SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
916
All Rights Reserved © 2013 IJARCET

Abstract— A wireless sensor network is a network that
is made of hundreds or thousands of sensor nodes which are densely
deployed in an unattended environment with the capabilities of
sensing, wireless communications and computations which collects
and disseminates environmental data. For many applications in
wireless sensor networks, users may want to continuously extract
data from the networks for analysis later. However, accurate data
extraction is difficult and it is often too costly to obtain all sensor
readings, as well as not necessary in the sense that the readings
themselves only represent samples of the true state of the world.
Energy conservation is crucial to the prolonged lifetime of
a sensor network. Energy consumption can be reduced for data
collections from sensor nodes using prediction. The prediction
based algorithms are based on the observation that the sensor
capable of local computation generates the possibility of training
and using predictors in a distributed way.
An energy efficient framework for clustering based data
collection in wireless sensor networks can be done by adaptively
integrating enabling/disabling prediction scheme with sleep/awake.
The framework consists of a number of sensor nodes which form
clusters. Each cluster has a cluster head and set of sensor nodes
attached to it. Cluster head collects the data value from its member
nodes .The prediction incorporated in the member nodes imply that
sensors need not to transmit the data if it does not differ from a
predicted value by a certain threshold. A member need not be awake
if no data value has to be transmitted but only has to periodically
check the data values and awake only if it differs from the predicted
value. If prediction is disabled it simply transmits the data values.
The performance of power saving in clustering based prediction is
evaluated by creating a network scenario for tracking a moving
object in NS-2.33 simulator.
.
Index Terms: Cluster head, Prediction operation, Sleep/Awake
Algorithm.
INTRODUCTION
Wireless sensor network (WSN) refers to a group of
spatially dispersed and dedicated sensors for monitoring and
recording the physical conditions. Wireless Sensor Network
comprises of numerous sensors and they are interlinked or
connected with each other for performing the same function
collectively or cooperatively. It is a network that is made of
hundreds or thousands of sensor nodes which are densely deployed
in an unattended environment with the capabilities of sensing,
wireless communications and computations. These spatially
distributed autonomous devices cooperatively monitor physical and
environmental conditions, such as temperature, sound, vibration,
pressure, motion or pollutants, at different locations.Wireless sensor
networks have critical applications in the scientific, medical,
commercial and military domains. Examples of these applications
include environmental monitoring, smart homes and offices,
surveillance, and intelligent transportation systems. It also has
significant usages in biomedical field. As social reliance on wireless
sensor network technology increases, they can expect the size and
complexity of individual networks as well as the number of
networks to increase dramatically. Wireless sensor networks are
typically used in highly dynamic, and hostile environments with no
human existence (unlike conventional data networks), and therefore,
.
they must be tolerant to the failure and loss of connectivity of
individual node. The sensor nodes should be intelligent to recover
from failures with minimum human involvement. Networks should
support process of autonomous formation of connectivity,
addressing, and routing structure. Architecture of wireless sensor
network is designed taking all these factors into consideration. The
architecture consists of
a. The sensor nodes that form the sensor network. Their main
objectives are making discrete, local measurement about
phenomenon surrounding these sensors, forming a wireless network
by communicating over a wireless medium, and collect data and
route data back to the user via sink (Base Station).
b. The sink (Base Station) communicates with the user via internet
or satellite communication. It is located near the sensor field or
well-equipped nodes of the sensor network. Collected data from the
sensor field routed back to the sink by a multi-hop infrastructure less
architecture through the sink.
A. ENERGY CONSIDERATION IN WIRELESS
NETWORKS
Energy conservation is a critical issue in the design of
sensor networks since the sensor nodes are battery-powered. WSN
has been considered as a promising method for reliably monitoring
both civil and military environments under hazardous conditions.
Due to such condition, the power supply for sensor in the network
cannot be usually rechargeable or replaceable. The design of
protocols and applications for such networks has to be energy aware
in order to prolong the lifetime of the network because it is quite
difficult to recharge node batteries. A node in WSN depends on
batteries for their energy source. However, since a battery‟s lifetime
is limited, the power resource is at a premium. But wireless signal
transmission, reception, retransmission, and beaconing operations
all consume battery power. Energy efficiency in mobile nodes can
be achieved through improvement in various levels, including the
communication, and application layers [4]. For example, the power
management feature in 802.11 cards allows two modes of operation,
the active mode and power save mode. During the active mode, the
wireless card is always ready to transmit or receive frames in
accordance with the specifications of the 802.11 medium access
control protocols. In the power save mode, nodes are temporarily
put to sleep and are awake only in scheduled time intervals for short
durations.
The computing components used in a mobile node, such as
processors, memory and input/output devices; usually have low
capacity and limited processing power [9]. Therefore, algorithms for
communication protocols need to be lightweight in terms of
computational and storage requirements. The existing research on
energy consumption of sensors is usually based on either theoretical
models or computer simulations. One widely cited model of energy
consumption has been used extensively as a guide for simulations
and the design of low power consumption communication protocols
[3] One solution is clustering-based localized prediction[10], where
a cluster head also a sensor node maintains a set of history data of
each sensor node within a cluster. They expect the use of localized
prediction techniques is highly energy efficient due to the reduced
length of routing path for transmitting sensor data. On the downside,
clustering based local prediction in sensor networks faces a couple
of new challenges. First, since the cost of training a predictor is
nontrivial, they should carefully investigate the trade-off between
Prediction Based Data Collection in
Wireless Sensor Network
V.Mathibala , Mrs. Seiya Susan Thomas.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
917
communication and computation. To support prediction techniques,
energy is consumed on communication(e.g., sending and receiving
sensor data) and computation(e.g., processing sensor data and
calculating a predicted value). Motivated by this observation, we
analytically study how to determine whether a prediction technique
is beneficial in this paper, qualitatively derive sufficient conditions
for this and reveal that the decision is a function of both the desired
error bound and the correlation among the sensor data values. For
instance, when the error bound is very tight or the correlation is not
significant, a sensor node always has to send its data to the cluster
head. The second challenge is due to the characteristics and inherent
dynamics of the sensor data. When the data distribution, in
particular the data locality, evolves overtime, prediction techniques
may not work well for a set of less predictable data. Global re
clustering is costly if it is initiated periodically.
B. Energy Consumption and Predictor
A sensor network consists of a set of autonomous sensor nodes
which spontaneously create communication links, and then,
collectively perform tasks without help from any central servers. In
sensor networks, accurate data extraction is difficult; it is often too
costly to obtain all sensor readings, as well as not necessary in the
sense that the readings themselves only represent samples of the true
state of the world. As such, one technique so called prediction
emerges to exploit the temporal correlation of sensor data.
Technology trends in recent years have resulted in sensors‟
increasing processing power and capacity [5]. Implementing more
sophisticated distributed algorithms in a sensor network becomes
possible.
Predictor is one of the important techniques, which uses the past
input values from the sensors in order to perform the prediction
operations. The existence of such prediction capability implies that
the sensors do not need to transmit the data values if they differ from
a predicted value by less than a certain prespecified threshold, or
error bound. A simple approach to developing a predictor in sensor
networks is simply to transmit the data from all sensors to the base
station (i.e., the sink), which has been realized in many previous
studies [6], [10], and [2]. Predictor training and prediction
operations are carried out by the base station only, but not the sensor
nodes, despite their increasing computing capacity.
This solution while practical has many disadvantages,
such as a high energy consumption incurred by transmitting the raw
data to the base station, the need for wireless link bandwidth, and
potential high latency.
1) Adaptive scheme to enable/disable prediction
Operations
Consider a cluster of sensor nodes, which can be awake or
sleeping. If the sensor nodes are sleeping, the prediction problem is
reduced to estimating data distribution parameters using history
data. In this case the estimates are already available. If the sensor
nodes are awake, they continuously monitor an attribute x and
generate a data value at every time instance t . Without local
prediction capability at the cluster head, a sensor node has to send all
data values to the cluster head that estimates data distribution
accordingly. With local prediction, however, a sensor node can
selectively send its data values to the cluster head[10].
One model for selective sending is  loss approximation. Given
an error bound 0 a sensor node sends its value
xt
to the cluster
head if  xx tt ˆ the where xtˆ is a predicted representative data
value to approximate the true data. The intuition of this choice is that
if a value is close to the predicted value there is not much benefit by
reporting it. If the value is much different from the predicted value,
it is important to consider it for computing the data distribution. To
solve this problem, first develop a localized prediction model. Very
complex models are not practical in the application due to the
limited computational capacity of sensor nodes. Fortunately, simple
linear predictors are sufficient to capture the temporal correlation of
realistic sensor data as [1, 6]. A history based linear predictor is one
of popular approaches to predicting the future based on past
n measurement ),....,
2
,
1
(ˆ x ntxtxt
px

 . In particular, it has the
properties: 1)
),...,,(ˆ
21
kxkxkxpxk
ntttt 
 and
2)
,(.)' cp
itx


where c is constant, and
1(.)'1
 
 p
itx
n
i
if
the predictor is unbiased
xwx it
p
i itt
c ,1  
. One of the
examples, autoregressive model denoted by  pR is written as
where
 
,...,
1
are the parameters of the model. Here, c is a
constant always presumed to be zero and
wt
is a white noise process
with zero mean and variance

2 .The process is covariance
stationary if 1i . Accordingly, a p -order AR predictor
is: .1ˆ xx it
p
i it   The parameters can be calculated by
Yule-Walker equations or using the least square method. The
parameters are often updated on every measurement and the
estimation is carried out by both the cluster header and 2 cluster
members to achieve synchronization. If the error tolerant  and
correlation )( jx satisfy





 


 
 k
k
m
j
x
x
p
j j
2
1
)(1
1
1


....(1)
(1) the scheme with local prediction is more energy efficient, where
the parameters are given as in table (1.2). Equation (1) gives the
error bound condition. This result says, if the correlation coefficient
is too small, prediction will not be accurate. As a result, sensor data
values are often not within the error bound and will still be
transmitted to the cluster head. Meanwhile, if the error bound is
small, the condition is not easily satisfied either and transmissions
are still required. Together, this corollary tells that algorithm
selection should be determined based on both the desired error
bound and the predictability of the sensor data and from
experimental results the effect on the parameter m is not
deterministic. While a large value of „m‟ often leads to the condition
of (1) hardly satisfied and there by the prediction scheme at the node
is prone to being disabled, it can reduce the energy consumption as a
long term predictor when the condition is satisfied.
Process at the Cluster Head:
if timeout after secondsm
for each member i in the Cluster
if Condition (1) holds
Send message to member i to enable prediction
else
Send message to member i to disable prediction
Else
for each member i in this cluster
if receive a data value from member i
update the history data for member i
else
Perform Prediction to update the history data
Algorithm 1.1 Operations at the Cluster Head
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
918
All Rights Reserved © 2013 IJARCET
Algorithm 1.1 shows the pseudo code description of the
algorithms at the cluster head the cluster head maintains a set (a
circular array) of history data for each cluster member. The
algorithm shows the cluster head will continuously receive data
values from each cluster member to update the set of history data or
when no data values are received will use the predicted value instead
for update. The cluster head also runs a periodic process, to
determine algorithm selection, with or without local prediction. The
decision is broadcast to all cluster members.
Process at the cluster members
if prediction is disabled or  xx ii ˆ
send the data value to the cluster head
update the history data using the data value
else
Perform prediction to update the history data
Algorithm 1.2 Operations at cluster members
Algorithm 1.2 is the pseudo code description at each
cluster node. Each cluster member maintains a set of history data of
its own. If “no local prediction”, is selected it simply transmits the
data values. If local prediction is turned on, the cluster member will
perform prediction on each data value. If the data value is not within
the error bound, it will be sent to the cluster head too. Meanwhile,
the local set of history data should be updated as well. In particular,
if local prediction is enabled and the data value is within the error
bound, the predicted value not the actual value will be included in
the set of history data. The purpose is to maintain the consistency
between local and the cluster head.
The result from the simulation has shown below in the line graph
with variable nodes. The simulation shows that enable/disable with
sleep/awake algorithm consumed less energy when compared to the
existing scheme.
Average Energy Consumption
CONCLUSION
A Framework for clustering based data collection with
prediction for wireless sensor network has been described. The
detailed analysis and description of its two main components,
adaptive scheme to enable/disable prediction and integration of
sleep/awake algorithms for nodes is presented. An energy-aware
predictor is used to find the trade-off between communication and
prediction cost. By using sleep/awake Algorithm energy
consumption is reduced and network life time is increased.
The usefulness of the framework is demonstrated by
accommodating moving object into the area. Via performance
evaluation, it has been shown that it achieves energy efficiency
when sensor data is spatially and temporally correlated. To
summarize, the framework demonstrates that it is viable framework
to facilitate data collection in large-scale wireless sensor networks.
REFERENCES
[1] Chu . D, Deshpande . A, Heller stein. J.M. and W. Hong,
(2006) “Approximate Data Collection in Sensor Networks
Using Probabilistic Models”, Proc. IEEE Int‟l Conf. Data
Eng. (ICDE).
[2] Goel. S and Imielinski. T (2001), “Prediction-Based
Monitoring in Sensor Networks: Taking Lessons from
Mpeg,” Acme Sitcom Computer Comm. Rev., vol. 31, no.
5, pp. 82-98.
[3] Heinemann. W, Chandrakasan .A and Balakrishnan .H,
(Jan, 2000) "Energy-Efficient Communication Protocol
for Wireless Micro sensor Networks", In Proc. 33rd HICS,
4-7.Vol 2, pp. 10.
[4] Jiang Et Al Hongbo, Shudong Jin, Chonggang Wang,
(June 2011), Prediction or Not? An Energy-Efficient
Framework for Clustering Based Data Collection in
Wireless Sensor Networks. IEEE Transactions on Parallel
and Distributed Systems, Vol. 22, No. 6,
[5] McConnell .S.M. and Skill corn. D.B. (2005) “A
Distributed Approach for Prediction in Sensor Networks,”
Proc. SIAM Int‟l Conf. Data Mining Workshop Sensor
Networks.
[6] Meka. A and Singh. A. K (2006) Distributed spatial
clustering in sensor networks. In Proceedings of EDBT,
[7] Ossama Younis and Sonia Fahmy. (2004). Distributed
Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy
Efficient Approach. In Proceedings of IEEE INFOCOM,
Hong Kong, an extended version appeared in IEEE
Transactions on Mobile Computing, 3(4).
[8] Toh C-K (2007), Ad Hoc Mobile Wireless
Networks-Protocols and Systems, Pearson Education,
Edition-, ISBN- 978-8-1317-1510-9.
[9] Tulane. D and Madden. S, (2006) “An Energy-Efficient
Querying Framework in Sensor Networks for Detecting
Node Similarities, ”Proc. IEEE/ACM Int‟l Conf.
Modeling, Analysis, and Simulation of Wireless and
Mobile Systems (Swim).
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
919
[10] Xu . Y. and W.-C. Lee, (2003) “ On Localized Prediction
for Power Efficient Object Tracking in Sensor
Networks,” International Conference of Distributed
Computing Systems Workshop, pp. 434-439.

More Related Content

What's hot

Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNpharmaindexing
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocoleSAT Publishing House
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
 
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...IRJET Journal
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 

What's hot (18)

Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
Report
ReportReport
Report
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 

Viewers also liked

Viewers also liked (20)

1904 1908
1904 19081904 1908
1904 1908
 
Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063
 
313 318
313 318313 318
313 318
 
Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662
 
92 97
92 9792 97
92 97
 
1850 1854
1850 18541850 1854
1850 1854
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
8 17
8 178 17
8 17
 
1909 1913
1909 19131909 1913
1909 1913
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
210 214
210 214210 214
210 214
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
671 679
671 679671 679
671 679
 
Apresentação de Paulo Barreto
Apresentação de Paulo BarretoApresentação de Paulo Barreto
Apresentação de Paulo Barreto
 
Regression lineaire Multiple (Autosaved) (Autosaved)
Regression lineaire Multiple (Autosaved) (Autosaved)Regression lineaire Multiple (Autosaved) (Autosaved)
Regression lineaire Multiple (Autosaved) (Autosaved)
 
Ns2 titles
Ns2 titlesNs2 titles
Ns2 titles
 
Highscoreluisvidigalinovacaoemservicospublicos nov2014-141124194103-conversio...
Highscoreluisvidigalinovacaoemservicospublicos nov2014-141124194103-conversio...Highscoreluisvidigalinovacaoemservicospublicos nov2014-141124194103-conversio...
Highscoreluisvidigalinovacaoemservicospublicos nov2014-141124194103-conversio...
 
Guía para elaboración de guías
Guía para elaboración de guíasGuía para elaboración de guías
Guía para elaboración de guías
 
SAÚDE MENTAL, ÁLCOOL E OUTRAS DROGAS
SAÚDE MENTAL, ÁLCOOL E OUTRAS DROGASSAÚDE MENTAL, ÁLCOOL E OUTRAS DROGAS
SAÚDE MENTAL, ÁLCOOL E OUTRAS DROGAS
 

Similar to Ijarcet vol-2-issue-3-916-919

Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...Editor IJMTER
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 

Similar to Ijarcet vol-2-issue-3-916-919 (19)

Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
D035418024
D035418024D035418024
D035418024
 
De3211001104
De3211001104De3211001104
De3211001104
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Ijarcet vol-2-issue-3-916-919

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 916 All Rights Reserved © 2013 IJARCET  Abstract— A wireless sensor network is a network that is made of hundreds or thousands of sensor nodes which are densely deployed in an unattended environment with the capabilities of sensing, wireless communications and computations which collects and disseminates environmental data. For many applications in wireless sensor networks, users may want to continuously extract data from the networks for analysis later. However, accurate data extraction is difficult and it is often too costly to obtain all sensor readings, as well as not necessary in the sense that the readings themselves only represent samples of the true state of the world. Energy conservation is crucial to the prolonged lifetime of a sensor network. Energy consumption can be reduced for data collections from sensor nodes using prediction. The prediction based algorithms are based on the observation that the sensor capable of local computation generates the possibility of training and using predictors in a distributed way. An energy efficient framework for clustering based data collection in wireless sensor networks can be done by adaptively integrating enabling/disabling prediction scheme with sleep/awake. The framework consists of a number of sensor nodes which form clusters. Each cluster has a cluster head and set of sensor nodes attached to it. Cluster head collects the data value from its member nodes .The prediction incorporated in the member nodes imply that sensors need not to transmit the data if it does not differ from a predicted value by a certain threshold. A member need not be awake if no data value has to be transmitted but only has to periodically check the data values and awake only if it differs from the predicted value. If prediction is disabled it simply transmits the data values. The performance of power saving in clustering based prediction is evaluated by creating a network scenario for tracking a moving object in NS-2.33 simulator. . Index Terms: Cluster head, Prediction operation, Sleep/Awake Algorithm. INTRODUCTION Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions. Wireless Sensor Network comprises of numerous sensors and they are interlinked or connected with each other for performing the same function collectively or cooperatively. It is a network that is made of hundreds or thousands of sensor nodes which are densely deployed in an unattended environment with the capabilities of sensing, wireless communications and computations. These spatially distributed autonomous devices cooperatively monitor physical and environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations.Wireless sensor networks have critical applications in the scientific, medical, commercial and military domains. Examples of these applications include environmental monitoring, smart homes and offices, surveillance, and intelligent transportation systems. It also has significant usages in biomedical field. As social reliance on wireless sensor network technology increases, they can expect the size and complexity of individual networks as well as the number of networks to increase dramatically. Wireless sensor networks are typically used in highly dynamic, and hostile environments with no human existence (unlike conventional data networks), and therefore, . they must be tolerant to the failure and loss of connectivity of individual node. The sensor nodes should be intelligent to recover from failures with minimum human involvement. Networks should support process of autonomous formation of connectivity, addressing, and routing structure. Architecture of wireless sensor network is designed taking all these factors into consideration. The architecture consists of a. The sensor nodes that form the sensor network. Their main objectives are making discrete, local measurement about phenomenon surrounding these sensors, forming a wireless network by communicating over a wireless medium, and collect data and route data back to the user via sink (Base Station). b. The sink (Base Station) communicates with the user via internet or satellite communication. It is located near the sensor field or well-equipped nodes of the sensor network. Collected data from the sensor field routed back to the sink by a multi-hop infrastructure less architecture through the sink. A. ENERGY CONSIDERATION IN WIRELESS NETWORKS Energy conservation is a critical issue in the design of sensor networks since the sensor nodes are battery-powered. WSN has been considered as a promising method for reliably monitoring both civil and military environments under hazardous conditions. Due to such condition, the power supply for sensor in the network cannot be usually rechargeable or replaceable. The design of protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network because it is quite difficult to recharge node batteries. A node in WSN depends on batteries for their energy source. However, since a battery‟s lifetime is limited, the power resource is at a premium. But wireless signal transmission, reception, retransmission, and beaconing operations all consume battery power. Energy efficiency in mobile nodes can be achieved through improvement in various levels, including the communication, and application layers [4]. For example, the power management feature in 802.11 cards allows two modes of operation, the active mode and power save mode. During the active mode, the wireless card is always ready to transmit or receive frames in accordance with the specifications of the 802.11 medium access control protocols. In the power save mode, nodes are temporarily put to sleep and are awake only in scheduled time intervals for short durations. The computing components used in a mobile node, such as processors, memory and input/output devices; usually have low capacity and limited processing power [9]. Therefore, algorithms for communication protocols need to be lightweight in terms of computational and storage requirements. The existing research on energy consumption of sensors is usually based on either theoretical models or computer simulations. One widely cited model of energy consumption has been used extensively as a guide for simulations and the design of low power consumption communication protocols [3] One solution is clustering-based localized prediction[10], where a cluster head also a sensor node maintains a set of history data of each sensor node within a cluster. They expect the use of localized prediction techniques is highly energy efficient due to the reduced length of routing path for transmitting sensor data. On the downside, clustering based local prediction in sensor networks faces a couple of new challenges. First, since the cost of training a predictor is nontrivial, they should carefully investigate the trade-off between Prediction Based Data Collection in Wireless Sensor Network V.Mathibala , Mrs. Seiya Susan Thomas.
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 917 communication and computation. To support prediction techniques, energy is consumed on communication(e.g., sending and receiving sensor data) and computation(e.g., processing sensor data and calculating a predicted value). Motivated by this observation, we analytically study how to determine whether a prediction technique is beneficial in this paper, qualitatively derive sufficient conditions for this and reveal that the decision is a function of both the desired error bound and the correlation among the sensor data values. For instance, when the error bound is very tight or the correlation is not significant, a sensor node always has to send its data to the cluster head. The second challenge is due to the characteristics and inherent dynamics of the sensor data. When the data distribution, in particular the data locality, evolves overtime, prediction techniques may not work well for a set of less predictable data. Global re clustering is costly if it is initiated periodically. B. Energy Consumption and Predictor A sensor network consists of a set of autonomous sensor nodes which spontaneously create communication links, and then, collectively perform tasks without help from any central servers. In sensor networks, accurate data extraction is difficult; it is often too costly to obtain all sensor readings, as well as not necessary in the sense that the readings themselves only represent samples of the true state of the world. As such, one technique so called prediction emerges to exploit the temporal correlation of sensor data. Technology trends in recent years have resulted in sensors‟ increasing processing power and capacity [5]. Implementing more sophisticated distributed algorithms in a sensor network becomes possible. Predictor is one of the important techniques, which uses the past input values from the sensors in order to perform the prediction operations. The existence of such prediction capability implies that the sensors do not need to transmit the data values if they differ from a predicted value by less than a certain prespecified threshold, or error bound. A simple approach to developing a predictor in sensor networks is simply to transmit the data from all sensors to the base station (i.e., the sink), which has been realized in many previous studies [6], [10], and [2]. Predictor training and prediction operations are carried out by the base station only, but not the sensor nodes, despite their increasing computing capacity. This solution while practical has many disadvantages, such as a high energy consumption incurred by transmitting the raw data to the base station, the need for wireless link bandwidth, and potential high latency. 1) Adaptive scheme to enable/disable prediction Operations Consider a cluster of sensor nodes, which can be awake or sleeping. If the sensor nodes are sleeping, the prediction problem is reduced to estimating data distribution parameters using history data. In this case the estimates are already available. If the sensor nodes are awake, they continuously monitor an attribute x and generate a data value at every time instance t . Without local prediction capability at the cluster head, a sensor node has to send all data values to the cluster head that estimates data distribution accordingly. With local prediction, however, a sensor node can selectively send its data values to the cluster head[10]. One model for selective sending is  loss approximation. Given an error bound 0 a sensor node sends its value xt to the cluster head if  xx tt ˆ the where xtˆ is a predicted representative data value to approximate the true data. The intuition of this choice is that if a value is close to the predicted value there is not much benefit by reporting it. If the value is much different from the predicted value, it is important to consider it for computing the data distribution. To solve this problem, first develop a localized prediction model. Very complex models are not practical in the application due to the limited computational capacity of sensor nodes. Fortunately, simple linear predictors are sufficient to capture the temporal correlation of realistic sensor data as [1, 6]. A history based linear predictor is one of popular approaches to predicting the future based on past n measurement ),...., 2 , 1 (ˆ x ntxtxt px   . In particular, it has the properties: 1) ),...,,(ˆ 21 kxkxkxpxk ntttt   and 2) ,(.)' cp itx   where c is constant, and 1(.)'1    p itx n i if the predictor is unbiased xwx it p i itt c ,1   . One of the examples, autoregressive model denoted by  pR is written as where   ,..., 1 are the parameters of the model. Here, c is a constant always presumed to be zero and wt is a white noise process with zero mean and variance  2 .The process is covariance stationary if 1i . Accordingly, a p -order AR predictor is: .1ˆ xx it p i it   The parameters can be calculated by Yule-Walker equations or using the least square method. The parameters are often updated on every measurement and the estimation is carried out by both the cluster header and 2 cluster members to achieve synchronization. If the error tolerant  and correlation )( jx satisfy             k k m j x x p j j 2 1 )(1 1 1   ....(1) (1) the scheme with local prediction is more energy efficient, where the parameters are given as in table (1.2). Equation (1) gives the error bound condition. This result says, if the correlation coefficient is too small, prediction will not be accurate. As a result, sensor data values are often not within the error bound and will still be transmitted to the cluster head. Meanwhile, if the error bound is small, the condition is not easily satisfied either and transmissions are still required. Together, this corollary tells that algorithm selection should be determined based on both the desired error bound and the predictability of the sensor data and from experimental results the effect on the parameter m is not deterministic. While a large value of „m‟ often leads to the condition of (1) hardly satisfied and there by the prediction scheme at the node is prone to being disabled, it can reduce the energy consumption as a long term predictor when the condition is satisfied. Process at the Cluster Head: if timeout after secondsm for each member i in the Cluster if Condition (1) holds Send message to member i to enable prediction else Send message to member i to disable prediction Else for each member i in this cluster if receive a data value from member i update the history data for member i else Perform Prediction to update the history data Algorithm 1.1 Operations at the Cluster Head
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 918 All Rights Reserved © 2013 IJARCET Algorithm 1.1 shows the pseudo code description of the algorithms at the cluster head the cluster head maintains a set (a circular array) of history data for each cluster member. The algorithm shows the cluster head will continuously receive data values from each cluster member to update the set of history data or when no data values are received will use the predicted value instead for update. The cluster head also runs a periodic process, to determine algorithm selection, with or without local prediction. The decision is broadcast to all cluster members. Process at the cluster members if prediction is disabled or  xx ii ˆ send the data value to the cluster head update the history data using the data value else Perform prediction to update the history data Algorithm 1.2 Operations at cluster members Algorithm 1.2 is the pseudo code description at each cluster node. Each cluster member maintains a set of history data of its own. If “no local prediction”, is selected it simply transmits the data values. If local prediction is turned on, the cluster member will perform prediction on each data value. If the data value is not within the error bound, it will be sent to the cluster head too. Meanwhile, the local set of history data should be updated as well. In particular, if local prediction is enabled and the data value is within the error bound, the predicted value not the actual value will be included in the set of history data. The purpose is to maintain the consistency between local and the cluster head. The result from the simulation has shown below in the line graph with variable nodes. The simulation shows that enable/disable with sleep/awake algorithm consumed less energy when compared to the existing scheme. Average Energy Consumption CONCLUSION A Framework for clustering based data collection with prediction for wireless sensor network has been described. The detailed analysis and description of its two main components, adaptive scheme to enable/disable prediction and integration of sleep/awake algorithms for nodes is presented. An energy-aware predictor is used to find the trade-off between communication and prediction cost. By using sleep/awake Algorithm energy consumption is reduced and network life time is increased. The usefulness of the framework is demonstrated by accommodating moving object into the area. Via performance evaluation, it has been shown that it achieves energy efficiency when sensor data is spatially and temporally correlated. To summarize, the framework demonstrates that it is viable framework to facilitate data collection in large-scale wireless sensor networks. REFERENCES [1] Chu . D, Deshpande . A, Heller stein. J.M. and W. Hong, (2006) “Approximate Data Collection in Sensor Networks Using Probabilistic Models”, Proc. IEEE Int‟l Conf. Data Eng. (ICDE). [2] Goel. S and Imielinski. T (2001), “Prediction-Based Monitoring in Sensor Networks: Taking Lessons from Mpeg,” Acme Sitcom Computer Comm. Rev., vol. 31, no. 5, pp. 82-98. [3] Heinemann. W, Chandrakasan .A and Balakrishnan .H, (Jan, 2000) "Energy-Efficient Communication Protocol for Wireless Micro sensor Networks", In Proc. 33rd HICS, 4-7.Vol 2, pp. 10. [4] Jiang Et Al Hongbo, Shudong Jin, Chonggang Wang, (June 2011), Prediction or Not? An Energy-Efficient Framework for Clustering Based Data Collection in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 6, [5] McConnell .S.M. and Skill corn. D.B. (2005) “A Distributed Approach for Prediction in Sensor Networks,” Proc. SIAM Int‟l Conf. Data Mining Workshop Sensor Networks. [6] Meka. A and Singh. A. K (2006) Distributed spatial clustering in sensor networks. In Proceedings of EDBT, [7] Ossama Younis and Sonia Fahmy. (2004). Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy Efficient Approach. In Proceedings of IEEE INFOCOM, Hong Kong, an extended version appeared in IEEE Transactions on Mobile Computing, 3(4). [8] Toh C-K (2007), Ad Hoc Mobile Wireless Networks-Protocols and Systems, Pearson Education, Edition-, ISBN- 978-8-1317-1510-9. [9] Tulane. D and Madden. S, (2006) “An Energy-Efficient Querying Framework in Sensor Networks for Detecting Node Similarities, ”Proc. IEEE/ACM Int‟l Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (Swim).
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 919 [10] Xu . Y. and W.-C. Lee, (2003) “ On Localized Prediction for Power Efficient Object Tracking in Sensor Networks,” International Conference of Distributed Computing Systems Workshop, pp. 434-439.