Downloads: 124 | Views: 331
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 12, December 2013 | Popularity: 6.8 / 10
Clustering Techniques for Network lifetime Improvement: A Survey
Sanjay Madaan, Dinesh Kumar, Robin
Abstract: This paper focuses on the theoretical aspects of clustering techniques in wireless sensor networks, as a mean to improve network lifetime and time synchronization between sensors. Wireless sensor networks (WSNs) are large-scale networks of small low-cost and low-power sensors, to observe and monitor various aspects of physical world. In WSN, data from each sensor is ag-glomerated using data fusion to form a single meaningful result, which makes time synchronization between sensors highly desirable. In this paper, some of the clustering protocols, which have been implemented to improve the network lifetime and clock synchronization, are illustrated. It has been investigated that employing these protocols to select the cluster head results in better performance as compared to non-clustered network and summarize existing clock synchronization protocols based on a palette of factors like precision, accuracy, cost, and complexity.
Keywords: WSN, Clock Synchronization, Clustered Network, Sensor Network
Edition: Volume 2 Issue 12, December 2013
Pages: 456 - 459
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2002
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera