IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

An Improved LEACH Protocol by Using Two Suitability Functions Rohollah Omidvar1, Farhad Rad2 1

2

Islamic Azad University Of Yasouj Branch Yasouj, Iran [email protected]

Islamic Azad University Of Yasouj Branch Yasouj, Iran [email protected]

Abstract Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN). The low-energy adaptive clustering hierarchy (LEACH) protocol is one of the Famous protocols used in the wireless sensor networks. The LEACH protocol suffers from many Bugs and many researchers proposed different methods to mitigate them. In this paper, we propose two ideas for improving LEACH protocol. Cluster head election with use a likely attributable function, there is in this function a factor. This factor helps to farther nodes not election for cluster head. This significantly decreases the energy consumption and increases the lifetime of associated nodes. In next stage, for election cluster member, using one other suitability function. Simulation is conducted in using MATLAB results are analyzed for energy consumption.

Keywords: LEACH, Node, Cluster Head, Suitability Functions, Wireless Sensor Network.

1. Introduction The recent developments in making energy efficient Wireless Sensor Network is giving a new direction to deploy WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat monitoring , cropping monitoring, crowd counting etc. When the battery power is drained in these devices/nodes then the network cannot be used and all the nodes spend most of the energy while transmitting the data. Therefore, to increase the lifespan of the network, each node has to do only minimal work for transmitting the data. LEACH protocol is widely used in WSN, because this protocol dissipates the energy in low level [1]. In hierarchical architecture sensing region is divided in to a number of clusters and a set of nodes are periodically elected as cluster head (CH). Cluster head collects the data from non-CH nodes, aggregate it and then send it to the sink for further processing [2], [3], [4]. Clustering thus evenly distribute the energy load, reduce the energy consumption and increase the network life [4], [5], [6], [7], [8], [9], [10], [11], [12]. In this paper presented an idea that the cluster head is selected according to the likely attributable intelligent algorithms. This paper is divided into sections as follows. Section 2 explains the related works. Section 3 describes the wireless sensor network model, Section 4 describes radio energy model, Section 5 explains LEACH protocol propose, simulation results are explored in Section 6 and finally the paper is concluded in Section 7.

Rohollah Omidvar,

IJRIT-38

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

2. Related Work In hierarchical routing protocols whole network is divided in to several clusters. One node in each cluster play leading rule. Cluster-head is the only node that can transmit to Base station in clustering routing protocols. This significantly reduces the routing overhead of normal nodes because normal nodes have to transmit to cluster-head only. Explanation of some hierarchical routing protocols is discussed in next subsections.

2.1 Leach Protocol In [13], Heinzelman and al. have proposed a distributed clustering algorithm called Low Energy Adaptive Clustering Hierarchy (LEACH), LEACH selects randomly the nodes cluster-heads and assigns this role to different nodes according to round- robin management policy to ensure fair energy dissipation between nodes In order to reduce the value of information transmitted to the base station, the cluster-heads aggregate the data captured by the member nodes belonging to their own cluster, and then sends an aggregated packet to the base server. The LEACH protocol consists of two phases: The first is the set-up phase, and the second is the steady-state In the first phase, cluster heads are selected and clusters are formed, and in the next phase, the data transfer to the base server is held. During the first phase, the process of electing cluster heads is triggered to select future cluster heads. Thus, a predetermined fraction of nodes connected as cluster heads according either 0 or 1. If the random number is less than a threshold function Ts then the node becomes a cluster head in the current round, otherwise the node n is expected to join the nearest cluster head in its neighborhood. The threshold is set as: ்

ܶሺ݊ሻ = ൝

భ ೛

ଵି௣(௥௠௢ௗ )

݂݅݊ ∈ ‫ܩ‬

(1)

0ܱ‫ݐ‬ℎ݁‫݁ݏ݅ݓݎ‬

2.2 Leach-C LEACH offers no guarantee about the placement or number of cluster heads. In [5], an enhancement over the LEACH protocol was proposed. The protocol, called LEACH-C, uses a centralized clustering algorithm and the same steady-state phase as LEACH. During the first phase of LEACH-C, each node sends information about its current location and its energy level to the base station. In addition to determining good clusters, the base station needs to ensure that the energy load is evenly distributed among all the nodes. To do this, base station calculated the average node energy, and determines which nodes have energy below this average.

2.3 E-Leach Energy-LEACH protocol improves the CH selection procedure. It makes current energy of node as the main metric which decides whether the nodes turn into cluster-head or not after the first round [9]. Same as LEACH protocol, E-LEACH is divided into rounds, in the first round, every node has the same probability to turn into cluster head, that average nodes are randomly selected as cluster-heads, in the next rounds, the current energy of each node is different after one round communication and taken into account for the selection of the cluster-heads. That average nodes have more energy will become a cluster-heads rather than nodes with less energy.

2.4 TL-Leach In LEACH protocol, the Cluster-head collects and aggregates data from nodes in its own cluster and passes the information to the Base Station directly. Cluster-head might be located far away from the Base Station, Rohollah Omidvar,

IJRIT-39

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

so it uses most of its energy for transmitting and because it is always on it will die faster than other nodes. A new version of LEACH called Two-level Leach was proposed. In this protocol; Cluster-head collects data from other cluster members as original LEACH, but rather than transfer data to the Base Station directly, it uses one of the Cluster-heads that lies between the Cluster-heads and the Base Station as a relay station [15].

2.5 M-Leach In LEACH, each CH directly communicates with Base Station no matter the distance between Cluster-head and Base Station. It will consume lot of its energy if the distance is far. On the other hand, multi hop LEACH protocol selects optimal distance between the Cluster-head and the Base Station through other Cluster-heads and use these Cluster-heads as a relay station to transmit data over through them [16]. First, multi-hop communication is adopted value Cluster heads. Then, according to the selected optimal path, these Cluster-heads transmit data to the corresponding Cluster-head which is nearest to Base Station. Finally, this Cluster-head sends data to Base Station. M-LEACH protocol is almost the same as LEACH protocol, only makes communication mode from single hop to multi-hop between Cluster-heads and Base Station.

3. Wireless Sensor Network Model The operation of LEACH is including two sections. Each round begins with a set-up phase when the clusters are organized, followed by a steady-state phase when data are transferred from the nodes to the Base Station. During the set-up phase, each node normal chooses a random number between 0 and 1. If the number is less than a threshold T(n), the node becomes a cluster head for the current round. The threshold is set equation 1. The following assumptions are made in the presented work. • The Base Station is fixed and located far from the sensors. • All nodes in the network are homogeneous and energy constrained. • All nodes can transmit with enough power to reach the Base Station. • All nodes can adjust their transmit power • The nodes always have data to send to the Base Station and nodes located close to each other have correlated data.

4. Radio Energy Model We use the same radio model as stated in [5, 13]. Matching to the radio energy dissipation model of Fig. 1, the energy consumption of transmitting l-bit data over a distance d is ‫்ܧ‬௑ ሺ݈, ݀ሻ = ቊ

݈‫ܧ‬௘௟௘௖ + ݈ߝ௙௦ ݀ ଶ ݂݅݀ < ݀଴ (2) ݈‫ܧ‬௘௟௘௖ + ݈ߝ௠௣݀ ସ ݂݅݀ ≥ ݀଴

Where݀଴ = ඥߝ௙௦/ ߝ௠௣denotes the threshold distance,‫ܧ‬௘௟௘௖ represents the energy consumption in the electronics for sending or receiving one bit, andߝ௙௦ ݀ ଶ andߝ௠௣݀ ସ is the amplifier energy that depends on the transmitter amplifier model. The energy consumption of receiving l-bit data is ‫ܧ‬ோ௑ ሺ݈ሻ = ݈‫ܧ‬௘௟௘௖(3)

Fig. 1 Radio energy dissipation model Rohollah Omidvar,

IJRIT-40

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

Here we use the typical values ‫ܧ‬௘௟௘௖ =50 nJ/bit,ߝ௙௦ =10 pJ/bit/݉ଶ and ߝ௠௣=0.0013 pJ/bit/݉ସ . As noted previously, the cluster heads are responsible for aggregating their cluster members’ data. The energy for data aggregation is set as ‫ܧ‬஽஺ =5nJ/bit/signal.

5. Proposed Algorithm The proposed schemes aim to enhance the election method of cluster heads and cluster member by minimizing power consumption of network nodes and informed choice of CHs. The schemes take into consideration the drawbacks of the original LEACH, and accordingly try to minimize the energy consumption. The main idea of our proposed schemes is split into two stages. The first stage is Use Likely Attributable Function for the cluster head election process that in this stage, CHs election from areas that we want. In the second stage, the cluster members election using a other function. These stages are discussed as follows:

5.1 Stage One The first stage changes the basic election of cluster heads by use Likely Attributable Function in which it informed selection factor. In the ABC onlookers are assigned to food sources by a stochastic rule, assuming a certain probability ‫݌‬௝ related to a fitness value fit (‫ݔ‬௝ ) of the configuration ‫ݔ‬௝ of the food source j[14]: ௙௜௧(௫ೕ )

‫݌‬௝ = σೄಿ

ೖసభ ௙௜௧(௫ೕ )

∀௝ ∈ ሼ1, … , ܵܰሽ

(4)

Where ݂݅‫ݐ‬൫‫ݔ‬௝ ൯is the suitability of each sensor node and, σௌே ௞ୀଵ ݂݅‫ݔ(ݐ‬௝ )suitability of nodes total. Equation 4 called the Likely Attributable Function, that we have used from this function to select the cluster head. This function makes use of the fitness of each node to all nodes in each round will be judged and the most suitable node is be selected as the cluster head. The threshold for the normal nodes to become cluster head can be evaluated by the equation 5: ܶሺ݊ሻ =

ಶೝ೐ೞ೔೏ೠೌ೗



భ ଵି௉(௥௠௢ௗ ) ು

∗ ൥ ೖషವሺ೔,ಳೄሻ ಶೌೡ೐ೝೌ೒೐ ൩(5) ವೌೡ೐ೝೌ೒೐

Where ‫ܧ‬௥௘௦௜ௗ௨௔௟ is the residual energy of candidate node i at the current time,‫݅(ܦ‬, ‫ )ܵܤ‬is the geographic distance from the candidate node to the BS, k is the informed selection factor,‫ܧ‬௔௩௘௥௔௚௘ is the average energy of network and ‫ܦ‬௔௩௘௥௔௚௘ is the average distance from total nodes to BS. k factor described in the next section. The average energy is calculated with equation 6:

‫ܧ‬௔௩௘௥௔௚௘ =

ா೟೚೟ೌ೗ ௡

(6)

The average distance is calculated with equation 7: ‫ܦ‬௔௩௘௥௔௚௘ =

σ೙ ೔సభ ஽(௜,஻ௌ) ௡

(7)

The geometric distance between two nodes, d (a, b), is computed as follows [17]:

ȁ݀(ܽ, ܾ)ȁ = ඥ(‫ݔ‬௔ − ‫ݔ‬௕ )ଶ + (‫ݕ‬௔ − ‫ݕ‬௕ )ଶ (8) Rohollah Omidvar,

IJRIT-41

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

One of the drawbacks Leach protocol is cluster head selection Based on probability, that with this threshold this problem disappears. In Leach protocol, selection of far nodes from the BS, Caused consume a lot of energy, with applying a factor, we solving this problem. This factor called informed choice factor. This factor calculated in equation 9: ௡

݇ = ‫ ܦ‬ቀ ቁ(9) ସ

When the distance from nodes to the central station are arranged in descending order, k it is node that is located in the one quarter of this sort, calculated according to the equation 10. K is the one quarter of nodes distance to the central station. Where D (n) is the calculated in equation 10: ‫ܦ‬ሺ݊ሻ = ሾ‫ ݐݎ݋ݏ‬σ௡௜ୀଵ ‫ܦ‬ሺ݅, ‫ܵܤ‬ሻ, ݀݁‫݀݊݁ܿݏ‬ሿ(10) By applying this factor, as shown in Figure 2, the land divided into four parts, available nodes in the far section from BS that with x4 shown in Figure 2, in network lifetime will not be selected as a cluster head.

Fig. 2 Model of cluster heads selection The selection of cluster heads in Leach protocol is shown in Figure 3.

Fig. 3 Model of cluster heads selection in LEACH According to Figure 3, cluster heads are selected from far distant nodes, hence the high consumption of Rohollah Omidvar,

IJRIT-42

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

energy, because the cluster heads with far distance for communication with the BS needs to consume more energy. The selection of cluster heads in proposed method is shown in Figure 4, 5. According to Figure 4 and 5, available nodes in quarter dimension of land will not be selected as a cluster head.

Fig. 4 Model of cluster head selection in proposed method

Fig. 5 Model of cluster head selection in proposed method

5.2 Stage Two For cluster member election, we introducing a function, that apply in this function, residual energy of members, and distance between members and cluster head. After the CHs are selected, the CHs broadcast the HEAD_Adv_Msg to neighbor nodes. Other non-CH nodes receive the HEAD_Adv_Msg and estimate this function, and then join clusters by sending a JOIN_Clu_Msg to their respective CH. This function is the calculated in equation 11: ‫ܧ‬௔௩௘௥௔௚௘ ∗ ‫ܧ‬௥௘௦௜ௗ௨௔௟ ݂ = max ቈ ቉ (11) ‫ܦ‬௔௩௘௥௔௚௘ ∗ ݀ሺ݅, ‫ܪܥ‬ሻ Where ‫ܧ‬௥௘௦௜ௗ௨௔௟ is the residual energy of candidate node i at the current time,‫ܧ‬௔௩௘௥௔௚௘ is the average energy of normal nodes and ‫ܦ‬௔௩௘௥௔௚௘ is the average distance from normal nodes to CH, ݀(݅, ‫ )ܪܥ‬is the geographic distance from the normal node to the CH. Rohollah Omidvar,

IJRIT-43

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

6. Simulation Experiments In this section, we evaluate the performance of our proposed algorithm through the simulations. We compare our proposed algorithm with LEACH based on performance metrics: total energy consumption, number of alive nodes and system lifetime. We used MATLAB to test the modified LEACH protocol. Parameter settings are presented in Table 1.

No 1 2 3 4 5 6 7 8 9 10 11 12 13

Table 1 Parameter Setting PARAMETER DESCRIPTION Simulation area Network size Eelec(Radio electronic energy) Eamp(Radio amplifier energy) E Efs(Radio free space) Einit(Initial energy of node) Energy model Packet size Simulation time Base station at Channel type Antennae mode Number of cluster

Value 100m*100m 100 nodes 50 nJ/bit 100 pJ/bit/ m2 0. 013pJ/bit/ m4 2J Battery 500 bytes 3600 s 50,175 Channel/Wireless channel Antenna /omniantenna 5

Fig. 7 Number of nodes alive during the simulation time

Rohollah Omidvar,

IJRIT-44

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

Fig. 8 Number of nodes dead during the simulation time

The results are shown in Figure 7, nodes in propose method have a longer network lifetime than with LEACH. Here, the Y axis indicates the number of nodes and the X axis represents the lifetime of the nodes in the WSN according to the simulation time.Figure 8 shows the percentage of dead nodes during the simulation time. It is obvious that propose algorithm achieved Better energy efficiency and prolonged the WSN lifetime compared to LEACH. The results are shown in Figure 9, nodes in propose algorithm have a longer energy lifetime than LEACH. As shown in the figure 7 and 8, nodes in LEACH protocol and propose method begin to die after about 1600 rounds, LEACH protocol almost all nodes die when it comes to 2250 rounds. While in propose algorithm, all nodes begin to die after 4000 rounds, this proves that propose method is one improved algorithm.

Fig. 9 energy lifetime

7. Conclusion In this paper, we propose an improvement to the cluster-based LEACH routing protocol for greater energy efficiency in a Wireless Sensor Network. This paper introduced two idea of LEACH protocol. In the proposed routing protocol, the first idea we consider a Likely Attributable Function to select CH nodes, that Cluster head be selected in the area where we wanted. In second idea, we applied the other function for cluster member election. Many simulation experiments were conducted to evaluate the significance of our

Rohollah Omidvar,

IJRIT-45

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 38-46

proposed approach results of the simulation confirmed that method propose outperforms LEACH in lengthening Wireless Sensor Network lifetime.

References [1] M. Madheswaran, R.N. Shanmugasundaram, “Enhancement of LEACH algorithm for wireless networks: A review”, Ictact Journal On Communication Technology, December 2013, Volume: 04, Issue: 04,1. [2] K. Sohrabi, J. Pottie, “Protocols for self-organization of a wireless sensor network,” IEEE Personal Commun. 7(5), 2000, pp 16-27. [3] K.Akkaya, M.Younis, “A survey on routing protocols for wireless sensor networks,” Ad hoc networks, Vol. 3, No. 3 , pp 325-349, May 2005 [4] J. Al-Karaki, A. Kamal, “Routing techniques in wireless sensor networks: A survey,” IEEE Communications Magazine, vol 11, no. 6, Dec. 2004, pp. 6-28. [5] W. Heinzelman, A.Chandrakasan and H. Balakrishnan, “An application specific protocol architecture for wireless micro sensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4 , pp. 660 – 670, Oct. 2002. [6] Liang, C.Kuo, Y. Huang and J.Da Lin, "An energy efficient routing scheme in wireless sensor networks," In Advanced Information Networking and Applications-Workshops, AINAW 2008. 22nd International Conference on, pp. 916-921. IEEE, 2008. [7] J.Zheng, A.Jamalipour, “Wireless sensor networks: A networking perspective,” a book published by A John & Sons, Inc, and IEEE, 2009. [8] S. Lindsey and C. Raghavendra, “PEGASIS: Power-Efficient Gathering in Sensor Information Systems,” IEEE Aerospace Conf. Proc., 2002, vol. 3, 9–16, pp. 1125–30. [9] Younis, Ossama, and S. Fahmy. “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks”. Mobile Computing, IEEE Transactions on 3, no. 4 (2004), pp. 366-379,2004. [10] A. Manjeshwar, D. P. Agrawal , “ TEEN: A routing protocol for enhanced efficiency in wireless sensor networks ,” Proceedings IPDPS 01 , San Francisco, CA, Apr.2001 , pp. 2009 – 2015 [11] A. Manjeshwar, D. P. Agrawal , “ APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks”, Proceedings IPDPS 01, San Francisco, CA, Apr. 2001 , pp. 2009 – 2015. [12] S. Bandyopadhyay, E. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks,” in Proceeding of Infocom 2003, vol. 3, San Francisco, CA, pp. 1713 – 1723, Apr. 2003 [13] W. Heinzelman, A.Chandrakasan and H.Balakrishnan, “Application-specific protocol architectures for wireless networks”, Proceedings of the Hawaii International Conference on System Sciences, 2000. [14] B.Akay, D.Karaboga, “A modified artificial bee colony algorithm for real-parameter optimization”, Information Sciences, 2010. [15] V. Loscrì, G. Morabito and S. Marano. “A Two-levels hierarchy for low-energy adaptive clustering hierarchy”, IEEE, 2005. [16] H.Zhou, Z.Jiang and M. Xiaoyan, “Study and design on cluster routing protocols of wireless sensor networks”, dissertation, 2006. [17] N.Duy tan, L.Han, N.Dinh Viet and M.Jo,”An improved leach routing protocol for energy-efficiency of wireless sensor networks”, Smart computing review, 2012.

Rohollah Omidvar,

IJRIT-46

An Improved LEACH Protocol by Using Two Suitability Functions

describes the wireless sensor network model, Section 4 describes radio energy model, Section 5 explains .... Radio Energy Model. We use the same radio model as stated in [5, 13]. Matching to the radio energy dissipation model of Fig. 1, the energy consumption of transmitting l-bit data over a ... transmitter amplifier model.

325KB Sizes 0 Downloads 274 Views

Recommend Documents

An Improved LEACH Protocol by Using Two Suitability Functions
consumption and increases the lifetime of associated nodes. In next stage, for election cluster member, using one other suitability function. Simulation is conducted in using MATLAB results are analyzed for energy consumption. Keywords: LEACH, Node,

An Improved μTESLA Protocol Based on Queuing Theory and ...
An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs.pdf. An Improved μTESLA Protocol Based on Queuing Theory ...

Securing the wireless sensor networks having the LEACH protocol ...
In this protocol, CH is broadcasting a message called “HELLO” with some power and within a specified radius distance. .... So the nodes present in radio range will assume the adversary node is a neighbor node ... Where λ is the wavelength, L is

Improved Optimal Link State Routing (OLSR) Protocol
performance by selecting an appropriate “Hello Refresh Interval” for better throughput and select suitable MPR nodes, to reduce overhead and packet duplicity.

An Improved Control Law Using HVDC Systems for ...
Aug 28, 2013 - Systems for Frequency Control. Jing Dai1. Gilney Damm2 ... information. ... This lead to a smaller degree of primary reserve sharing, than the ...

Functions and Equations in Two Variables Functions ...
z = f(x, y). Example:ааEvaluate the function for f(4,ан3). f(x, y) = x. 2. + 4y or ... necessary to solve an equation for a variable. ... Pg 486аа585 x 5, 100, 101, 103.

An improved memetic algorithm using ring neighborhood ... - GitHub
4, 5, 6, 7 that the con- vergence to the known optimal result of test functions is very fast and most test functions have been converged after around. 1 × 105 FEs.

An improved memetic algorithm using ring neighborhood ... - GitHub
Nov 29, 2013 - The main motivation of using ring neighborhood topology is to provide a good ... mine the choice of solutions for local refinements, by utiliz- ...... 93,403 g08. 2,755. 2,990 g09. 13,455. 23,990 g10. 95,788. 182,112 g11. 1,862.

An Improved Control Law Using HVDC Systems for ...
distance transmission, as well as for connecting offshore wind farms. Despite its ... HVDC system, only one keeps the power balance of the. DC grid by ..... cumulative effects in the long term would make the converters' DC voltage drift to an ...

FAB: An Intuitive Consensus Protocol using Raft and ...
Mar 23, 2015 - also provides weighted leader election to influence ... highest weighted member to become the Leader. ...... I would also like to thank my team.

Improved Probabilistic Models for 802.11 Protocol ...
area networks. Its medium access control layer (MAC) is a carrier sense multiple .... Hence, define an adversary or scheduler that resolves non-determinism as ...

ANDA Suitability Petitions - FDA
1. Originating Office: Office of Generic Drugs. Effective Date: 08/21/13, 8/10/18. Page 1 of 5. POLICY AND PROCEDURES. OFFICE OF GENERIC DRUGS.

Two-hop secure communication using an untrusted relay
wireless communication systems from the physical layer up. Prominent such ... eavesdropper [8, 10, 17], and taking advantage of variations in channel state to ...

Two-hop secure communication using an untrusted relay - WCAN@PSU
wireless communication systems from the physical layer up. Prominent such examples include using multiple antennas to steer the transmitted ...... noise,” in Proceedings of the 62nd IEEE Vehicular Technology. Conference (VTC '05), vol.

Connecting two computers into a local network using an Ethernet ...
Connecting two computers into a local network using an Ethernet cable.pdf. Connecting two computers into a local network using an Ethernet cable.pdf. Open.

An Improved Connected Component Labeling by ...
intensive low level computer vision algorithms. CCL algorithms can be ..... algorithm for virtual memory computers”, CVGIP, 1983, PP. 287–. 300. [6] Chang F ...

ECOTOURISM SUITABILITY AND CARRING CAPCACITY ...
ECOTOURISM SUITABILITY AND CARRING CAPCA ... OF LAGUNA BEACH MERPAS REGENCY KAUR.pdf. ECOTOURISM SUITABILITY AND CARRING ...

Secured Two Phase Geographic Forwarding Protocol in ... - CiteSeerX
Computer Engineering Department, Addis Ababa University, Ethiopia. 2. Department of ... it is resilient to security attacks, since attacks at the networking layer (specifically .... Pairing-based cryptography [4] [11], is an emerging tech- nology tha

Emailing Functions- Correction and Brainstorming - Using English
Explaining the topic of the email/ Explaining the reason for writing. • Friendly ... Mentioning previous email communication ... I hope you had a good weekend.

Business English- Email Functions review - Using English
It was great/ nice/ a pleasure to (finally) meet you at the conference last week. Thanks for ... Thanks/ Thank you for your letter/ email/ fax/ phone call last week.