822 research outputs found
Multihop clustering algorithm for load balancing in wireless sensor networks
The paper presents a new cluster based routing algorithm that exploits the redundancy properties of the sensor networks in order to address the traditional problem of load balancing and energy efficiency in the WSNs.The algorithm makes use of the nodes in a sensor network of which area coverage is covered by the neighbours of the nodes and mark them as temporary cluster heads. The algorithm then forms two layers of multi hop communication. The bottom layer which involves intra cluster communication and the top layer which involves inter cluster communication involving the temporary cluster heads. Performance studies indicate that the proposed algorithm solves effectively the problem of load balancing and is also more efficient in terms of energy consumption from Leach and the enhanced version of Leach
Recommended from our members
Improving the network transmission cost of differentiated web services
This paper investigates into the transmission cost of web services related messages which is affected by network
latency. Web services enable seamless interaction and integration of e-business applications. Web services contain a
collection of operations so as to interact with outside world over the Internet through XML messaging. Though XML
effectively describe message related information and is fairly human readable, it badly affects the performance of Web
services in terms of transmission cost, processing cost, and so on. This paper aims to minimize network latency of message
communication of Web services by employing pre-emptive resume scheduling. Fundamental principle of this approach is the
provision of preferential treatment to some messages as compared to others. This approach assigns different priorities to
distinct classes of messages given the fact that some messages may tolerate longer delays than others. For instance, shorter
messages may be given higher priority than longer messages, or the Web service provider may give higher priority to the
messages of paying subscribers
Recommended from our members
A discrete-time performance model for congestion control mechanism using queue thresholds with QOS constraints
This paper presents a new analytical framework for the congestion control of Internet traffic using a
queue threshold scheme. This framework includes two discrete-time analytical models for the performance
evaluation of a threshold based congestion control mechanism and compares performance measurements through
typical numerical results. To satisfy the low delay along with high throughput, model-I incorporates one
threshold to make the arrival process step reduce from arrival rate Âż1 directly to Âż2 once the number of packets in
the system has reached the threshold value L1. The source operates normally, otherwise. Model-II incorporates
two thresholds to make the arrival rate linearly reduce from Âż1 to Âż2 with system contents when the number of
packets in the system is between two thresholds L1 and L2. The source operates normally with arrival rate Âż1
before threshold L1, and with arrival rate Âż2 after the threshold L2. In both performance models, the mean packet
delay W, probability of packet loss PL and throughput S have been found as functions of the thresholds and
maximum drop probability. The performance comparison results for the two models have also been made
through typical numerical results. The results clearly demonstrate how different load settings can provide
different tradeoffs between throughput, loss probability and delay to suit different service requirements
Adaptive decentralized re-clustering protocol for wireless sensor networks
AbstractWireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way since the energy is limited. The clustering algorithm is a technique used to reduce energy consumption. It can improve the scalability and lifetime of wireless sensor network. In this paper, we introduce an adaptive clustering protocol for wireless sensor networks, which is called Adaptive Decentralized Re-Clustering Protocol (ADRP) for Wireless Sensor Networks. In ADRP, the cluster heads and next heads are elected based on residual energy of each node and the average energy of each cluster. The simulation results show that ADRP achieves longer lifetime and more data messages transmissions than current important clustering protocol in wireless sensor networks
Message from ficloud-workshops coordinators
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.(undefined
Message from the FiCloud 2018 Workshops Coordinators
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.(undefined
Recommended from our members
Empirical study of cultural dimensions and cybersecurity development
yesThis study seeks to investigate how the development of e-government services impacts on cybersecurity. The study uses the methods of correlation and multiple regression to analyse two sets of global data, the e-government development index of the 2015 United Nations e-government survey and the 2015 Inter-national Telecommunication Union global cybersecurity develop-ment index (GCI 2015). After analysing the various contextual factors affecting e-government development , the study found that, various composite measures of e-government development are significantly correlated with cybersecurity development. The therefore study contributes to the understanding of the relation-ship between e-government and cybersecurity development. The authors developed a model to highlight this relationship and have validated the model using empirical data. This is expected to provide guidance on specific dimensions of e-government services that will stimulate the development of cybersecurity. The study provided the basis for understanding the patterns in cybersecurity development and has implication for policy makers in developing trust and confidence for the adoption e-government services.National Information Technology Development Agency, Nigeria
- …