Huffman coding
Energy efficient algorithm in wireless networks
Keywords:
huffman coding, algorithm, wireless networksAbstract
In the proposed Huffman LEACH model, energy consumption increases exponentially with distance and there are no maximum limits. The transmit power level of a sensor node can only be adjusted to discrete values that may result in one transmit power level for various distances. The resulting energy consumption for two links of different distances can be equivalent. The number of clusters generated in LEACH does not converge to a fixed value which shortens the lifespan of the network. The energy consumption of the wireless sensor network is inversely proportional to the lifetime of the wireless sensor network. Here, we assume that the network lifetime is defined as the time from the deployment of the WSN till the first gateway dies. Hence, network lifetime can be maximized by using the parameter discussed in this paper. If we can minimize the energy consumption of the CH nodes, then energy consumption of the sensor nodes can be minimized if we can minimize their relative distance from their corresponding CH’s. The experimental result of proposed model says better with its energy faster than the nodes with lower data transmission rate when compared with the existing WSN models.
Downloads
References
M. Preetha, K. Sivakumar: An Energy Efficient Sleep Scheduling Protocol for Data Aggregation in WSN: Taga Journal Vol. 14, pp. 404-414, 2018.
M. Nagarajan, S. Valli, R. Sankaranarayanan: “Enhancing Life Span for WSN Nodes using LEACH, Huffman Data Fusion and TSP- NN Algorithm”, International Journal of engineering Development and Research, ISSN: 2321-9939, pp. 1-8, 2015.
Amrinder Kaur, Sunil Sami, “Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No.7, 2013.
Tossaporn Srisookai, Kamol Keamarungsi, Poonlap Lamsrichan, Kiyomichi Araki:practical data compression in wireless sensor network, pp. 37-39, 2012.
Rajesh Patel, Sunil Pariyani, Vijay Ukani, “Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Networks”, International Journal of Computer Applications Volume 20-No. 4, 2011.
Yao Liang, Wei Peng: Minimizing Energy Consumptions in Wireless Sensor Networks via Two-Modal Transmission: ACM SIGCOMM Computer Communication Review Vol 40, No.1, 2010.
Joel B. Predd, Sanjeev R. Kulkarni, H. Vincent Poor: A Collaborative Training Algorithm for Distributed Learning: IEEE Transactions on Information Theory, Vol. 55, No. 4, 2009.
Francesco Marcelloni and Massimo Vecchio: “A Simple Algorithm for Data Compression in Wireless Sensor Networks, IEEE, Communication Letters, Vol. 12, No.6, 2008.
Cauligi S. Raghavendra and Viktor K. Prasanna, Caimu Tang: “An Energy Efficient Adaptive Distributed Source Coding Scheme in Wireless Sensor Networks”, IEEE, 2003.
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, Erdal Cayirci: “A Survey on Sensor Networks”, IEEE Communication Magazine, pp. 102-114, 2002.
Zhang, Zhang, Chi, G. Science and technology evaluation model and empirical research based on entropy weight method. J. Manag. 2010, 7, 34–42. 32.
Li, Y Gao, J Yu, Y. Cao, T. An energy-based weight selection algorithm of monitor node in MANETs. In Proceedings of the 2017 International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, 21–23 July 2017.
Shafer, G.A. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976.
Kumar, N.; Vidyarthi, D.P. A Green Routing Algorithm for IoT-Enabled Software Defined Wireless Sensor Network. IEEE Sens. J. 2018, 18, 9449–9460.
Kumar, S. (2022). A quest for sustainium (sustainability Premium): review of sustainable bonds. Academy of Accounting and Financial Studies Journal, Vol. 26, no.2, pp. 1-18
Dr. Ritika Malik, Dr. Aarushi Kataria and Dr. Naveen Nandal, Analysis of Digital Wallets for Sustainability: A Comparative Analysis between Retailers and Customers, International Journal of Management, 11(7), 2020, pp. 358-370.
Yuan, Y. Liu, W. Wang, T. Deng, Q.G. Liu, A.F. Song, H.B, Compressive Sensing-Based Clustering Joint Annular Routing Data Gathering Scheme for Wireless Sensor Networks. IEEE Access 2019, 7, 114639–114658.
Lv, Y.H, Liu, Y Hua, J.F. A Study on the Application of WSN Positioning Technology to Unattended Areas. IEEE Access 2019, 7, 38085–38099.
Ahmed, A. Bakar, K.A. Channa, M.I. Haseeb, K. Khan, A.W. TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network. IEEE Sens. J. 2015, 15, 1.
Wang, Y. Cheng, S. Zhou, Y. Peng, G. Zhou, D. Chao, C. Decision of air-to-air operation mode of airborne fire control radar based on DS evidence theory. Mod. Radar 2017, 39, 79–84.
J. Hu, M Fu, L. Jan, J. A Novel Fuzzy Approach for Combining Uncertain Conflict Evidence in the Dempster-Shafer Theory. IEEE Access 2019, 7, 7481–7501.
Ni, Zhang, S. Chen, X, Zhang, X. Audit risk assessment based on entropy weight method and fuzzy analytic hierarchy process. Software 2018, 39, 254–259.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.
 
						 
							 
			
		 
			 
			 
				









