42,227 research outputs found
HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed
data to base station. Energy conservation is an important issue for sensor
nodes as they have limited power.Many routing protocols have been proposed
earlier for energy efficiency of both homogeneous and heterogeneous
environments. We can prolong our stability and network lifetime by reducing our
energy consumption. In this research paper, we propose a protocol designed for
the characteristics of a reactive homogeneous WSNs, HEER (Hybrid Energy
Efficient Reactive) protocol. In HEER, Cluster Head(CH) selection is based on
the ratio of residual energy of node and average energy of network. Moreover,
to conserve more energy, we introduce Hard Threshold (HT) and Soft Threshold
(ST). Finally, simulations show that our protocol has not only prolonged the
network lifetime but also significantly increased stability period.Comment: 2nd IEEE Saudi International Electronics, Communications and
Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabi
Recommended from our members
Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks
IEEE 802.11 Wireless Mesh Network (WMN) is an
emerging low cost, decentralized community-based broadband technology, which is based on self-healing and multi-hop deployment of Access Points (APs), so that to increase the coverage area with maximum freedom to end-users to join or leave the
network from anywhere anytime having low deployment and maintenance cost. Such kind of decentralized structure and multihop architecture increases its security vulnerabilities especially
against the APs. One of such possible security attack is the placement of cloned AP to create serious performance degradation in IEEE 802.11 WMN. In this paper, we discuss the different
security vulnerabilities of AP in IEEE 802.11 WMN along with possible research directions. We also propose a mutual cooperation mechanism between the multi-hop APs and serving gateway so that
to detect and prevent the possibility of cloned AP. In this way the large scale exploitation of IEEE 802.11 WMN can be eliminated
Low-energy, planar magnetic defects in BaFe2As2: nanotwins, twins, antiphase and domain boundaries
In BaFe2As2, structural and magnetic planar defects begin to proliferate
below the structural phase transition, affecting descriptions of magnetism and
superconductivity. We study using density-functional theory the stability and
magnetic properties of competing antiphase and domain boundaries, twins and
isolated twins (twin nuclei) - spin excitations proposed and/or observed.
These nanoscale defects have very low surface energy (-~Jm),
with twins favorable to the mesoscale. Defects exhibit smaller moments confined
near their boundaries -- making a uniform-moment picture inappropriate for
long-range magnetic order in real samples. {\it{Nano}}twins explain features in
measured pair distribution functions, so should be considered when analyzing
scattering data. All these defects can be weakly mobile and/or have
fluctuations that lower assessed "ordered" moments from longer spatial and/or
time averaging, and should be considered directly.Comment: 6 pages, 6 figures, 1 tabl
Recommended from our members
Passive security threats and consequences in IEEE 802.11 wireless mesh networks
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the vulnerabilities of WMN towards many passive and active attacks. A secure network ensures the confidentiality, integrity and availability of wireless network. Integrity and availability is compromised by active attacks, while the confidentiality of end-users traffic is compromised by passive attacks. Passive attacks are silent in nature and do not harm the network traffic or normal network operations, therefore very difficult to detect. However, passive attacks lay down a foundation for later launching an active attack. In this article, we discuss the vulnerable features and possible passive threats in WMN along with current security mechanisms as well as future research directions. This article will serve as a baseline guide for the passive security threats and related issues in WMNs
A new approach to detect similar proteins from 2D Gel Electrophoresis Images.
This paper addressed the problem of identification errors due to protein mobility, common in earlier methods. A generalised shape matching algorithm is described that achieved and accuracy of greater than 90% on the test samples. The algorithm was also highly selective in defining the search space, thereby offering a significant computational speed advantage. The output from this work later formed part of an image object keying database, that offered significant benefits to other researchers
Aquaculture vis-a-vis agriculture
The effect of aquaculture, especially shrimp farming, on agriculture has caused heated debate among aquaculturists, agriculturists, and non-governmental organizations. As data on the negative impact of shrimp farming on adjacent rice fields are not available, a study was undertaken in rice fields skirting three shrimp farms: a semi-intensive farm; an extensive farm; and a semi-intensive farm with a buffer zone. The buffer zone was found to be helpful in preventing salinization of the adjacent agricultural fields and the Electrical Conductivity (EC) values (less than 1) reported were found to be harmless to the rice crop. Thus, aquaculture and agriculture can coexist in coastal areas if there are buffer zones in between
- …