SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1955
I. INTRODUCTION
A. Wireless sensor networks
Efficient design, performance and implementation of
wireless sensor networks have become a hot area of research
in recent years, due to the vast potential of sensor networks
to enable applications that connect the physical world to the
virtual world. By networking large numbers of tiny sensor
nodes, it is possible to obtain data about physical
phenomena that was difficult or impossible to obtain in
more conventional ways. In the coming years, as advances
in micro-fabrication technology allow the cost of
manufacturing sensor nodes to continue to drop, increasing
deployments of wireless sensor networks are expected, with
the networks eventually growing to large numbers of nodes.
Potential applications for such large-scale wireless sensor
networks exist in a variety of fields, including medical
monitoring, environmental monitoring, surveillance, home
security, military operations, and industrial machine
monitoring.
Fig. 1 Sensor nodes scattered in a sensor field And the
Components of a single sensor node
(Source [1]).
B. Network model
1) The single hierarchy network model identical with
the one of LEACH with assumptions as follow
[21]:
2) All nodes are the same, static, and have enough
computing capacity to support different MAC
protocols and data processing.
3) The radio signal has identical energy attenuation in
all directions, and the wireless channel is
symmetric.
4) All nodes can communicate with each other and the
sink in single hop mode.
5) All nodes can be aware of their own residual
energy and adapt transmission power according to
communication distances.
6) Sinks are static, and with enough power supply.
7) Each node transmits data at given time slot. The
data sensed by adjacent nodes are correlative, so
the cluster head can fuse the collective data.
Fig. 2: Network Model
C. Energy model
Heinzelman et al. [1] used the first order radio model. To
transmit a k-bit data to a distance d, the radio hardware
energy consumption is:
Where Eelec is the factor of electronics energy consumption.
εfs and εmp are identical to the ones in receiver.
d0 is the reference distance between transmitter and
receiver, which is given by
To receive a k-bit data, the radio expends:
It is assumed that the sensed information is correlated,
thus cluster-head can always aggregate the data gathered
from its members into a single length-fixed packet. Cluster-
head aggregates k-bit data from n members to expend:
Where EDA is the factor of data aggregation
Based on Heterogeneity and Electing Probability of Nodes
Improvement in LEACH
Zaki Anwer1
Amandeep Kaur Brar2
1, 2
Punjabi University, Patiala
Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1956
Fig. 3: First order radio model [1]
D. ROUTING PROTOCOLS IN WSNs
1) Flooding
Flooding [23] is an old routing mechanism that may also be
used in sensor networks. In flooding, a node sends out the
received data or the management packets to its neighbors by
broadcasting, unless a maximum number of hops for that
packet are reached or the destination of the packets is
arrived.
2) GOSSIPING
Gossiping protocol is an alternative to flooding mechanism.
In Gossiping [24], nodes can forward the incoming
data/packets to randomly selected neighbor node. Once a
gossiping node receives the messages, it can forward the
data back to that neighbor or to another one randomly
selected neighbor node. This technique assists in energy
conservation by randomization.
3) SPIN
SPIN (Sensor Protocols for Information via Negotiation)
[25] is a family of adaptive protocols for WSNs. Their
design goal is to avoid the drawbacks of flooding protocols
mentioned above by utilizing data negotiation and resource
adaptive algorithms.
4) Directed Diffusion
Directed diffusion [26] is another data dissemination and
aggregation protocol. It is a data-centric and application
aware routing protocol for WSNs. It aims at naming all data
generated by sensor nodes by attribute-value pairs. Directed
diffusion consists of several elements; first of all, naming;
where task descriptors, sent out by the sink, are named by
assigning attribute-value pairs.
5) PEGASIS
PEGASIS (Power-Efficient Gathering in Sensor Information
Systems) is a greedy chain-based power efficient algorithm
[29]. Also, PEGASIS is based on LEACH (the scenario and
the radio model in PEGASIS are the same as in LEACH).
6) GEAR
GEAR (Geographical and Energy Aware Routing) [30] is a
recursive data dissemination protocol WSNs. It uses energy
aware and geographically informed neighbor selection
heuristics to rout a packet to the targeted region. Within that
region, it uses a recursive a geographic informed mechanism
to disseminate the packet.
7) LEACH PROTOCOL
LEACH (Low Energy Adaptive Clustering Hierarchy) [27]
is a self-organizing, adaptive clustering-based protocol that
uses randomized rotation of cluster-heads to evenly
distribute the energy load among the sensor nodes in the
network.
LEACH based on two basic assumptions:
(a) base station is fixed and located far away from the
sensors, and
(b) all nodes in the network are homogeneous and energy
constrained.
The idea behind LEACH is to form clusters of the sensor
nodes depending on the received signal strength and use
local cluster heads as routers to route data to the base
station.
The key features of LEACH are:
1) Localized coordination and control for cluster set-
up and operation.
2) Randomized rotation of the cluster ”base stations”
or ”cluster-heads” and the corresponding clusters.
3) Local compression to reduce global
communication.
In LEACH, the operation is separated into fixed-length
rounds, where each round starts with a setup phase followed
by a steady-state phase. The duration of a round is
determined priori. LEACH algorithm works as follows:
1) Advertisement phase:
In this phase, nodes elect themselves to be a cluster-
heads for the current round (r) through a cluster-head
advertisement message. For this cluster-head
advertisement, the cluster heads use CSMA MAC
protocol. After the completion of this phase, and
depending on the received advertisement signal
strength; the non cluster-head nodes (their receivers
must be kept on during this phase to hear the
advertisements of all cluster-heads) determine the
cluster to which they will belong to for this current
round (r). At each round, a node n selects a random
number k that is between 0 and 1. If k is less than a
threshold T(n), then the node becomes a cluster-head
for the current round (r).
Where P is the desired percentage of cluster-heads, r
is the current round, and G is the set of nodes that
have not been cluster heads in the last 1/P rounds.
Since k is randomly selected, then the number of
cluster heads may not be fixed.
2) Cluster set-up phase: After each non-cluster-head
node will has decided to which cluster it belongs, it
informs the cluster-head node that it will be a
member of the cluster. So, each node transmits this
information back to the cluster head using CSMA
MAC protocol.
3) Schedule Creation phase: The cluster-head node
receives all the messages for nodes that would like to
be included in the cluster. Based on the number of
nodes in the cluster, the cluster-head node creates a
TDMA schedule telling each node when it can
transmit. This schedule is broadcast back to the nodes
in the cluster.
4) Data Transmission phase: After the creation of both
the clusters and the TDMA schedule
Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1957
(TDMA is fixed), nodes in the cluster start
transmitting the data they already have during their
allocated transmission time to the cluster-head
(cluster-head node keeps its receiver on all the time to
receive the sent data). Once all the data (sent by
nodes in the cluster) have been received by the
cluster-head node, it will perform signal processing
function to compress the data into a single signal (the
steady-state operation of LEACH networks).
E. Heterogeneous Model for WSN
Nowadays, WSNs attracted lots of researchers because of its
potential wide applications and special challenges. For past
few years, wireless sensor networks mainly focused on
technologies based on the homogeneous wireless sensor
network in which all nodes have same system resource but
recently heterogeneous wireless sensor network is becoming
more and more popular and the results of researches show
that heterogeneous nodes can prolong network lifetime and
improve network reliability without significantly increasing
the cost.
1) Types of Heterogeneous Resources
The heterogeneous resources are basically divided into three
categories: computational heterogeneity, link heterogeneity,
and energy heterogeneity . Computational heterogeneity
means that the heterogeneous node has a more powerful
microprocessor or microcontroller and more storage
memory than the normal node. The sensor nodes with more
powerful computational resources can provide complex data
processing and long-term storage. Link heterogeneity means
that the heterogeneous node has high-bandwidth and long-
haul network transceiver (Ethernet or 802.11 networks) than
the normal node. Link heterogeneity can provide more
reliable data transmission. Therefore, the reliability of the
data transmission will increase by link heterogeneity.
Energy heterogeneity means that the heterogeneous node is
line powered, or its battery is replaceable.
Among above three categories of resource heterogeneity, the
energy heterogeneity is most important because both
computational heterogeneity and link heterogeneity will
consume more battery energy resource. If there is no energy
heterogeneity, computational heterogeneity and link
heterogeneity will bring negative impact to the sensor
network.
2) Impact of Heterogeneous Resources on WSNs
i) Response time: Computational heterogeneity can
decrease the processing latency and link
heterogeneity can decrease the waiting time, hence
response time is decreased.
ii) Lifetime: The average energy consumption will be
less in heterogeneous sensor networks for forwarding
a packet from the normal nodes to the sink, hence life
time is increased. Further, it is also known that if in a
network, heterogeneity is used properly then the
response of the network is tripled and the network’s
lifetime can be increased by 5fold (Yarvis 2005).
II. PROBLEM FORMULATION
A. PROBLEM WITH EXISTING PROTCOLS
There are so many existing protocols but LEACH (Low-
energy Adaptive Cluster Hierarchy) is considered in this
dissertation. The limitations of existing LEACH are found
and formulated in section 6.1.1.
B. PROBLEMS WITH LEACH
1) The time duration of the setup phase is non-
deterministic [3] and the collisions will cause the
time duration too long and hence the sensing
services are interrupted. Due to that Leach may be
unstable during the setup phase that depends on the
density of sensors.
2) Leach [4] is not applicable to networks that are
deployed in large region as it uses single hop
routing where each node can transmit directly to
the cluster head and the sink
3) The cluster heads [3] – [4] used in the LEACH will
consume a large amount of energy if they are
located farther away from the sink.
4) Leach [3] – [4] does not guarantee good cluster
head distribution and it involves the assumption of
uniform energy consumption for the cluster heads.
5) Leach uses dynamic clustering [5] which results in
extra overhead such as the head changes
,advertisement that reduces the energy
consumption gain
C. PROBLEMS WITH ENERGY LEACH
1) Energy leach is not applicable to the network
deployed in large region. Which clearly shows that
Energy leach is not scalable in nature and puts too
many area limitations on the sensor nodes?
2) Energy leach is based on dynamic clustering which
comes up with too many overheads.
3) The protocol assumes [7] that all the nodes brings
same amount of energy capacity in each election
round assuming that being a CH consumes
approximately the same amount of energy for each
node.
III. 7. PROBLEM STATEMENT
In heterogeneous sensor networks, certain nodes become
cluster heads which aggregate the data of their cluster nodes
and transfer it to the sink. An Improved Energy leach
protocol for cluster head selection in a hierarchically
clustered heterogeneous network to reorganize the network
topology efficiently is proposed in this research work. The
proposed algorithm will use thresholding to improve the
cluster head selection. The presented algorithm considers
the sensor nodes in wireless network and randomly
distributed in the heterogeneous network. The coordinates of
the sink and the dimensions of the sensor field are known in
prior.
This research work has proposed a new improved
Energy leach clustering heterogeneous network where the
advanced nodes elect themselves as cluster heads for the
increasing number of rounds based on their higher initial
energy relative to other nodes. However in existing work we
have found that the advance nodes has almost same
probability so which make the selection non-deterministic,
so to remove this problem we have modified the probability
function of the existing Energy leach to give more priorities
Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1958
to advance nodes than normal nodes. The overall objective
is to extend the time when all the nodes are available (i.e.
Stability time of sensor networks).
Comparison of proposed algorithm is also drawn with
existing methods to evaluate the performance of proposed
algorithm.
IV. PERFORMANCE PARAMETERS
1) Stability Period: is the time interval from the start of
network operation until the death of the first sensor
node. We also refer to this period as “stable region.”
2) Instability Period: is the time interval from the death of
the first node until the death of the last sensor node.
We also refer to this period as “unstable region.”
3) Network lifetime: is the time interval from the start of
operation (of the sensor network) until the death of the
last alive node.
4) Number of alive (total, advanced and normal) nodes
per round: This instantaneous measure reflects the total
number of nodes and that of each type that has not yet
expended all of their energy.
5) Throughput: We measure the total rate of data sent
over the network, the rate of data sent from cluster
heads to the sink as well as the rate of data sent from
the nodes to their cluster heads.
V. RESEARCH METHODOLOGY
To attain the objective, step-by-step methodology is used in
this dissertation. To attain the objectives of this dissertation
a suitable algorithm will be proposed and design in
MATLAB. Different type of tests will be implemented using
improved algorithm to test various aspects of the Wireless
Sensor Network. Visualization of the experimental results
will be done and based upon the simulated results suitable
performance results will be drawn.
VI. RESULTS
The simulation has been done in MATLAB. Let us assume a
heterogeneous sensor network with 100 number of sensor
nodes are distributed randomly in the 100 x100 m2
area, as
shown in Figure 3, we denote a normal node with ‘o’, an
advanced node with ‘+’. The base station with ‘x’ is located
at point (50, 50). The values used in the first order radio
model are described in Table 1.
Parameters Values
Sensor Deployment area 100m*100m
Base Station Location 50m*50m
Number of nodes 100
Data packet size 4000 bits
Control packet size 100 bits
Initial energy of sensor 0.5 J
Electronics energy 50 nJ/bit
Free space factor ϵfs 10 pJ/bit/m2
Multipath factor ϵmp 0.0013 pJ/bit/m4
Table 1: Parameter values
The horizontal and vertical coordinates of each sensor are
randomly selected between 0 and maximum value of the
dimension. The size of the message that nodes send to their
cluster heads as well as the size of the (aggregate) message
that a cluster head sends to the base station is set to 50 bytes.
Fig. 4: Node Distribution in EX-LEACH
Lifetime is the criterion for evaluating the performance of
routing protocols in sensor networks. In this work, we
measure the lifetime in terms of the round when the first
node last node dies. We have simulated LEACH in the
presence of homogeneous parameters. Our proposed
protocol is simulated in the presence of different
heterogeneity parameters in the network. The results of
proposed and LEACH simulations are shown in Figure.5
Fig. 5: Dead nodes in LEACH AND EXLEACH
and normal nodes in LEACH and EX-LEACH
A detailed view of the behavior of LEACH and proposed
protocol is illustrated in fig. 5 for different distributions of
heterogeneity. Figure 5 shows that the first node die earlier
in case of LEACH after 803 rounds whereas last node
remain alive for 1388 rounds in LEACH to base station, and
in Proposed scheme the first node died after 867 rounds and
last nodes remain alive for 4106 rounds, which is more than
LEACH . This extended the lifetime and stability of network
system. On the other hand, Figure 6 shows the number of
messages received by the BS. Since in the proposed protocol
more number of alive nodes exists, therefore the packets
received by the proposed protocol is more over more
number of rounds.
Fig. 6: messages received by BS in case of LEACH and
messages received by BS case of EX-LEACH
Figure 6 shows the number of messages received by the BS.
Since in the Proposed protocol more number of alive nodes
exists, therefore the packets received by the Proposed
Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1959
protocol is more over more number of rounds but in case of
existing LEACH protocol the lifetime of the network is less
than the proposed protocol and number of nodes alive is less
than the proposed protocol so the packets sent to BS is less.
VII. CONCLUSION
Wireless sensor network is a combination of wireless
communication and sensor nodes. The network should be
energy efficient with stability and longer lifetime. In this
paper, we have presented clustered heterogeneous wireless
sensor networks where more powerful sensor nodes act as
cluster heads for more number of rounds. The energy drain
rate of battery source is less in advance and super nodes as
compared to normal nodes in the system. Based upon the
simulation results, the proposed protocol has confirmed that
it provides a longer network lifetime as existing LEACH
protocol.
REFERENCES
[1] Heinzelman, Wendi Rabiner, Anantha Chandrakasan,
and Hari Balakrishnan. "Energy-efficient
communication protocol for wireless micro sensor
networks." In System Sciences, 2000. Proceedings of
the 33rd Annual Hawaii International Conference on,
pp. 10-pp. IEEE, 2000.
[2] Chang, Ruay-Shiung, and Chia-Jou Kuo. "An energy
efficient routing mechanism for wireless sensor
networks." In Advanced Information Networking and
Applications, 2006. AINA 2006. 20th International
Conference on, vol. 2, pp. 5-pp. IEEE, 2006.
[3] Xiangning, Fan, and Song Yulin. "Improvement on
LEACH protocol of wireless sensor network."
In Sensor Technologies and Applications, 2007. Sensor
Comm 2007. International Conference on, pp. 260-
264. IEEE, 2007.
[4] Liu, Yuhua, Yongfeng Zhao, and Jingju Gao. "A new
clustering mechanism based on LEACH protocol."
In Artificial Intelligence, 2009. JCAI'09. International
Joint Conference on, pp. 715-718. IEEE, 2009.
[5] Yang, Zhiming, Junyi Liu, and Xuhui Chen. "An
optimal mechanism of LEACH protocol for wireless
sensor networks." In Computing, Communication,
Control, and Management, 2009. CCCM 2009. ISECS
International Colloquium on, vol. 4, pp. 254-257.
IEEE, 2009.
[6] Gengsheng, Zheng, and Hu Zhengbing. "A Clustering
Protocol Based on the Probability Fading Strategy in
WSNs." In Information Engineering and Computer
Science, 2009. ICIECS 2009. International Conference
on, pp. 1-4. IEEE, 2009.
[7] Han, Li. "LEACH-HPR: An energy efficient routing
algorithm for Heterogeneous WSN." In Intelligent
Computing and Intelligent Systems (ICIS), 2010 IEEE
International Conference on, vol. 2, pp. 507-511.
IEEE, 2010.
[8] Guo, Yinghui, Yun Liu, Zhenjiang Zhang, and Fei
Ding. "Study on the energy efficiency based on
improved LEACH in wireless sensor networks." In
Informatics in Control, Automation and Robotics
(CAR), 2010 2nd International Asia Conference on,
vol. 3, pp. 388-390. IEEE, 2010.
[9] Huang, Ying, and Cong Huang. "Cluster algorithm for
electing cluster heads based on threshold energy."
In Electrical and Control Engineering (ICECE), 2010
International Conference on, pp. 2692-2695. IEEE,
2010.
[10] Melese, Desalegn Getachew, Huagang Xiong, and
Qiang Gao. "Consumed energy as a factor for cluster
head selection in wireless sensor networks." In
Wireless Communications Networking and Mobile
Computing (WiCOM), 2010 6th International
Conference on, pp. 1-4. IEEE, 2010.
[11] Wang, Linlin, Jie Liu, and Wei Wang. "An
improvement and simulation of leach protocol for
wireless sensor network." In Pervasive Computing
Signal Processing and Applications (PCSPA), 2010
First International Conference on, pp. 444-447. IEEE,
2010.
[12] Tao, Lu, Zhu Qing-Xin, and Zhang Luqiao. "An
improvement for LEACH algorithm in wireless sensor
network." In Industrial Electronics and Applications
(ICIEA), 2010 the 5th IEEE Conference on, pp. 1811-
1814. IEEE, 2010.
[13] Dahnil, Dahlila P., Yaswant P. Singh, and Chin Kuan
Ho. "Energy-efficient cluster formation in
heterogeneous Wireless Sensor Networks: A
comparative study." In Advanced Communication
Technology (ICACT), 2011 13th International
Conference on, pp. 746-751. IEEE, 2011.
[14] Katiyar, Vivek, Narottam Chand, Gopal Chand
Gautam, and Anil Kumar. "Improvement in LEACH
protocol for large-scale wireless sensor networks." In
Emerging Trends in Electrical and Computer
Technology (ICETECT), 2011 International
Conference on, pp. 1070-1075. IEEE, 2011.
[15] Li, Chenmin, Guoping Tan, Jingyu Wu, Zhen Zhang,
and Lizhong Xu. "Analyzing cluster-head selection
mechanisms and improving the LEACH."
In Electronics, Communications and Control (ICECC),
2011 International Conference on, pp. 747-750. IEEE,
2011.
[16] Shujiang, Li, Du Kuan, and Kong Lixin. "Improvement
and simulation of clustering routing algorithm in
wireless sensor network." In Industrial Electronics and
Applications (ICIEA), 2011 6th IEEE Conference on,
pp. 1068-1073. IEEE, 2011.
[17] Lu, Yingqi, Du Zhang, Ya Chen, Xiao Liu, and Ping
Zong. "Improvement of LEACH in Wireless Sensor
Networks based on balanced energy strategy." In
information and Automation (ICIA), 2012
International Conference on, pp. 111-115. IEEE, 2012.
[18] Chen, Guijun, Xueying Zhang, Jun Yu, and Maofeng
Wang. "An improved LEACH algorithm based on
heterogeneous energy of nodes in wireless sensor
networks." In Computing, Measurement, Control and
Sensor Network
(CMCSN), 2012 International Conference on, pp. 101-
104. IEEE, 2012.
[19] Lindsey, Stephanie, and Cauligi S. Raghavendra.
"PEGASIS: Power-efficient gathering in sensor
information systems." In Aerospace conference
Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1960
proceedings, 2002. IEEE, vol. 3, pp. 3-1125. IEEE,
2002.
[20] Kraus, Sarit, Roni Parshani, and Yuval Shavitt. "A
study on gossiping in transportation
networks." Vehicular Technology, IEEE Transactions
on 57, no. 4 (2008): 2602-2607.

More Related Content

What's hot

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
Santosh Regmi
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
mmjalbiaty
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
praveen369
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
mmjalbiaty
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
IJCSIT Journal
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
graphhoc
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
IJMER
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
Mahmuda Rahman
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
Editor IJCATR
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
ijp2p
 

What's hot (17)

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 

Viewers also liked

Design & optimization of LNG-CNG cylinder for optimum weight
Design & optimization of LNG-CNG cylinder for optimum weightDesign & optimization of LNG-CNG cylinder for optimum weight
Design & optimization of LNG-CNG cylinder for optimum weight
ijsrd.com
 
Fault Injection Approach for Network on Chip
Fault Injection Approach for Network on ChipFault Injection Approach for Network on Chip
Fault Injection Approach for Network on Chip
ijsrd.com
 
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
Semantic Conflicts and Solutions in Integration of Fuzzy Relational DatabasesSemantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
ijsrd.com
 
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
ijsrd.com
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
Overview on SQL Injection Attacks
Overview on SQL Injection AttacksOverview on SQL Injection Attacks
Overview on SQL Injection Attacks
ijsrd.com
 
Study on Flexural Behaviour of Activated Fly Ash Concrete
Study on Flexural Behaviour of Activated Fly Ash ConcreteStudy on Flexural Behaviour of Activated Fly Ash Concrete
Study on Flexural Behaviour of Activated Fly Ash Concrete
ijsrd.com
 
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
ijsrd.com
 
Power Transient Response of EDFA as a function of Wavelength in the scenario ...
Power Transient Response of EDFA as a function of Wavelength in the scenario ...Power Transient Response of EDFA as a function of Wavelength in the scenario ...
Power Transient Response of EDFA as a function of Wavelength in the scenario ...
ijsrd.com
 
A Review on optimization of Dry Electro Discharge Machining Process Parameters
A Review on optimization of Dry Electro Discharge Machining Process ParametersA Review on optimization of Dry Electro Discharge Machining Process Parameters
A Review on optimization of Dry Electro Discharge Machining Process Parameters
ijsrd.com
 
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
ijsrd.com
 
A Review on Laser marking by Nd-Yag Laser and Fiber Laser
 A Review on Laser marking by Nd-Yag Laser and Fiber Laser A Review on Laser marking by Nd-Yag Laser and Fiber Laser
A Review on Laser marking by Nd-Yag Laser and Fiber Laser
ijsrd.com
 
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
ijsrd.com
 
Implementation of Full Adder Cell Using High Performance CMOS Technology
Implementation of Full Adder Cell Using High Performance CMOS TechnologyImplementation of Full Adder Cell Using High Performance CMOS Technology
Implementation of Full Adder Cell Using High Performance CMOS Technology
ijsrd.com
 
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
ijsrd.com
 
Synthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft CoreSynthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft Core
ijsrd.com
 
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINKMathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
ijsrd.com
 
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
ijsrd.com
 

Viewers also liked (18)

Design & optimization of LNG-CNG cylinder for optimum weight
Design & optimization of LNG-CNG cylinder for optimum weightDesign & optimization of LNG-CNG cylinder for optimum weight
Design & optimization of LNG-CNG cylinder for optimum weight
 
Fault Injection Approach for Network on Chip
Fault Injection Approach for Network on ChipFault Injection Approach for Network on Chip
Fault Injection Approach for Network on Chip
 
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
Semantic Conflicts and Solutions in Integration of Fuzzy Relational DatabasesSemantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databases
 
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Overview on SQL Injection Attacks
Overview on SQL Injection AttacksOverview on SQL Injection Attacks
Overview on SQL Injection Attacks
 
Study on Flexural Behaviour of Activated Fly Ash Concrete
Study on Flexural Behaviour of Activated Fly Ash ConcreteStudy on Flexural Behaviour of Activated Fly Ash Concrete
Study on Flexural Behaviour of Activated Fly Ash Concrete
 
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...
 
Power Transient Response of EDFA as a function of Wavelength in the scenario ...
Power Transient Response of EDFA as a function of Wavelength in the scenario ...Power Transient Response of EDFA as a function of Wavelength in the scenario ...
Power Transient Response of EDFA as a function of Wavelength in the scenario ...
 
A Review on optimization of Dry Electro Discharge Machining Process Parameters
A Review on optimization of Dry Electro Discharge Machining Process ParametersA Review on optimization of Dry Electro Discharge Machining Process Parameters
A Review on optimization of Dry Electro Discharge Machining Process Parameters
 
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
 
A Review on Laser marking by Nd-Yag Laser and Fiber Laser
 A Review on Laser marking by Nd-Yag Laser and Fiber Laser A Review on Laser marking by Nd-Yag Laser and Fiber Laser
A Review on Laser marking by Nd-Yag Laser and Fiber Laser
 
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...
 
Implementation of Full Adder Cell Using High Performance CMOS Technology
Implementation of Full Adder Cell Using High Performance CMOS TechnologyImplementation of Full Adder Cell Using High Performance CMOS Technology
Implementation of Full Adder Cell Using High Performance CMOS Technology
 
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...
 
Synthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft CoreSynthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft Core
 
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINKMathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINK
 
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...
 

Similar to Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH

Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
IOSRJECE
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
IJERA Editor
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
acijjournal
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
IJERD Editor
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
IJORCS
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
csijjournal
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
International Journal of Technical Research & Application
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 

Similar to Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH (20)

Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
mahaffeycheryld
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 

Recently uploaded (20)

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 

Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1955 I. INTRODUCTION A. Wireless sensor networks Efficient design, performance and implementation of wireless sensor networks have become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In the coming years, as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes. Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring. Fig. 1 Sensor nodes scattered in a sensor field And the Components of a single sensor node (Source [1]). B. Network model 1) The single hierarchy network model identical with the one of LEACH with assumptions as follow [21]: 2) All nodes are the same, static, and have enough computing capacity to support different MAC protocols and data processing. 3) The radio signal has identical energy attenuation in all directions, and the wireless channel is symmetric. 4) All nodes can communicate with each other and the sink in single hop mode. 5) All nodes can be aware of their own residual energy and adapt transmission power according to communication distances. 6) Sinks are static, and with enough power supply. 7) Each node transmits data at given time slot. The data sensed by adjacent nodes are correlative, so the cluster head can fuse the collective data. Fig. 2: Network Model C. Energy model Heinzelman et al. [1] used the first order radio model. To transmit a k-bit data to a distance d, the radio hardware energy consumption is: Where Eelec is the factor of electronics energy consumption. εfs and εmp are identical to the ones in receiver. d0 is the reference distance between transmitter and receiver, which is given by To receive a k-bit data, the radio expends: It is assumed that the sensed information is correlated, thus cluster-head can always aggregate the data gathered from its members into a single length-fixed packet. Cluster- head aggregates k-bit data from n members to expend: Where EDA is the factor of data aggregation Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH Zaki Anwer1 Amandeep Kaur Brar2 1, 2 Punjabi University, Patiala
  • 2. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH (IJSRD/Vol. 1/Issue 9/2013/0065) All rights reserved by www.ijsrd.com 1956 Fig. 3: First order radio model [1] D. ROUTING PROTOCOLS IN WSNs 1) Flooding Flooding [23] is an old routing mechanism that may also be used in sensor networks. In flooding, a node sends out the received data or the management packets to its neighbors by broadcasting, unless a maximum number of hops for that packet are reached or the destination of the packets is arrived. 2) GOSSIPING Gossiping protocol is an alternative to flooding mechanism. In Gossiping [24], nodes can forward the incoming data/packets to randomly selected neighbor node. Once a gossiping node receives the messages, it can forward the data back to that neighbor or to another one randomly selected neighbor node. This technique assists in energy conservation by randomization. 3) SPIN SPIN (Sensor Protocols for Information via Negotiation) [25] is a family of adaptive protocols for WSNs. Their design goal is to avoid the drawbacks of flooding protocols mentioned above by utilizing data negotiation and resource adaptive algorithms. 4) Directed Diffusion Directed diffusion [26] is another data dissemination and aggregation protocol. It is a data-centric and application aware routing protocol for WSNs. It aims at naming all data generated by sensor nodes by attribute-value pairs. Directed diffusion consists of several elements; first of all, naming; where task descriptors, sent out by the sink, are named by assigning attribute-value pairs. 5) PEGASIS PEGASIS (Power-Efficient Gathering in Sensor Information Systems) is a greedy chain-based power efficient algorithm [29]. Also, PEGASIS is based on LEACH (the scenario and the radio model in PEGASIS are the same as in LEACH). 6) GEAR GEAR (Geographical and Energy Aware Routing) [30] is a recursive data dissemination protocol WSNs. It uses energy aware and geographically informed neighbor selection heuristics to rout a packet to the targeted region. Within that region, it uses a recursive a geographic informed mechanism to disseminate the packet. 7) LEACH PROTOCOL LEACH (Low Energy Adaptive Clustering Hierarchy) [27] is a self-organizing, adaptive clustering-based protocol that uses randomized rotation of cluster-heads to evenly distribute the energy load among the sensor nodes in the network. LEACH based on two basic assumptions: (a) base station is fixed and located far away from the sensors, and (b) all nodes in the network are homogeneous and energy constrained. The idea behind LEACH is to form clusters of the sensor nodes depending on the received signal strength and use local cluster heads as routers to route data to the base station. The key features of LEACH are: 1) Localized coordination and control for cluster set- up and operation. 2) Randomized rotation of the cluster ”base stations” or ”cluster-heads” and the corresponding clusters. 3) Local compression to reduce global communication. In LEACH, the operation is separated into fixed-length rounds, where each round starts with a setup phase followed by a steady-state phase. The duration of a round is determined priori. LEACH algorithm works as follows: 1) Advertisement phase: In this phase, nodes elect themselves to be a cluster- heads for the current round (r) through a cluster-head advertisement message. For this cluster-head advertisement, the cluster heads use CSMA MAC protocol. After the completion of this phase, and depending on the received advertisement signal strength; the non cluster-head nodes (their receivers must be kept on during this phase to hear the advertisements of all cluster-heads) determine the cluster to which they will belong to for this current round (r). At each round, a node n selects a random number k that is between 0 and 1. If k is less than a threshold T(n), then the node becomes a cluster-head for the current round (r). Where P is the desired percentage of cluster-heads, r is the current round, and G is the set of nodes that have not been cluster heads in the last 1/P rounds. Since k is randomly selected, then the number of cluster heads may not be fixed. 2) Cluster set-up phase: After each non-cluster-head node will has decided to which cluster it belongs, it informs the cluster-head node that it will be a member of the cluster. So, each node transmits this information back to the cluster head using CSMA MAC protocol. 3) Schedule Creation phase: The cluster-head node receives all the messages for nodes that would like to be included in the cluster. Based on the number of nodes in the cluster, the cluster-head node creates a TDMA schedule telling each node when it can transmit. This schedule is broadcast back to the nodes in the cluster. 4) Data Transmission phase: After the creation of both the clusters and the TDMA schedule
  • 3. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH (IJSRD/Vol. 1/Issue 9/2013/0065) All rights reserved by www.ijsrd.com 1957 (TDMA is fixed), nodes in the cluster start transmitting the data they already have during their allocated transmission time to the cluster-head (cluster-head node keeps its receiver on all the time to receive the sent data). Once all the data (sent by nodes in the cluster) have been received by the cluster-head node, it will perform signal processing function to compress the data into a single signal (the steady-state operation of LEACH networks). E. Heterogeneous Model for WSN Nowadays, WSNs attracted lots of researchers because of its potential wide applications and special challenges. For past few years, wireless sensor networks mainly focused on technologies based on the homogeneous wireless sensor network in which all nodes have same system resource but recently heterogeneous wireless sensor network is becoming more and more popular and the results of researches show that heterogeneous nodes can prolong network lifetime and improve network reliability without significantly increasing the cost. 1) Types of Heterogeneous Resources The heterogeneous resources are basically divided into three categories: computational heterogeneity, link heterogeneity, and energy heterogeneity . Computational heterogeneity means that the heterogeneous node has a more powerful microprocessor or microcontroller and more storage memory than the normal node. The sensor nodes with more powerful computational resources can provide complex data processing and long-term storage. Link heterogeneity means that the heterogeneous node has high-bandwidth and long- haul network transceiver (Ethernet or 802.11 networks) than the normal node. Link heterogeneity can provide more reliable data transmission. Therefore, the reliability of the data transmission will increase by link heterogeneity. Energy heterogeneity means that the heterogeneous node is line powered, or its battery is replaceable. Among above three categories of resource heterogeneity, the energy heterogeneity is most important because both computational heterogeneity and link heterogeneity will consume more battery energy resource. If there is no energy heterogeneity, computational heterogeneity and link heterogeneity will bring negative impact to the sensor network. 2) Impact of Heterogeneous Resources on WSNs i) Response time: Computational heterogeneity can decrease the processing latency and link heterogeneity can decrease the waiting time, hence response time is decreased. ii) Lifetime: The average energy consumption will be less in heterogeneous sensor networks for forwarding a packet from the normal nodes to the sink, hence life time is increased. Further, it is also known that if in a network, heterogeneity is used properly then the response of the network is tripled and the network’s lifetime can be increased by 5fold (Yarvis 2005). II. PROBLEM FORMULATION A. PROBLEM WITH EXISTING PROTCOLS There are so many existing protocols but LEACH (Low- energy Adaptive Cluster Hierarchy) is considered in this dissertation. The limitations of existing LEACH are found and formulated in section 6.1.1. B. PROBLEMS WITH LEACH 1) The time duration of the setup phase is non- deterministic [3] and the collisions will cause the time duration too long and hence the sensing services are interrupted. Due to that Leach may be unstable during the setup phase that depends on the density of sensors. 2) Leach [4] is not applicable to networks that are deployed in large region as it uses single hop routing where each node can transmit directly to the cluster head and the sink 3) The cluster heads [3] – [4] used in the LEACH will consume a large amount of energy if they are located farther away from the sink. 4) Leach [3] – [4] does not guarantee good cluster head distribution and it involves the assumption of uniform energy consumption for the cluster heads. 5) Leach uses dynamic clustering [5] which results in extra overhead such as the head changes ,advertisement that reduces the energy consumption gain C. PROBLEMS WITH ENERGY LEACH 1) Energy leach is not applicable to the network deployed in large region. Which clearly shows that Energy leach is not scalable in nature and puts too many area limitations on the sensor nodes? 2) Energy leach is based on dynamic clustering which comes up with too many overheads. 3) The protocol assumes [7] that all the nodes brings same amount of energy capacity in each election round assuming that being a CH consumes approximately the same amount of energy for each node. III. 7. PROBLEM STATEMENT In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior. This research work has proposed a new improved Energy leach clustering heterogeneous network where the advanced nodes elect themselves as cluster heads for the increasing number of rounds based on their higher initial energy relative to other nodes. However in existing work we have found that the advance nodes has almost same probability so which make the selection non-deterministic, so to remove this problem we have modified the probability function of the existing Energy leach to give more priorities
  • 4. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH (IJSRD/Vol. 1/Issue 9/2013/0065) All rights reserved by www.ijsrd.com 1958 to advance nodes than normal nodes. The overall objective is to extend the time when all the nodes are available (i.e. Stability time of sensor networks). Comparison of proposed algorithm is also drawn with existing methods to evaluate the performance of proposed algorithm. IV. PERFORMANCE PARAMETERS 1) Stability Period: is the time interval from the start of network operation until the death of the first sensor node. We also refer to this period as “stable region.” 2) Instability Period: is the time interval from the death of the first node until the death of the last sensor node. We also refer to this period as “unstable region.” 3) Network lifetime: is the time interval from the start of operation (of the sensor network) until the death of the last alive node. 4) Number of alive (total, advanced and normal) nodes per round: This instantaneous measure reflects the total number of nodes and that of each type that has not yet expended all of their energy. 5) Throughput: We measure the total rate of data sent over the network, the rate of data sent from cluster heads to the sink as well as the rate of data sent from the nodes to their cluster heads. V. RESEARCH METHODOLOGY To attain the objective, step-by-step methodology is used in this dissertation. To attain the objectives of this dissertation a suitable algorithm will be proposed and design in MATLAB. Different type of tests will be implemented using improved algorithm to test various aspects of the Wireless Sensor Network. Visualization of the experimental results will be done and based upon the simulated results suitable performance results will be drawn. VI. RESULTS The simulation has been done in MATLAB. Let us assume a heterogeneous sensor network with 100 number of sensor nodes are distributed randomly in the 100 x100 m2 area, as shown in Figure 3, we denote a normal node with ‘o’, an advanced node with ‘+’. The base station with ‘x’ is located at point (50, 50). The values used in the first order radio model are described in Table 1. Parameters Values Sensor Deployment area 100m*100m Base Station Location 50m*50m Number of nodes 100 Data packet size 4000 bits Control packet size 100 bits Initial energy of sensor 0.5 J Electronics energy 50 nJ/bit Free space factor ϵfs 10 pJ/bit/m2 Multipath factor ϵmp 0.0013 pJ/bit/m4 Table 1: Parameter values The horizontal and vertical coordinates of each sensor are randomly selected between 0 and maximum value of the dimension. The size of the message that nodes send to their cluster heads as well as the size of the (aggregate) message that a cluster head sends to the base station is set to 50 bytes. Fig. 4: Node Distribution in EX-LEACH Lifetime is the criterion for evaluating the performance of routing protocols in sensor networks. In this work, we measure the lifetime in terms of the round when the first node last node dies. We have simulated LEACH in the presence of homogeneous parameters. Our proposed protocol is simulated in the presence of different heterogeneity parameters in the network. The results of proposed and LEACH simulations are shown in Figure.5 Fig. 5: Dead nodes in LEACH AND EXLEACH and normal nodes in LEACH and EX-LEACH A detailed view of the behavior of LEACH and proposed protocol is illustrated in fig. 5 for different distributions of heterogeneity. Figure 5 shows that the first node die earlier in case of LEACH after 803 rounds whereas last node remain alive for 1388 rounds in LEACH to base station, and in Proposed scheme the first node died after 867 rounds and last nodes remain alive for 4106 rounds, which is more than LEACH . This extended the lifetime and stability of network system. On the other hand, Figure 6 shows the number of messages received by the BS. Since in the proposed protocol more number of alive nodes exists, therefore the packets received by the proposed protocol is more over more number of rounds. Fig. 6: messages received by BS in case of LEACH and messages received by BS case of EX-LEACH Figure 6 shows the number of messages received by the BS. Since in the Proposed protocol more number of alive nodes exists, therefore the packets received by the Proposed
  • 5. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH (IJSRD/Vol. 1/Issue 9/2013/0065) All rights reserved by www.ijsrd.com 1959 protocol is more over more number of rounds but in case of existing LEACH protocol the lifetime of the network is less than the proposed protocol and number of nodes alive is less than the proposed protocol so the packets sent to BS is less. VII. CONCLUSION Wireless sensor network is a combination of wireless communication and sensor nodes. The network should be energy efficient with stability and longer lifetime. In this paper, we have presented clustered heterogeneous wireless sensor networks where more powerful sensor nodes act as cluster heads for more number of rounds. The energy drain rate of battery source is less in advance and super nodes as compared to normal nodes in the system. Based upon the simulation results, the proposed protocol has confirmed that it provides a longer network lifetime as existing LEACH protocol. REFERENCES [1] Heinzelman, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. "Energy-efficient communication protocol for wireless micro sensor networks." In System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, pp. 10-pp. IEEE, 2000. [2] Chang, Ruay-Shiung, and Chia-Jou Kuo. "An energy efficient routing mechanism for wireless sensor networks." In Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on, vol. 2, pp. 5-pp. IEEE, 2006. [3] Xiangning, Fan, and Song Yulin. "Improvement on LEACH protocol of wireless sensor network." In Sensor Technologies and Applications, 2007. Sensor Comm 2007. International Conference on, pp. 260- 264. IEEE, 2007. [4] Liu, Yuhua, Yongfeng Zhao, and Jingju Gao. "A new clustering mechanism based on LEACH protocol." In Artificial Intelligence, 2009. JCAI'09. International Joint Conference on, pp. 715-718. IEEE, 2009. [5] Yang, Zhiming, Junyi Liu, and Xuhui Chen. "An optimal mechanism of LEACH protocol for wireless sensor networks." In Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on, vol. 4, pp. 254-257. IEEE, 2009. [6] Gengsheng, Zheng, and Hu Zhengbing. "A Clustering Protocol Based on the Probability Fading Strategy in WSNs." In Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on, pp. 1-4. IEEE, 2009. [7] Han, Li. "LEACH-HPR: An energy efficient routing algorithm for Heterogeneous WSN." In Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on, vol. 2, pp. 507-511. IEEE, 2010. [8] Guo, Yinghui, Yun Liu, Zhenjiang Zhang, and Fei Ding. "Study on the energy efficiency based on improved LEACH in wireless sensor networks." In Informatics in Control, Automation and Robotics (CAR), 2010 2nd International Asia Conference on, vol. 3, pp. 388-390. IEEE, 2010. [9] Huang, Ying, and Cong Huang. "Cluster algorithm for electing cluster heads based on threshold energy." In Electrical and Control Engineering (ICECE), 2010 International Conference on, pp. 2692-2695. IEEE, 2010. [10] Melese, Desalegn Getachew, Huagang Xiong, and Qiang Gao. "Consumed energy as a factor for cluster head selection in wireless sensor networks." In Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on, pp. 1-4. IEEE, 2010. [11] Wang, Linlin, Jie Liu, and Wei Wang. "An improvement and simulation of leach protocol for wireless sensor network." In Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on, pp. 444-447. IEEE, 2010. [12] Tao, Lu, Zhu Qing-Xin, and Zhang Luqiao. "An improvement for LEACH algorithm in wireless sensor network." In Industrial Electronics and Applications (ICIEA), 2010 the 5th IEEE Conference on, pp. 1811- 1814. IEEE, 2010. [13] Dahnil, Dahlila P., Yaswant P. Singh, and Chin Kuan Ho. "Energy-efficient cluster formation in heterogeneous Wireless Sensor Networks: A comparative study." In Advanced Communication Technology (ICACT), 2011 13th International Conference on, pp. 746-751. IEEE, 2011. [14] Katiyar, Vivek, Narottam Chand, Gopal Chand Gautam, and Anil Kumar. "Improvement in LEACH protocol for large-scale wireless sensor networks." In Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on, pp. 1070-1075. IEEE, 2011. [15] Li, Chenmin, Guoping Tan, Jingyu Wu, Zhen Zhang, and Lizhong Xu. "Analyzing cluster-head selection mechanisms and improving the LEACH." In Electronics, Communications and Control (ICECC), 2011 International Conference on, pp. 747-750. IEEE, 2011. [16] Shujiang, Li, Du Kuan, and Kong Lixin. "Improvement and simulation of clustering routing algorithm in wireless sensor network." In Industrial Electronics and Applications (ICIEA), 2011 6th IEEE Conference on, pp. 1068-1073. IEEE, 2011. [17] Lu, Yingqi, Du Zhang, Ya Chen, Xiao Liu, and Ping Zong. "Improvement of LEACH in Wireless Sensor Networks based on balanced energy strategy." In information and Automation (ICIA), 2012 International Conference on, pp. 111-115. IEEE, 2012. [18] Chen, Guijun, Xueying Zhang, Jun Yu, and Maofeng Wang. "An improved LEACH algorithm based on heterogeneous energy of nodes in wireless sensor networks." In Computing, Measurement, Control and Sensor Network (CMCSN), 2012 International Conference on, pp. 101- 104. IEEE, 2012. [19] Lindsey, Stephanie, and Cauligi S. Raghavendra. "PEGASIS: Power-efficient gathering in sensor information systems." In Aerospace conference
  • 6. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH (IJSRD/Vol. 1/Issue 9/2013/0065) All rights reserved by www.ijsrd.com 1960 proceedings, 2002. IEEE, vol. 3, pp. 3-1125. IEEE, 2002. [20] Kraus, Sarit, Roni Parshani, and Yuval Shavitt. "A study on gossiping in transportation networks." Vehicular Technology, IEEE Transactions on 57, no. 4 (2008): 2602-2607.