ENERGY EFFICIENT LEACH PROTOCOL IN WSN
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 9
Abstract
A sensor node hold small amount of resources in terms of processor, battery power, memory and communication range, but when a huge number of sensor nodes work together they are able to complete a good volume of task. It is just because of Wireless Sensor Network we are able to cooperate with physical world directly. In this context, hierarchical routing protocols offer energy-efficiency, scalability and reliability for WSN applications. With this goal in mind, this paper proposes to approve a Cluster-based approach for Energy-efficiency in the WSN (REER)protocol. The main purpose of REER is to provide energy-efficiency by using for cluster formation and a probability function for Cluster Head election. Simulations were conducted to show the benefits of REER compared with LEACH.
Authors and Affiliations
Swati Gupta *
RETROFITTING AND STRENGTHENING OF BRIDGES
This paper presents one bridge which were either rehabilitated or strengthened by using FRP composites. The resulting structure was then tested for the effect after using FRP composites for Rehabilitation and stre...
Structural Analysis of Leaf Spring of Light Weight Commercial Vehicle Suspension System
Mathematical and computer modeling have been playing an increasingly important role in the computer aided engineering (CAE) process of many products since last 60 years. The present work consists of a leaf spring...
NUMERICAL ANALYSIS OF COMPRESSIBLE EFFECT IN THE FLOW METERING BY CLASSICAL VENTURIMETER
The Venturimeter is a typical obstruction type flow meter, widely used in industries for flow measurement. The ISO standard (ISO-5167-1) provides the value of discharge coefficient for the classical machined Venturimeter...
COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY
The paper presents comparative study of different authentication and identification algorithms used in secured cryptography. The network security is also a great issue, when the data transfer is taken place over t...
Associators in the Nucleus of Antiflexible Rings
In this paper, first we prove that if R is a semi prime third power associative ring of char ≠ 2 then either N = C or R is associative. Using this result we prove that if R is a simple third power associative anti...