluation of Pattern Classifiers under Attack
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...
Image Steganography and Cryptography Using Three Level Password Security
Image steganography and cryptography using three level password security is used for transferring sensitive data from one user to other user. The main aim of the project is to provide the users a secure way that helps t...