W-LEACH Decentralized: Weighted LEACH with a Decentralized way
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each node has a limited energy and a random mobilization. Since the energy consumption is a very important factor, the Hierarchical protocols can solve this problem for instance the LEACH protocol. W-LEACH is a LEACH extension which extends the network lifetime but this protocol uses sensor location to organize the network so it is not effective in an area where the location of nodes is impossible with mobility. In this paper, we improve an old algorithm (W-LEACH) to a new protocol called W-LEACH Decentralized to increase network lifetime without the use of maps. Besides, we are going to compare this protocol with LEACH in term of network lifetime and energy dissipation using Network Simulator
Authors and Affiliations
Abdelhalim HNINI, , Abdellah EZZATI, , Mohammed FIHRI, , Abdelmajid HAJAMI
Duplicate Detection in Hierarchical Data Using XPath
Abstract: There were many techniques for identifying duplicates in relational data, but only a few solutions focus on identifying duplicates which has complex hierarchical structure, as XML data. In this paper, we presen...
Tuning of Extended Kalman Filter for nonlinear State Estimation
Abstract: Kalman Filter is the most popular method for state estimation when the system is linear. State estimation is the typical issue in every part of engineering and science. But, for non linear systems, different ex...
The Use of Non Wood Forest Product as Income Generation inSemi Arid Zone Case Study Umkaddada Locality, North DarfurState, Sudan
Abstract: The study were carried out at Arais area north Umkaddada town, the objective was to study the nonwood forest products for their role in income generation, type of fruits, Grasses and other parts of treesa...
A Study of Two Different Attacks to IPv6 Network
In the lights of today and future advancing technologies, the demand of IPv6 internet protocol, had becomes crucial for its usages & benefits. This paper investigates the use of information messages to build a visual per...
Use Map EstimationFor Image Sharpening
This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or givi...