SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
DOI: 10.5121/ijcnc.2016.8504 41
ENERGY CONSUMPTION IMPROVEMENT OF
TRADITIONAL CLUSTERING METHOD IN
WIRELESS SENSOR NETWORK
Tran Cong Hung1
and Ly Quoc Hung2
1
Posts and Telecommunications Institute of Technology
2
Ho Chi Minh Technical and Economic College
ABSTRACT
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy
Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation
of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base
station. The main objective of LEACH is: To prolong life time of the network, reduce the energy
consumption by each node, using the data concentration to reduce bulletins in the network. However, in the
case of large network, the distance from the nodes to the base station is very different. Therefore, the
energy consumption when becoming the host node is very different but LEACH is not based on the
remaining energy to choose the host node, which is based on the number of times to become the host node
in the previous rounds. This makes the nodes far away from the base station lose power sooner.
In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating
time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of becoming
the cluster-head than the those in far and with lower energy.
KEYWORDS
LEACH, Life-time, Energy efficient, WSN, Matlab.
1. INTRODUCTION
Wireless sensor networks are used in many fields such as: National Defense, civil, health,
transport, environment and agriculture [1]. Disadvantages of the wireless sensor network are
limited energy, short time of energy supply source (usually battery) for each sensor, limited duty
cycle of each sensor, multiple and changing constantly number of sensor nodes, (when out of the
energy, sensor nodes will be removed from the network , when interrupt radio channel caused by
the obstacle appearing in transmission) makes the structure of the network change [2], [3].
Limiting sensor network energy is due to small available energy in the sensor network, sensors
could hardly load supplement energy (wide dispersion sensors should be hard to recover, some
sensor network located in the dangerous or toxic environments) While it must use energy to
gather news from the surrounding environment and each sensor also needs energy to process,
synthesize and transfer the information constantly to the central node of the network, especially in
volatility of the surrounding environment [4], [5].
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
42
With the special characteristics of the sensor network, especially energy-saving issues and regular
structure change, the recent researches are done at many different levels, from the level of the
element (ability of the sensor node) to level of system (communication efficient and type of
connection) and application level. The most notably issue in the system level is the research
focused on network class in order to design the routing protocols to save energy, extend life of
network [6], [7].
This paper is divided into five parts, part I of introduction, part II presents the related work, part
III improvement of traditional clustering protocol, part IV of simulation results and assessment,
part V of conclusion.
2. RELATED WORK
LEACH is the Low Energy Adaptive Clustering Hierarchy, based on the sort algorithm, of which
the nodes can be randomly distributed, and formed clusters (Self configuring cluster formation).
The host node is able to control the cluster nodes in the cluster to send data to a certain cycle. In
the host node, the data will be collected and processed in many different levels, depending on the
application, before sending to the base station [8].
Figure 1. LEACH protocol.
The common characteristics of the wireless sensor network application are that data of the node
sent, usually, has correlations with each other, end users do not need to request all data (the same
data-Redundant), or just the information that has been processed, described events that appear in
the environment of the sensor node. LEACH routing protocol is very fit to applications with such
characteristics. In LEACH Protocol, due to sensor data sent from the adjacent nodes with a huge
Base
station
Cluster
head
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
43
correlation, all data from the nodes within the cluster will be processed locally at the host node
before sending to the base stations, reduce the excess amount of information circulating on the
network in order to save energy of the node [6].





∈
−=
othewise0
Gnif
)
1
mod*(*1)(
P
rP
P
nT (1)
(1) Formula of thresholds to determine the cluster-head in LEACH.
(2)
where: P = Percentage of wish to become the host node of the
network
r is the current round.
G is the set of nodes not become the host node in (1/P)
previous round.
One of the basic characteristics of LEACH is self-organized network nodes into cluster, in
which one node will act as the cluster-head (CH). All of the nodes not the host node will have to
transmit its data to the host node, the host node will get data from the members of the cluster,
perform local data processing, and then transmit to the base station. Therefore, the host node
will consume more energy than the common nodes. The sensor node's energy is limited, if the
host node is selected fixedly during the life-time of the network, the host node will run out of
energy very quickly [9].
Figure 2. Operation of LEACH.
When the hose node dies, all nodes in the cluster will not be able to exchange information.
Therefore, LEACH makes randomly rotation of the host node role in all network nodes to avoid
energy consumption on a fixed number of nodes [10, 11] Sensors and communications
processes in LEACH protocols are designed appropriately to minimize the energy consumption
for the nodes other than the host node. When the host node knows all the member nodes in the
cluster, it will send a TDMA newsletter to inform each node exactly when to perform the task of
sensors and data transfer to the host node. This mechanism allows the normal nodes to exist in
the Sleep State in most of the time, only when it's time to perform the task of the sensors and
sending data, the node is active. Moreover, using TDMA newsletter for the transmission of data
also helps avoid collision in the cluster [12].
Setup Steady state Frame Round
Time
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
44
3. IMPROVEMENT OF TRADITIONAL CLUSTERING PROTOCOL (LEACH)
In order to improving the life-time of the network in the protocol based on clustering algorithm,
selecting the cluster-head, coefficient of considering most is selecting the cluster-head based on
energy of the nodes. New improved protocol is developed protocol based on the LEACH
algorithm in which electing the cluster-head is based on the remaining energy of the node.
The new protocol is improved based on the remaining energy of the node to determine the
improvement threshold T (n) Improvement applied the following formula:
energyInitial
energyRemaining
tImprovemen)(
E
)
1
mod*(*1
E
P
rP
P
T n ×
−
=
(2)
(2) Formula of threshold (T(n) improvement) to determine the cluster-head.
where:
ERemaining energy : Remaining energy of the nodes
EInitial energy: is the initial energy of the nodes
Selecting the cluster-head based on energy will be more effective, the nodes with high energy
level will have a greater probability of becoming the cluster-head than those with low energy
level, thereby balancing the energy consumption in the whole network.
3.1. Description of Protocol
Similar to LEACH Protocol [13], the Protocol proposes to divide activities of the whole network
into the cycles, each cycle consists of two basic phases: Clustering phase and data transfer phase.
In clustering phase, selecting CH is done based on two factors that are the remaining energy of
the nodes and the distance from the node to the BS. At the beginning of each cycle, the sensor
nodes will generate a random number in the range (0, 1), then this range is compared to the
threshold T (n). Before calculating the threshold T (n) we define:
(3)
(3) The formula determines the distance from the node to the BS.
where: d (i) is the distance from node i to BS.
n is the total number of nodes in the sensor network, (Xi, Yi)
are the coordinates of the i node in the network.
(XBS, YBS) is the coordinates of the BS.
E (i) is the remaining energy of the nodes in the current cycle.
At that time the improved threshold T(n) Improvement will be calculated according to the expression:
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
45






∈
×
−=
Gn
E
P
rP
P
T
i
n
0
d
)
1
mod*(*1 (i)
)(
tImprovemen)( (4)
(4) Formula to determine the improved threshold T(n) Improvement.
where: G is the set of nodes in the cluster head not become the
cluster head in the previous cycle.
p is the percentage of wish to become the cluster head on the
total number of nodes, typically p in the range of 0.05-0.1.
r is the current cycle.
d (i) and E (i) is defined above. If the random value of the
nodes is smaller than value of T (n) threshold, that node will
become the cluster head in the current cycle.
The use of the remaining energy parameters of the nodes will increase the probability of
becoming the cluster head with high energy level, at the same time distance from the cluster head
to nodes will make the node near the base station have a greater probability to become the cluster
head than those far from the base station.
After selecting CH, CH will send its location information to BS, and it will promote the INVITE
messages to the surrounding nodes, this message has the same signal intensity. The common
nodes after receiving the INVITE message if participating in the cluster will send back the
ACCEPT message. If the nodes get many INVITE messages, they will be based on the signal
strength of the INVITE nodes to decide to join the cluster head with the greater INVITE message
signal strength (near the cluster head). If the cluster head does not receive the ACCEPT message,
it will send INVITE messages again, if still don't get the message ACCEPT it will send data
directly to the BS without creating TDMA table.
After the clustering process is the process of data transfer. The process of data transfer includes 2
main steps: Process of transmitting data from the normal nodes to CH and process of transmitting
data from CH to BS. In the process of transmitting data from the nodes to the CH, CH will create
table of TDMA specified data transmission time frame for the nodes in the cluster, it will then
promote this TDMA table to nodes in its cluster. The nodes in the cluster based on this table will
know time to send the data to the CH, in the remaining time the nodes will be in sleep state to
save energy, the method using TDMA allows the nodes to transmit data to the cluster head and
helps avoid collision with other nodes.
3.2. Simulation
In this section, simulation of traditional clustering protocol and new improved protocol use the
same energy model and parameter below.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
46
Figure 3. Energy model used in the simulation.
Table 1. Data contains the parameters to simulate.
Description Value
Network size 100 m * 500 m
Number of sensor nodes used (n) 100
Percentage of wish to become the cluster-head of total
nodes of network (p)
0.05
Location of BS (Xbs, Ybs) (50m, 250m)
Number of bits transmitted (k) 5000
Initial energy of nodes (E0) 0.5
Coefficient of energy consumption of the transmission and
receipt circuit (Eelec)
50nJ/bit
Emp 0.0013 pJ/bit/m4
Efs 10pJ/bit/m2
Energy factor of Amplifying Circuit (Etx, Erx) 50nJ/bit
d0
Based on the energy model used in Figure 3 we have:
where:
k is the number of bits transmitted.
Eelec is the energy consumption on the bits to run the transmitting circuit
or receive the data
Emp or Efs depends on the energy model used or d0 threshold.
Transmitting
circuit
Tx Amplifying Circuit
ETx(d)
Eelec * k Emp * k * d2
k data bits
Receiving circuit
Eelec* k
ERx
d
k data bits
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
47
To get the k data bits of the energy consumption of the ERX is:
elecEkE *RX =
4. SIMULATION RESULTS AND ASSESSMENT
To assess the energy efficiency of new improved protocol with LEACH protocol the author based
on of the following criteria: [5].
New improvement protocol elects cluster head on the basis of initial energy, residual energy and
distance of the nodes from base station. Cluster heads further act as routers to base station and
aggregation of the collected data of its members are also performed by them. New improvement
protocol operation is divided into rounds and each round further consists of two phases: setup and
steady-state. In setup phase New improvement protocol does the cluster heads election, cluster
formation and determine the communication schedules for its members. When cluster formation
is completed in setup phase. New improvement protocol switches to steady state phase. In this
phase it completes the data sensing, data transmission to cluster heads and aggregation of the
collected data of its members . Stabilization time is defined as the period of time from the start of
the operation to the time to stop working of the first node.
The network's life-time is counted from the beginning until the whole nodes stop operating,
assessment of efficiency of the routing protocol.
The data sent from the cluster head to BS: the amount of data successfully transmitted from the
cluster head to the BS, the amount of data shows the effectiveness of the Protocol in the data
transmission to the base station.
− With E0 = 0.25j, over 10 times the experimental run we had tables:
Table 2. Survey of the stabilization time of the network.
Number of times performed
Time of stability
LEACH Improved Protocol
1 1014 1086
2 1011 1090
3 1034 1095
4 1046 1088
5 1022 1085
6 1037 1080
7 1043 1098
8 1012 1076
9 1026 1089
International Journal of Computer Networks & Communications (IJCNC) Vol.8,
10
Fig. 4. Comparison of stability
− With E0 = 0.5j, over 10 times the experimental run we had tables:
Table 3 Survey of life
Number of times performed
1
2
3
4
5
6
7
8
9
10
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September
1039 1092
Comparison of stability life-time of the two protocols (E0 = 0.25).
With E0 = 0.5j, over 10 times the experimental run we had tables:
Table 3 Survey of life-time of the network.
Number of times performed
Lifetime of the network
LEACH Improved Protocol
1700 2100
1781 2203
1765 2188
1803 2098
1708 1943
1769 2076
1722 1983
1790 2119
1804 2101
1791 2089
September 2016
48
Protocol
International Journal of Computer Networks & Communications (IJCNC) Vol.8,
Fig. 5. Comparison of stability
5. CONCLUSION:
Through simulation results we can assess as follows:
With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network
increasing 20%, lifetime of network with increase of 33%.
The use of energy efficient sensor nodes, improving the
network is the most important issue in which optimum energy is considered as the most effective
method in extending operation
routing protocol to enhance the
developed from the traditional clustering protocol (LEACH) by considering energy issues and
distance in selecting the cluster-
have a greater probability to become the cluster head than those at a further distance and with
lower energy. Simulation results show that improved LEACH Protocol increases the operating
time of the whole network from 33% to 51% in comparison with the traditional cl
protocol (LEACH).
However, this Protocol is applied only if the base station is located in the region of the sensor. If
the base station is far from the sensor it will make the distance from the node to the base station
larger, then the threshold used in the small improved LEACH protocol will make the nodes hard
to become the cluster-head or small number of cluster heads will lead to to energy imbalance in
the transmission of data to the base station.
In the future, I will improve this Protocol
Dijkstra algorithm to find the shortest path from:
The nodes to the cluster
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September
Fig. 5. Comparison of stability life-time of the two protocols (E0 = 0.5).
simulation results we can assess as follows:
With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network
increasing 20%, lifetime of network with increase of 33%.
The use of energy efficient sensor nodes, improving the operating time of the wireless sensor
network is the most important issue in which optimum energy is considered as the most effective
time of the network. In this paper, we have improved a new
routing protocol to enhance the operating time of the sensor network. This Protocol was
developed from the traditional clustering protocol (LEACH) by considering energy issues and
-head, at that time the nodes with high energy and near BS will
ater probability to become the cluster head than those at a further distance and with
lower energy. Simulation results show that improved LEACH Protocol increases the operating
time of the whole network from 33% to 51% in comparison with the traditional cl
However, this Protocol is applied only if the base station is located in the region of the sensor. If
the base station is far from the sensor it will make the distance from the node to the base station
used in the small improved LEACH protocol will make the nodes hard
head or small number of cluster heads will lead to to energy imbalance in
the transmission of data to the base station.
In the future, I will improve this Protocol to achieve the energy efficiency and lifetime using
Dijkstra algorithm to find the shortest path from:
The nodes to the cluster-head.
September 2016
49
time of the two protocols (E0 = 0.5).
With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network
operating time of the wireless sensor
network is the most important issue in which optimum energy is considered as the most effective
, we have improved a new
operating time of the sensor network. This Protocol was
developed from the traditional clustering protocol (LEACH) by considering energy issues and
head, at that time the nodes with high energy and near BS will
ater probability to become the cluster head than those at a further distance and with
lower energy. Simulation results show that improved LEACH Protocol increases the operating
time of the whole network from 33% to 51% in comparison with the traditional clustering
However, this Protocol is applied only if the base station is located in the region of the sensor. If
the base station is far from the sensor it will make the distance from the node to the base station
used in the small improved LEACH protocol will make the nodes hard
head or small number of cluster heads will lead to to energy imbalance in
to achieve the energy efficiency and lifetime using
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
50
The cluster-head to the base station.
In addition, another issue that should be of concern is the possibility of moving the nodes:
Meanwhile, updating location information of the cluster head and sensor nodes as well as
transmitting that information on the network can cause a significant energy consumption of the
nodes. The information needs to be processed about the speed of movement and change of
network configuration in terms of limited energy.
REFERENCES
[1] Trịnh Lương Miên (2014), "Tổng quan về mạng cảm biến không dây", Tạp chí tự động hóa ngày nay,
Số 157
[2] TS. Lê Nhật Thăng, and TS. Nguyễn Quý Sỹ (2007), "Các kỹ thuật phân nhóm trong các mạng cảm
biến vô tuyến", Tạp chí Bưu chính viễn thông, Số 301
[3] K. Sohraby, and D. Minoli and T Znati (2007), "Wireless Sensor Network Technology, Protocol and
Application" (John Wiley & Sons Ltd, 2007)
[4] Charka Panditharathne and Soumya Jyoti Sen (2009), "Energy Efficient Communication Protocols for
Wireless Sensor Networks"
[5] T. N. Qureshi, N. Javaid, A. H. Khan, A. Iqbal, E. Akhtar, and M. Ishfaq (2013), "Balanced Energy
Efficient Network Integrated Super Heterogenous Protocol for Wireless Sensor Networks"
[6] W. B. Heinzelman, and A. P. Chandrakasan and H. Balakrishnan (2002), "An application-specific
protocol architecture for wireless microsensor networks", IEEE Transactions on Wireless
Communications", Vol 1, pp. 660-700
[7] Callaway, and Edgar H (2004), "Wireless Sensor Networks—Architectures and Protocols" (CRC
Press Company, 2004)
[8] W. Xinhua, and W. Sheng (2010), "Performance Comparison of LEACH and LEACH-C Protocols by
NS2", Ninth International Symposium on Distributed Computing and Applications to Business"
[9] W R Heinzelman, and A P Chandrakasan and H Balakrishnan (2000), "Energy efficient
communication protocol for wireless microsensor networks"
[10] Alakesh Braman, and Umapathi G. R (2014), "A Comparative Study on Advances in LEACH
Routing Protocol for Wireless Sensor Networks: A survey.", Volume 3
[11] Jennifer Yick, Biswanath Mukhejee, and Dicpak Ghosal (2008), " Wireless sensor network survey",
Computer Networks 52, pp. 2292 2330
[12] Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan (2005), "Energy-Efficient
Communication Protocol for Wireless Micro-sensor Networks", pp. 79 - 194
[13] HolgerKarl, and AndreasWillig (2005), "Protocols and Architectures for wireless Sensor Networks"
(John Wiley & Sons, 2005)
AUTHORS
Tran Cong Hung was born in Vietnam in 1961. He received the B.E in electronic and
Telecommunication engineering with first class honors from HOCHIMINH University
of technology in Vietnam, 1987. He received the B.E in informatics and computer
engineering from HOCHIMINH University of technology in Vietnam, 1995. He
received the master of engineering degree in telecommunications engineering course
from postgraduate department Hanoi University of technology in Vietnam, 1998. He
received Ph.D at Hanoi University of technology in Vietnam, 2004. His main research areas are the B-
ISDN performance parameters and measuring methods, QoS in high speed networks, MPLS. He is,
currently, Associate Professor PhD. of Faculty of Information Technology II, Posts and Telecoms Institute
of Technology in HOCHIMINH, Vietnam.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
51
Ly Quoc Hung was born in Vietnam in 1976. He received the B.E in informatics and
computer engineering from HO CHI MINH Open University, Vietnam, 2001. He is
working as lecturer in HO CHI MINH City Technical and Economic College, Vietnam.

Weitere ähnliche Inhalte

Was ist angesagt?

Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approachShubhi Singh chauhan
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gatheringFinalyear Projects
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 

Was ist angesagt? (17)

Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
Abitseminar
AbitseminarAbitseminar
Abitseminar
 
H0421043049
H0421043049H0421043049
H0421043049
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
G018214246
G018214246G018214246
G018214246
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approach
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 

Andere mochten auch

Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with videoIJCNCJournal
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on textIJCNCJournal
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm forIJCNCJournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteedIJCNCJournal
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networksIJCNCJournal
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensorIJCNCJournal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 

Andere mochten auch (19)

Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 

Ähnlich wie ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK

Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET Journal
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...inventionjournals
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
 
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingSensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingVIT-AP University
 

Ähnlich wie ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK (20)

Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor network
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
 
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingSensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
 

Mehr von IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

Mehr von IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Kürzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 DOI: 10.5121/ijcnc.2016.8504 41 ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK Tran Cong Hung1 and Ly Quoc Hung2 1 Posts and Telecommunications Institute of Technology 2 Ho Chi Minh Technical and Economic College ABSTRACT In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base station. The main objective of LEACH is: To prolong life time of the network, reduce the energy consumption by each node, using the data concentration to reduce bulletins in the network. However, in the case of large network, the distance from the nodes to the base station is very different. Therefore, the energy consumption when becoming the host node is very different but LEACH is not based on the remaining energy to choose the host node, which is based on the number of times to become the host node in the previous rounds. This makes the nodes far away from the base station lose power sooner. In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that time the nodes with high energy and near the base station (BS) will have a greater probability of becoming the cluster-head than the those in far and with lower energy. KEYWORDS LEACH, Life-time, Energy efficient, WSN, Matlab. 1. INTRODUCTION Wireless sensor networks are used in many fields such as: National Defense, civil, health, transport, environment and agriculture [1]. Disadvantages of the wireless sensor network are limited energy, short time of energy supply source (usually battery) for each sensor, limited duty cycle of each sensor, multiple and changing constantly number of sensor nodes, (when out of the energy, sensor nodes will be removed from the network , when interrupt radio channel caused by the obstacle appearing in transmission) makes the structure of the network change [2], [3]. Limiting sensor network energy is due to small available energy in the sensor network, sensors could hardly load supplement energy (wide dispersion sensors should be hard to recover, some sensor network located in the dangerous or toxic environments) While it must use energy to gather news from the surrounding environment and each sensor also needs energy to process, synthesize and transfer the information constantly to the central node of the network, especially in volatility of the surrounding environment [4], [5].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 42 With the special characteristics of the sensor network, especially energy-saving issues and regular structure change, the recent researches are done at many different levels, from the level of the element (ability of the sensor node) to level of system (communication efficient and type of connection) and application level. The most notably issue in the system level is the research focused on network class in order to design the routing protocols to save energy, extend life of network [6], [7]. This paper is divided into five parts, part I of introduction, part II presents the related work, part III improvement of traditional clustering protocol, part IV of simulation results and assessment, part V of conclusion. 2. RELATED WORK LEACH is the Low Energy Adaptive Clustering Hierarchy, based on the sort algorithm, of which the nodes can be randomly distributed, and formed clusters (Self configuring cluster formation). The host node is able to control the cluster nodes in the cluster to send data to a certain cycle. In the host node, the data will be collected and processed in many different levels, depending on the application, before sending to the base station [8]. Figure 1. LEACH protocol. The common characteristics of the wireless sensor network application are that data of the node sent, usually, has correlations with each other, end users do not need to request all data (the same data-Redundant), or just the information that has been processed, described events that appear in the environment of the sensor node. LEACH routing protocol is very fit to applications with such characteristics. In LEACH Protocol, due to sensor data sent from the adjacent nodes with a huge Base station Cluster head
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 43 correlation, all data from the nodes within the cluster will be processed locally at the host node before sending to the base stations, reduce the excess amount of information circulating on the network in order to save energy of the node [6].      ∈ −= othewise0 Gnif ) 1 mod*(*1)( P rP P nT (1) (1) Formula of thresholds to determine the cluster-head in LEACH. (2) where: P = Percentage of wish to become the host node of the network r is the current round. G is the set of nodes not become the host node in (1/P) previous round. One of the basic characteristics of LEACH is self-organized network nodes into cluster, in which one node will act as the cluster-head (CH). All of the nodes not the host node will have to transmit its data to the host node, the host node will get data from the members of the cluster, perform local data processing, and then transmit to the base station. Therefore, the host node will consume more energy than the common nodes. The sensor node's energy is limited, if the host node is selected fixedly during the life-time of the network, the host node will run out of energy very quickly [9]. Figure 2. Operation of LEACH. When the hose node dies, all nodes in the cluster will not be able to exchange information. Therefore, LEACH makes randomly rotation of the host node role in all network nodes to avoid energy consumption on a fixed number of nodes [10, 11] Sensors and communications processes in LEACH protocols are designed appropriately to minimize the energy consumption for the nodes other than the host node. When the host node knows all the member nodes in the cluster, it will send a TDMA newsletter to inform each node exactly when to perform the task of sensors and data transfer to the host node. This mechanism allows the normal nodes to exist in the Sleep State in most of the time, only when it's time to perform the task of the sensors and sending data, the node is active. Moreover, using TDMA newsletter for the transmission of data also helps avoid collision in the cluster [12]. Setup Steady state Frame Round Time
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 44 3. IMPROVEMENT OF TRADITIONAL CLUSTERING PROTOCOL (LEACH) In order to improving the life-time of the network in the protocol based on clustering algorithm, selecting the cluster-head, coefficient of considering most is selecting the cluster-head based on energy of the nodes. New improved protocol is developed protocol based on the LEACH algorithm in which electing the cluster-head is based on the remaining energy of the node. The new protocol is improved based on the remaining energy of the node to determine the improvement threshold T (n) Improvement applied the following formula: energyInitial energyRemaining tImprovemen)( E ) 1 mod*(*1 E P rP P T n × − = (2) (2) Formula of threshold (T(n) improvement) to determine the cluster-head. where: ERemaining energy : Remaining energy of the nodes EInitial energy: is the initial energy of the nodes Selecting the cluster-head based on energy will be more effective, the nodes with high energy level will have a greater probability of becoming the cluster-head than those with low energy level, thereby balancing the energy consumption in the whole network. 3.1. Description of Protocol Similar to LEACH Protocol [13], the Protocol proposes to divide activities of the whole network into the cycles, each cycle consists of two basic phases: Clustering phase and data transfer phase. In clustering phase, selecting CH is done based on two factors that are the remaining energy of the nodes and the distance from the node to the BS. At the beginning of each cycle, the sensor nodes will generate a random number in the range (0, 1), then this range is compared to the threshold T (n). Before calculating the threshold T (n) we define: (3) (3) The formula determines the distance from the node to the BS. where: d (i) is the distance from node i to BS. n is the total number of nodes in the sensor network, (Xi, Yi) are the coordinates of the i node in the network. (XBS, YBS) is the coordinates of the BS. E (i) is the remaining energy of the nodes in the current cycle. At that time the improved threshold T(n) Improvement will be calculated according to the expression:
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 45       ∈ × −= Gn E P rP P T i n 0 d ) 1 mod*(*1 (i) )( tImprovemen)( (4) (4) Formula to determine the improved threshold T(n) Improvement. where: G is the set of nodes in the cluster head not become the cluster head in the previous cycle. p is the percentage of wish to become the cluster head on the total number of nodes, typically p in the range of 0.05-0.1. r is the current cycle. d (i) and E (i) is defined above. If the random value of the nodes is smaller than value of T (n) threshold, that node will become the cluster head in the current cycle. The use of the remaining energy parameters of the nodes will increase the probability of becoming the cluster head with high energy level, at the same time distance from the cluster head to nodes will make the node near the base station have a greater probability to become the cluster head than those far from the base station. After selecting CH, CH will send its location information to BS, and it will promote the INVITE messages to the surrounding nodes, this message has the same signal intensity. The common nodes after receiving the INVITE message if participating in the cluster will send back the ACCEPT message. If the nodes get many INVITE messages, they will be based on the signal strength of the INVITE nodes to decide to join the cluster head with the greater INVITE message signal strength (near the cluster head). If the cluster head does not receive the ACCEPT message, it will send INVITE messages again, if still don't get the message ACCEPT it will send data directly to the BS without creating TDMA table. After the clustering process is the process of data transfer. The process of data transfer includes 2 main steps: Process of transmitting data from the normal nodes to CH and process of transmitting data from CH to BS. In the process of transmitting data from the nodes to the CH, CH will create table of TDMA specified data transmission time frame for the nodes in the cluster, it will then promote this TDMA table to nodes in its cluster. The nodes in the cluster based on this table will know time to send the data to the CH, in the remaining time the nodes will be in sleep state to save energy, the method using TDMA allows the nodes to transmit data to the cluster head and helps avoid collision with other nodes. 3.2. Simulation In this section, simulation of traditional clustering protocol and new improved protocol use the same energy model and parameter below.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 46 Figure 3. Energy model used in the simulation. Table 1. Data contains the parameters to simulate. Description Value Network size 100 m * 500 m Number of sensor nodes used (n) 100 Percentage of wish to become the cluster-head of total nodes of network (p) 0.05 Location of BS (Xbs, Ybs) (50m, 250m) Number of bits transmitted (k) 5000 Initial energy of nodes (E0) 0.5 Coefficient of energy consumption of the transmission and receipt circuit (Eelec) 50nJ/bit Emp 0.0013 pJ/bit/m4 Efs 10pJ/bit/m2 Energy factor of Amplifying Circuit (Etx, Erx) 50nJ/bit d0 Based on the energy model used in Figure 3 we have: where: k is the number of bits transmitted. Eelec is the energy consumption on the bits to run the transmitting circuit or receive the data Emp or Efs depends on the energy model used or d0 threshold. Transmitting circuit Tx Amplifying Circuit ETx(d) Eelec * k Emp * k * d2 k data bits Receiving circuit Eelec* k ERx d k data bits
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 47 To get the k data bits of the energy consumption of the ERX is: elecEkE *RX = 4. SIMULATION RESULTS AND ASSESSMENT To assess the energy efficiency of new improved protocol with LEACH protocol the author based on of the following criteria: [5]. New improvement protocol elects cluster head on the basis of initial energy, residual energy and distance of the nodes from base station. Cluster heads further act as routers to base station and aggregation of the collected data of its members are also performed by them. New improvement protocol operation is divided into rounds and each round further consists of two phases: setup and steady-state. In setup phase New improvement protocol does the cluster heads election, cluster formation and determine the communication schedules for its members. When cluster formation is completed in setup phase. New improvement protocol switches to steady state phase. In this phase it completes the data sensing, data transmission to cluster heads and aggregation of the collected data of its members . Stabilization time is defined as the period of time from the start of the operation to the time to stop working of the first node. The network's life-time is counted from the beginning until the whole nodes stop operating, assessment of efficiency of the routing protocol. The data sent from the cluster head to BS: the amount of data successfully transmitted from the cluster head to the BS, the amount of data shows the effectiveness of the Protocol in the data transmission to the base station. − With E0 = 0.25j, over 10 times the experimental run we had tables: Table 2. Survey of the stabilization time of the network. Number of times performed Time of stability LEACH Improved Protocol 1 1014 1086 2 1011 1090 3 1034 1095 4 1046 1088 5 1022 1085 6 1037 1080 7 1043 1098 8 1012 1076 9 1026 1089
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, 10 Fig. 4. Comparison of stability − With E0 = 0.5j, over 10 times the experimental run we had tables: Table 3 Survey of life Number of times performed 1 2 3 4 5 6 7 8 9 10 International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 1039 1092 Comparison of stability life-time of the two protocols (E0 = 0.25). With E0 = 0.5j, over 10 times the experimental run we had tables: Table 3 Survey of life-time of the network. Number of times performed Lifetime of the network LEACH Improved Protocol 1700 2100 1781 2203 1765 2188 1803 2098 1708 1943 1769 2076 1722 1983 1790 2119 1804 2101 1791 2089 September 2016 48 Protocol
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, Fig. 5. Comparison of stability 5. CONCLUSION: Through simulation results we can assess as follows: With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network increasing 20%, lifetime of network with increase of 33%. The use of energy efficient sensor nodes, improving the network is the most important issue in which optimum energy is considered as the most effective method in extending operation routing protocol to enhance the developed from the traditional clustering protocol (LEACH) by considering energy issues and distance in selecting the cluster- have a greater probability to become the cluster head than those at a further distance and with lower energy. Simulation results show that improved LEACH Protocol increases the operating time of the whole network from 33% to 51% in comparison with the traditional cl protocol (LEACH). However, this Protocol is applied only if the base station is located in the region of the sensor. If the base station is far from the sensor it will make the distance from the node to the base station larger, then the threshold used in the small improved LEACH protocol will make the nodes hard to become the cluster-head or small number of cluster heads will lead to to energy imbalance in the transmission of data to the base station. In the future, I will improve this Protocol Dijkstra algorithm to find the shortest path from: The nodes to the cluster International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September Fig. 5. Comparison of stability life-time of the two protocols (E0 = 0.5). simulation results we can assess as follows: With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network increasing 20%, lifetime of network with increase of 33%. The use of energy efficient sensor nodes, improving the operating time of the wireless sensor network is the most important issue in which optimum energy is considered as the most effective time of the network. In this paper, we have improved a new routing protocol to enhance the operating time of the sensor network. This Protocol was developed from the traditional clustering protocol (LEACH) by considering energy issues and -head, at that time the nodes with high energy and near BS will ater probability to become the cluster head than those at a further distance and with lower energy. Simulation results show that improved LEACH Protocol increases the operating time of the whole network from 33% to 51% in comparison with the traditional cl However, this Protocol is applied only if the base station is located in the region of the sensor. If the base station is far from the sensor it will make the distance from the node to the base station used in the small improved LEACH protocol will make the nodes hard head or small number of cluster heads will lead to to energy imbalance in the transmission of data to the base station. In the future, I will improve this Protocol to achieve the energy efficiency and lifetime using Dijkstra algorithm to find the shortest path from: The nodes to the cluster-head. September 2016 49 time of the two protocols (E0 = 0.5). With the initial energy of 0.5 J, LEACH protocol has improved the time stability of the network operating time of the wireless sensor network is the most important issue in which optimum energy is considered as the most effective , we have improved a new operating time of the sensor network. This Protocol was developed from the traditional clustering protocol (LEACH) by considering energy issues and head, at that time the nodes with high energy and near BS will ater probability to become the cluster head than those at a further distance and with lower energy. Simulation results show that improved LEACH Protocol increases the operating time of the whole network from 33% to 51% in comparison with the traditional clustering However, this Protocol is applied only if the base station is located in the region of the sensor. If the base station is far from the sensor it will make the distance from the node to the base station used in the small improved LEACH protocol will make the nodes hard head or small number of cluster heads will lead to to energy imbalance in to achieve the energy efficiency and lifetime using
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 50 The cluster-head to the base station. In addition, another issue that should be of concern is the possibility of moving the nodes: Meanwhile, updating location information of the cluster head and sensor nodes as well as transmitting that information on the network can cause a significant energy consumption of the nodes. The information needs to be processed about the speed of movement and change of network configuration in terms of limited energy. REFERENCES [1] Trịnh Lương Miên (2014), "Tổng quan về mạng cảm biến không dây", Tạp chí tự động hóa ngày nay, Số 157 [2] TS. Lê Nhật Thăng, and TS. Nguyễn Quý Sỹ (2007), "Các kỹ thuật phân nhóm trong các mạng cảm biến vô tuyến", Tạp chí Bưu chính viễn thông, Số 301 [3] K. Sohraby, and D. Minoli and T Znati (2007), "Wireless Sensor Network Technology, Protocol and Application" (John Wiley & Sons Ltd, 2007) [4] Charka Panditharathne and Soumya Jyoti Sen (2009), "Energy Efficient Communication Protocols for Wireless Sensor Networks" [5] T. N. Qureshi, N. Javaid, A. H. Khan, A. Iqbal, E. Akhtar, and M. Ishfaq (2013), "Balanced Energy Efficient Network Integrated Super Heterogenous Protocol for Wireless Sensor Networks" [6] W. B. Heinzelman, and A. P. Chandrakasan and H. Balakrishnan (2002), "An application-specific protocol architecture for wireless microsensor networks", IEEE Transactions on Wireless Communications", Vol 1, pp. 660-700 [7] Callaway, and Edgar H (2004), "Wireless Sensor Networks—Architectures and Protocols" (CRC Press Company, 2004) [8] W. Xinhua, and W. Sheng (2010), "Performance Comparison of LEACH and LEACH-C Protocols by NS2", Ninth International Symposium on Distributed Computing and Applications to Business" [9] W R Heinzelman, and A P Chandrakasan and H Balakrishnan (2000), "Energy efficient communication protocol for wireless microsensor networks" [10] Alakesh Braman, and Umapathi G. R (2014), "A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey.", Volume 3 [11] Jennifer Yick, Biswanath Mukhejee, and Dicpak Ghosal (2008), " Wireless sensor network survey", Computer Networks 52, pp. 2292 2330 [12] Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan (2005), "Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks", pp. 79 - 194 [13] HolgerKarl, and AndreasWillig (2005), "Protocols and Architectures for wireless Sensor Networks" (John Wiley & Sons, 2005) AUTHORS Tran Cong Hung was born in Vietnam in 1961. He received the B.E in electronic and Telecommunication engineering with first class honors from HOCHIMINH University of technology in Vietnam, 1987. He received the B.E in informatics and computer engineering from HOCHIMINH University of technology in Vietnam, 1995. He received the master of engineering degree in telecommunications engineering course from postgraduate department Hanoi University of technology in Vietnam, 1998. He received Ph.D at Hanoi University of technology in Vietnam, 2004. His main research areas are the B- ISDN performance parameters and measuring methods, QoS in high speed networks, MPLS. He is, currently, Associate Professor PhD. of Faculty of Information Technology II, Posts and Telecoms Institute of Technology in HOCHIMINH, Vietnam.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 51 Ly Quoc Hung was born in Vietnam in 1976. He received the B.E in informatics and computer engineering from HO CHI MINH Open University, Vietnam, 2001. He is working as lecturer in HO CHI MINH City Technical and Economic College, Vietnam.