Level-Triggered Harvest-then-Consume Protocol with Two Bits or Less Energy State Information

نویسندگان

  • Sudarshan Guruacharya
  • Vandana Mittal
  • Ekram Hossain
چکیده

We propose a variation of harvest-then-consume protocol with low complexity where the harvest and consume phases change when the battery energy level reaches certain thresholds. The proposed protocol allows us to control the possible energy outage during consumption phase. Assuming that the battery is perfect and that the energy arrival is a renewal process, we analyze the duty cycle and the operating cycle speed of the protocol. The proposed protocol also allows for limited battery energy state information. The cases when the system has two-bits, one-bit, and zero-bit of battery energy state information are studied in detail. Numerical simulations verify the obtained formulas.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

An Energy Efficient Clustering Method using Bat Algorithm and Mobile Sink in Wireless Sensor Networks

Wireless sensor networks (WSNs) consist of sensor nodes with limited energy. Energy efficiency is an important issue in WSNs as the sensor nodes are deployed in rugged and non-care areas and consume a lot of energy to send data to the central station or sink if they want to communicate directly with the sink. Recently, the IEEE 802.15.4 protocol is employed as a low-power, low-cost, and low rat...

متن کامل

A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications

We propose an energy efficient adaptive scheme for mobile-to-mobile file sharing applications. The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. The proposed scheme exploits the trade-off between spending energy to compress a file and transmit less data versus spending en...

متن کامل

Assessment of Post-harvest Management Information Needs of Yam Farmers in Kogi State, Nigeria

The study assessed the post-harvest management information needs of yam farmers in Kogi State. Interview schedules were used to collect data from 189 yam farmers who were randomly selected from the four agricultural zones of the State (Zone A, B, C and D) by using multistage random sampling techniques. The data collected were subjected to descriptive statistics and binary logit regression. Resu...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1709.06928  شماره 

صفحات  -

تاریخ انتشار 2017