A comparative study of chain based routing algorithms in wireless sensor networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13
Abstract
Many routing algorithms for Wireless Sensor Networks (WSNs) are designed and presented in the literature. The main target of these algorithms is to improve the performance of WSNs. In this paper, a comparative study of chain-based routing algorithms has been done. In this study, we compare the performances of PEGASIS [3], COSEN [6], IECBSN [8], CHAIN-BASED [15], CRA [12] and EAPHRN [9] algorithms when the mobile base station (BS) is used. We perform analytical simulations in terms of network lifetime and average energy consumption.
Authors and Affiliations
Ahmed Salim, Asmaa Ahmed Badran
A new Approach for Obtaining Optimal Solution of Unbalanced Fuzzy Transportation Problem
The present paper attempts to study the unbalanced fuzzy transportation problem so as to minimize the transportationcost of products when supply, demand and cost of the products are represented by fuzzy numbers. In this...
An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Todays Ehealth Apps
The convergence of the information and communication technology (ICT) has produced many exciting possibilities for developing new services in medical field for the citizens. Electronic medical records (EMRs) are used in...
Humanoid Robot Learning How to track and grip
Interaction with its environment is a key requisite for designing a humanoid robot especially to have the ability to recognize and manipulate unknown objects and it is crucial to successfully work in natural environments...
Intrinsic and Extrinsic Motivation to E learning in Higher Education Institutions
There were many researches which were conducted about implementation of e learning in Higher Education Institutions, but few of them were focused on the motivation of e learning. Even though, there are many applications...
Enhanced Tiny Encryption Algorithm with Embedding (ETEA)
As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many se...