• Nenhum resultado encontrado

Security of cluster based wireless sensor routing

N/A
N/A
Protected

Academic year: 2017

Share "Security of cluster based wireless sensor routing"

Copied!
5
0
0

Texto

Loading

Imagem

Fig. 2. Time line showing LEACH operation. Data transmissions are explicitly scheduled to avoid collisions and increase the amount of time each  non-cluster head node can remain in the sleep state

Referências

Documentos relacionados

In the case of this sensor network, the Arduino board simultaneously represents a sink node and several sensor nodes since the data of each digital sensor is sent to the board

In this method the ANN is trained by important location models and the residual energy of each sensor node given as inputs to the ANN, and the optimal node for cluster head

Fractures were made in all samples. Figure 1 shows fractures of test bars cast from the examined high-aluminium iron in base condition and with the addition of vanadium

The probability of attending school four our group of interest in this region increased by 6.5 percentage points after the expansion of the Bolsa Família program in 2007 and

The false checks observed in 45.1 % of the stu- died chubs may be due to the small scale growth rates observed from August to October, which can be related with the Jack

With the aim of evaluating the SRAP (sequence-related amplified polymorphism) technique for linkage mapping in Pisum sativum L., a F 2 mapping population.. derived from an

The objective of this study was to model, analyze and compare the structure of spatial dependence, as well as the spatial variability of the water depths applied by a