Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 3
Abstract
WSN consists of hundreds / thousands of wireless nodes distributed within the geographical area. The wireless nodes gather information and supply towards the central node for further processing. There are different factors that affect the WSN design like transmission media, power consumption, routing protocols etc. Congestion in WSNs can lead to packet losses and increased transmission latency. Different type of congestion is present like node level, Link level, etc. Lot of work is performed by the different researchers to detect the congestion and remove or decrease the effect of congestion. The congestion gives the energy loss and packet drop over the communication. In this work, an improvement to the traditional routing algorithm is defined by generating a distance and energy based priority path. In this work adaptive algorithm is suggested to generate the effective communication route and analyze the work under different parameters. The analysis of work is done under the parameters like packet loss, throughput, bit rate etc. The network simulator NS-2 is used. The obtained results show that the proposed algorithm gives the better results than the existing algorithm.
Authors and Affiliations
Sandhya Kumari, Dr. C. S. Lamba, Ajay Kumar
Detection of Breast Cancer by the Identification of Circulating Tumor Cells Using Association Rule Mining
Abstract: Circulating Tumor Cells (CTCs) are cells that have shed into the vasculate from the primary tumor and circulate into the blood stream. In this proposed work, the major genes causing the breast cancer is identif...
Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays
Abstract Essays are used to evalaute student’s knowledge from early before itself. The aim of the proposed system is to evalaute the handwritten essays automatically. The proposed method is to develope an automated syste...
Security in a Virtualised Computing
Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual com...
A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...
Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...