Location:
Search - energy in wsn
Search list
Description: Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this paper LEACH-TM introduces the concept of Trust, designs the cluster-head adjusting procedure and establishes multi-path with cluster-heads ting as routers.The simulation illustrates that LEACH-TM makes much progress in the reliability of data transmission, the tribution
of cluster heads and the lifetime of networks.-Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this paper LEACH-TM introduces the concept of Trust, designs the cluster-head adjusting procedure and establishes multi-path with cluster-heads ting as routers.The simulation illustrates that LEACH-TM makes much progress in the reliability of data transmission, the tribution
of cluster heads and the lifetime of networks.
Platform: |
Size: 266240 |
Author: Amir |
Hits:
Description: Abstract—the application of wireless sensor network (WSN) is always restricted by the energy shortage of sensor nodes. In order to reduce the entire energy consumption of the WSN, a promising approach is to design light clustering algorithms.LEACH is such a well-known clustering algorithm that was designed to distribute the energy consumption to nodes in the WSN evenly. LEACH is characterized by its attactive clusterbased strategy however, in the algorithm, energy dissipation of
entire network is still great during the process that cluster-heads (CH) transmit data to base station (BS). In this paper, based on
LEACH, we propose a modified clustering orithm which is named ESCAL. In ESCAL, CHs won’t communicate with BS directly, but transfer aggregated data to the nearest node in term
of received signal strength then this elected nearest node willcompress and forward the data to BS.-Abstract—the application of wireless sensor network (WSN) is always restricted by the energy shortage of sensor nodes. In order to reduce the entire energy consumption of the WSN, a promising approach is to design light clustering algorithms.LEACH is such a well-known clustering algorithm that was designed to distribute the energy consumption to nodes in the WSN evenly. LEACH is characterized by its attactive clusterbased strategy however, in the algorithm, energy dissipation of
entire network is still great during the process that cluster-heads (CH) transmit data to base station (BS). In this paper, based on
LEACH, we propose a modified clustering orithm which is named ESCAL. In ESCAL, CHs won’t communicate with BS directly, but transfer aggregated data to the nearest node in term
of received signal strength then this elected nearest node willcompress and forward the data to BS.
Platform: |
Size: 86016 |
Author: Amir |
Hits:
Description: this script is of circular topology of energy efficient in WSN using AODV routing protocol.
Platform: |
Size: 2048 |
Author: karthik |
Hits:
Description: 覆盖保存是WSN的一个基本质量要求。选择一个最佳的簇头,以满足长时间的监视区域的完全覆盖。使用覆盖意识的方法来选择簇头,而不是基于能量的方法,可以增加场景有效时间。-WSN coverage preservation is a basic quality requirements. Choose one of the best cluster head in order to meet long surveillance area completely covered. Awareness of the methods used to select the cover cluster head, rather than energy-based method, can increase the effective time of the scene.
Platform: |
Size: 171008 |
Author: 李晶 |
Hits:
Description: 文研究了无线传感器网络中增加协作传输及其能量效率,解决了“何时协作”和“协作的能效”两个关键问题。
无线传感器网络;增加协作传输:直接传输;能量效率-The scheme of incremental cooperation transmission and its energy efficiency in wireless sensor networks arestudied in this paper.
Wireless Sensor Networks(WSN);Incremental cooperation transmission;Direct transmission;Energy efficiency
Platform: |
Size: 313344 |
Author: psy |
Hits:
Description: we have discussed HCTA based tracking and single hop routing and LEACH based
tracking and clustering routing. LEACH based tracking is divides sensor nodes in cluster. In each
cluster CH (cluster head) applies aggregation process on packets then directly transmits to sink node.
Thus, minimum packets transmit and packets does not route entire sensor nodes in WSN. CHs in
clusters transmit packets based on carrier sense multiple access collision avoidance (CSMA/CA), to prevent collision and minimize transmission and reception process. Overall energy conserve by LEACH during simulation is same.
Platform: |
Size: 4096 |
Author: FH |
Hits:
Description:
In our work we extend the LEACH s cluster head selection algorithm in WSN based on different node characteristics like, density, centrality and energy. This paper focuses on increasing the lifetime of wireless sensor networks.
Platform: |
Size: 50176 |
Author: raj |
Hits:
Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
-- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: |
Size: 1024 |
Author: sampath |
Hits:
Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
-- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: |
Size: 1024 |
Author: sampath |
Hits:
Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
-- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
- occurs when a link or node is carrying so much data that its quality of service deteriorates.
- queuing delay, packet loss or the blocking of new connections.
- cause missing packets, low energy efficiency, and long delay.
Trust management is very important in WSN.
. Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source.
.Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: |
Size: 1024 |
Author: sampath |
Hits:
Description: 比较无线传感网络节点在不同算法下的能耗
-Comparative wireless sensor network node in different algorithm of energy consumption
Platform: |
Size: 80896 |
Author: 张迪 |
Hits:
Description: 论文:在无线传感器网络中,传感器节点收集本地数据,通常通过其它节点将数据转发给基站,因而离基站越近的节点,消耗
的能量越多.如果采用通常的方法,即均匀布置传感器节点,则基站附近的节点将很快消耗完能量,基站也就无法收集数据.本
文通过研究无线传感器网络中的能量消耗,得到了一个布置传感器节点的密度函数,按此函数布置传感器节点可以有效地延长
系统的生命期.理论分析和模拟结果表明,本文的布置方案将系统生命期提高到均匀布置方案的3R2t倍,这里t为传感器节点的
通信距离,R为传感器节点的分布区域半径.-Fusion-based Sensor Placement for Target Detection with Guaranteed Accuracy
Abstract:In sensor networks,sensor nodes collect local data and transfer these data to the base station often relayed by other
nodes.Therefore sensor nodes that are nearer to the base station will consume more energy. If deploying sensor nodes in
general way, i.e. deploying nodes uniformly in the network, sensor nodes nearby the base station will use up energy soon and
the base station can t collect data anymore. This paper presents a density function to deploy sensor nodes through investigating
energy consumption in wireless sensor network. Theoretical analysis and simulation result show that deploying by method of
this paper improve system lifetime to times of deploying uniformly, where t is radio distance of sensor node and R is radius of
the region of deploying sensor nodes.
Platform: |
Size: 102400 |
Author: 子木 |
Hits:
Description: Wireless Sensor Networks (WSN) are becoming popular day by day,
however one of the main issue in WSN is its limited resources. We
have to look to the resources to create Message Authentication Code
(MAC) keeping in mind the feasibility of technique used for the
sensor network at hand. This research work investigates different
cryptographic techniques such as symmetric key cryptography and
asymmetric key cryptography. Furthermore, it compares different
encryption techniques such as stream cipher (RC4), block cipher
(RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5,
SHA, SHA1 etc). The result of our work provides efficient
techniques for communicating device, by selecting different
comparison matrices i.e. energy consumption, processing time,
memory and expenses that satisfies both the security and restricted
resources in WSN environment to create MAC.
Platform: |
Size: 747520 |
Author: zu |
Hits:
Description: Energy Harvesting wireless sensor network(EH-WSN) is a kind of WSN that
uses rechargeable power supply instead of using traditional battery.
In traditional WSN, the energy sources is limited. When the power source of
node nish, it can not continue to work unless it is recharged again. So the
eort was to design energy-ecient network protocols to maximize the lifetime
of WSN by minimizing energy usage.if we can have access to unlimited power, we can have innite
lifetime in network. This unlimited power can be provide by environment such
as light, vibration and heat. Then stores the harvested energy in a storage
device. When the device uses energy harvested instead of battery, the residual
energy is no more an useful quantity to preserve. In EH-WSN, if the rate of
harvesting power is lesser than the power used by the node, the sensor node
should go to sleep to charge up.
Platform: |
Size: 1024 |
Author: minna |
Hits:
Description: In wireless sensor network, residual energy of node is very important criteria. Life of wireless sensor network depend the energy of node. In most of the application, the nodes are battery operated. So it is very important to select the parameters like nodes deployment in network, size of packet, etc. In work,analyze node’s energy with respect to packet size, distance, time and also how much data can be transmitted. And finally we will conclude for the effective value of these parameters.
Platform: |
Size: 659456 |
Author: Gaurang Rathod |
Hits:
Description: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing.
In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
Platform: |
Size: 223232 |
Author: pardeep |
Hits:
Description: A Cross-Layer Approach to Energy Balancing in Wireless Sensor Networks
Platform: |
Size: 178176 |
Author: Mike |
Hits:
Description: Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.
Platform: |
Size: 1106548 |
Author: atrakpc@yahoo.com |
Hits:
Description: WSN Energy Efficient
Platform: |
Size: 57344 |
Author: srinihp
|
Hits:
Description: Energy efficient Routing Protocol fro Wireless Sensor Networks
Platform: |
Size: 150528 |
Author: lami
|
Hits: