12,476 research outputs found

    Energy Optimization based on the Redundancy in WSNs

    Get PDF
    International audienceAlmost all WSNs (Wireless Sensor Networks) are deployed with some redundancy degree and redundancy is used only for robustness objectives. If not handled in an intelligent way, redundancy results in energy wasting because of (often unnecessary) redundant transmission and reception operations. We propose to take benefit from measurement redundancy to optimize the energy consumption and improve the end-to-end delay. We propose MR-LEACH (Measurement Redundancy aware LEACH) protocol, which is an extension to the well-known LEACH protocol to improve energy consumption in cluster-based WSNs. In addition to cluster formation according to LEACH protocol redundant nodes are grouped taking into account their redundancy and only a single node transmits data in each redundant group. This technique significantly improves the energy consumption and ensures a better end-to-end delay. Through intensive simulations, we discuss the performance of our approach and show how it outperforms the original LEACH protocol in terms of network lifetime and end-to-end delay

    Katakan tidak pada rasuah

    Get PDF
    Isu atau masalah rasuah menjadi topik utama sama ada di peringkat antarabangsa mahupun di peringkat dalam negara. Pertubuhan Bangsa- bangsa Bersatu menegaskan komitmen komuniti antarabangsa bertegas untuk mencegah dan mengawal rasuah melalui buku bertajuk United Nations Convention against Corruption. Hal yang sama berlaku di Malaysia. Melalui pernyataan visi oleh mantan Perdana Menteri Malaysia, Tun Dr. Mahathir bin Mohamed memberikan indikasi bahawa kerajaan Malaysia komited untuk mencapai aspirasi agar Malaysia dikenali kerana integriti dan bukannya rasuah. Justeru, tujuan penulisan bab ini adalah untuk membincangkan rasuah dari beberapa sudut termasuk perbincangan dari sudut agama Islam, faktor-faktor berlakunya gejala rasuah, dan usaha-usaha yang dijalankan di Malaysia untuk membanteras gejala rasuah. Perkara ini penting bagi mengenalpasti penjawat awam menanamkan keyakinan dalam melaksanakan tanggungjawab dengan menghindari diri daripada rasuah agar mereka sentiasa peka mengutamakan kepentingan awam

    Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks

    Get PDF
    Due to the broadcast nature of wireless channels, neighbouring sensor nodes may overhear packets transmissions from each other even if they are not the intended recipients of these transmissions. This redundant packet reception leads to unnecessary expenditure of battery energy of the recipients. Particularly in highly dense sensor networks, overhearing or eavesdropping overheads can constitute a significant fraction of the total energy consumption. Since overhearing of wireless traffic is unavoidable and sometimes essential, a new distributed energy efficient scheme is proposed in this paper. This new scheme exploits the inevitable overhearing effect as an effective approach in order to collect the required information to perform energy efficient delivery for data aggregation. Based on this approach, the proposed scheme achieves moderate energy consumption and high packet delivery rate notwithstanding the occurrence of high link failure rates. The performance of the proposed scheme is experimentally investigated a testbed of TelosB motes in addition to ns-2 simulations to validate the performed experiments on large-scale network
    • …
    corecore