Welcome![Sign In][Sign Up]
Location:
Search - energy in wsn

Search list

[Industry researchAn_Improveme_of_LEACH_Routing_Protocol_Based_on_T

Description: Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this paper LEACH-TM introduces the concept of Trust, designs the cluster-head adjusting procedure and establishes multi-path with cluster-heads ting as routers.The simulation illustrates that LEACH-TM makes much progress in the reliability of data transmission, the tribution of cluster heads and the lifetime of networks.-Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this paper LEACH-TM introduces the concept of Trust, designs the cluster-head adjusting procedure and establishes multi-path with cluster-heads ting as routers.The simulation illustrates that LEACH-TM makes much progress in the reliability of data transmission, the tribution of cluster heads and the lifetime of networks.
Platform: | Size: 266240 | Author: Amir | Hits:

[Industry researchESCAL_An_Energy_Saving_Clustering_Algorithm_Based

Description: Abstract—the application of wireless sensor network (WSN) is always restricted by the energy shortage of sensor nodes. In order to reduce the entire energy consumption of the WSN, a promising approach is to design light clustering algorithms.LEACH is such a well-known clustering algorithm that was designed to distribute the energy consumption to nodes in the WSN evenly. LEACH is characterized by its attactive clusterbased strategy however, in the algorithm, energy dissipation of entire network is still great during the process that cluster-heads (CH) transmit data to base station (BS). In this paper, based on LEACH, we propose a modified clustering orithm which is named ESCAL. In ESCAL, CHs won’t communicate with BS directly, but transfer aggregated data to the nearest node in term of received signal strength then this elected nearest node willcompress and forward the data to BS.-Abstract—the application of wireless sensor network (WSN) is always restricted by the energy shortage of sensor nodes. In order to reduce the entire energy consumption of the WSN, a promising approach is to design light clustering algorithms.LEACH is such a well-known clustering algorithm that was designed to distribute the energy consumption to nodes in the WSN evenly. LEACH is characterized by its attactive clusterbased strategy however, in the algorithm, energy dissipation of entire network is still great during the process that cluster-heads (CH) transmit data to base station (BS). In this paper, based on LEACH, we propose a modified clustering orithm which is named ESCAL. In ESCAL, CHs won’t communicate with BS directly, but transfer aggregated data to the nearest node in term of received signal strength then this elected nearest node willcompress and forward the data to BS.
Platform: | Size: 86016 | Author: Amir | Hits:

[Internet-Networkcir1

Description: this script is of circular topology of energy efficient in WSN using AODV routing protocol.
Platform: | Size: 2048 | Author: karthik | Hits:

[matlabCPCP

Description: 覆盖保存是WSN的一个基本质量要求。选择一个最佳的簇头,以满足长时间的监视区域的完全覆盖。使用覆盖意识的方法来选择簇头,而不是基于能量的方法,可以增加场景有效时间。-WSN coverage preservation is a basic quality requirements. Choose one of the best cluster head in order to meet long surveillance area completely covered. Awareness of the methods used to select the cover cluster head, rather than energy-based method, can increase the effective time of the scene.
Platform: | Size: 171008 | Author: 李晶 | Hits:

[3G developCooperation-Transmission-WSN

Description: 文研究了无线传感器网络中增加协作传输及其能量效率,解决了“何时协作”和“协作的能效”两个关键问题。 无线传感器网络;增加协作传输:直接传输;能量效率-The scheme of incremental cooperation transmission and its energy efficiency in wireless sensor networks arestudied in this paper. Wireless Sensor Networks(WSN);Incremental cooperation transmission;Direct transmission;Energy efficiency
Platform: | Size: 313344 | Author: psy | Hits:

[Compress-Decompress algrithmsleachRouting.tar

Description: we have discussed HCTA based tracking and single hop routing and LEACH based tracking and clustering routing. LEACH based tracking is divides sensor nodes in cluster. In each cluster CH (cluster head) applies aggregation process on packets then directly transmits to sink node. Thus, minimum packets transmit and packets does not route entire sensor nodes in WSN. CHs in clusters transmit packets based on carrier sense multiple access collision avoidance (CSMA/CA), to prevent collision and minimize transmission and reception process. Overall energy conserve by LEACH during simulation is same.
Platform: | Size: 4096 | Author: FH | Hits:

[BooksAttachments_2012_07_12

Description: In our work we extend the LEACH s cluster head selection algorithm in WSN based on different node characteristics like, density, centrality and energy. This paper focuses on increasing the lifetime of wireless sensor networks.
Platform: | Size: 50176 | Author: raj | Hits:

[OtherAODVSampath

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-UnixAODVkalai

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-Unixsskal

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[OtherMATLAB-WSN-node-energy-consumption

Description: 比较无线传感网络节点在不同算法下的能耗 -Comparative wireless sensor network node in different algorithm of energy consumption
Platform: | Size: 80896 | Author: 张迪 | Hits:

[Other Embeded programeploying-Sensor-Nodes-in-WSN

Description: 论文:在无线传感器网络中,传感器节点收集本地数据,通常通过其它节点将数据转发给基站,因而离基站越近的节点,消耗 的能量越多.如果采用通常的方法,即均匀布置传感器节点,则基站附近的节点将很快消耗完能量,基站也就无法收集数据.本 文通过研究无线传感器网络中的能量消耗,得到了一个布置传感器节点的密度函数,按此函数布置传感器节点可以有效地延长 系统的生命期.理论分析和模拟结果表明,本文的布置方案将系统生命期提高到均匀布置方案的3R2t倍,这里t为传感器节点的 通信距离,R为传感器节点的分布区域半径.-Fusion-based Sensor Placement for Target Detection with Guaranteed Accuracy Abstract:In sensor networks,sensor nodes collect local data and transfer these data to the base station often relayed by other nodes.Therefore sensor nodes that are nearer to the base station will consume more energy. If deploying sensor nodes in general way, i.e. deploying nodes uniformly in the network, sensor nodes nearby the base station will use up energy soon and the base station can t collect data anymore. This paper presents a density function to deploy sensor nodes through investigating energy consumption in wireless sensor network. Theoretical analysis and simulation result show that deploying by method of this paper improve system lifetime to times of deploying uniformly, where t is radio distance of sensor node and R is radius of the region of deploying sensor nodes.
Platform: | Size: 102400 | Author: 子木 | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[matlabenergyharvesting

Description: Energy Harvesting wireless sensor network(EH-WSN) is a kind of WSN that uses rechargeable power supply instead of using traditional battery. In traditional WSN, the energy sources is limited. When the power source of node nish, it can not continue to work unless it is recharged again. So the eort was to design energy-ecient network protocols to maximize the lifetime of WSN by minimizing energy usage.if we can have access to unlimited power, we can have innite lifetime in network. This unlimited power can be provide by environment such as light, vibration and heat. Then stores the harvested energy in a storage device. When the device uses energy harvested instead of battery, the residual energy is no more an useful quantity to preserve. In EH-WSN, if the rate of harvesting power is lesser than the power used by the node, the sensor node should go to sleep to charge up.
Platform: | Size: 1024 | Author: minna | Hits:

[Program docrf-energy-analysis-in-WSN

Description: In wireless sensor network, residual energy of node is very important criteria. Life of wireless sensor network depend the energy of node. In most of the application, the nodes are battery operated. So it is very important to select the parameters like nodes deployment in network, size of packet, etc. In work,analyze node’s energy with respect to packet size, distance, time and also how much data can be transmitted. And finally we will conclude for the effective value of these parameters.
Platform: | Size: 659456 | Author: Gaurang Rathod | Hits:

[Program docA-REVIEW-PAPER-ON-ENERGY-EFFICIENT

Description: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
Platform: | Size: 223232 | Author: pardeep | Hits:

[Technology ManagementA-Cross-Layer-Approach-to-Energy-Balancing-in-WSN

Description: A Cross-Layer Approach to Energy Balancing in Wireless Sensor Networks
Platform: | Size: 178176 | Author: Mike | Hits:

[DocumentsA Survey of Localization in Wireless Sensor Network

Description: Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.
Platform: | Size: 1106548 | Author: atrakpc@yahoo.com | Hits:

[Communication-MobileOnline-examination-system-in-php-master

Description: WSN Energy Efficient
Platform: | Size: 57344 | Author: srinihp | Hits:

[matlabHCR Protocol in Matlab by www.wsnlab.ir

Description: Energy efficient Routing Protocol fro Wireless Sensor Networks
Platform: | Size: 150528 | Author: lami | Hits:
« 1 23 4 »

CodeBus www.codebus.net