TEDDEEC: Threshold Enhanced Developed Distributed Energy-Efficient Clustering Protocol for Heterogeneous Wireless Sensor Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 6
Abstract
In wireless sensor networks, hundreds or thousands of sensor networks are deployed in a field to sense data (like temperature, light, pressure, sound etc.) and then they transmit it to sink nodes or base station via a radio transmitter. At one side where these networks have numerous applications, they suffer from a major disadvantage on the other side. These sensor nodes are power constrained and hence they have limited lifetime. Once deployed, these nodes cannot be recharged, therefore researchers are developing protocols to enhance network lifetime. Protocols had been modified one after the other so as to save energy during their every transmission. Clustering technique was used and it was found that it is more optimistic way to save energy. In this paper, we propose a new clustering protocol: Threshold Enhanced Developed and Distributed energy-Efficient Clustering Protocol (TEDDEEC) for heterogeneous wireless sensor networks. In this technique, a modified value of threshold is presented on which a node will decide whether to become CH or not. Simulation results show that this protocol outperforms as compared to its conventional counterparts.
Authors and Affiliations
Aditi Sharma, Harjit Singh
ANNOTATIONS IN E-LEARNING
Web-based learning has become an important way to enhance learning and teaching, offering many learning opportunities. A limitation of current Web-based learning is the restricted ability of students to personalize and a...
Information Hiding Using Mosaic Images with Random Image Key Generation
Image watermarking is one of the efficient technique to send the secrete information from sender to receiver. The concept of information hiding using mosaic images is also an efficient technique of keeping the informatio...
Fair Certified Email Protocol
In this paper, a new fair certified email protocol is proposed. The proposed protocol uses offline trusted third party (TTP) that will only be involved if a party misbehaves, otherwise the TTP is inactive. The protocol i...
A Comparative Study of Color Image Segmentation Using Hard, Fuzzy,Rough Set Based Clustering Techniques
Image segmentation is the process of subdividing an image into its constituent parts and extracting these parts of interest, which are the objects. Colour image segmentation emerges as a new area of research. It can solv...
E-parliament and Democratic Representation in African States: Prospects and Challenges
A healthy and credible legislature is indispensable for representative liberal democratic governance. While representation involves informing and listening to those represented and making decisions and exercising influen...