SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.16, No.3, June 2018, pp. 1150~1157
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v16i3.8560 ๏ฎ 1150
Received September 10, 2017; Revised January 9, 2018; Accepted April 2, 2018
Performance Evaluation of DV-HOP and Amorphous
Algorithms based on Localization Schemes in Wireless
Sensor Networks
Doan Perdana, Adi Nugroho, Favian Dewanta
School of Electrical Engineering, Telkom University, Bandung, Indonesia
*Corresponding author, e-mail: doanperdana@telkomuniversity.ac.id, adinugrohoittelkom@gmail.com,
favian@ telkomuniversity.ac.id
Abstract
In the field of high-risk observation,the nodes in Wireless Sensor Network (WSN) are distributed
randomly.The result from sensing becomes meaningless ifit is not known from where the originating node
is. Therefore, a sensor node positioning scheme, known as the localization scheme, is required. The
localization scheme consists of distance estimation and position computing. Thus, this research used
connectivity as distance estimation within range free algorithm DV-Hop and Amorphous,and then trilateral
algorithm for computing the position. Besides that, distance estimation using the connectivity between
nodes is not needed for the additional hardware ranging as required by a range-based localization
scheme.In this research compared the localization algorithm based on range free localization, which are
DV-Hop algorithm and Amorphous algorithm. The simulation result shows that the amorphous algorithm
have achieved 13.60% and 24.538% lower than dv-hop algorithm for each parameter error localizationand
energy consumption. On node density variations, dv-hop algorithm gained a localization error that is
26.95% lower than amorphous algorithm, but for energy consumption parameter, amorphous gained
14.227% lower than dv-hop algorithm. In the communication range variation scenario, dv-hop algorithm
gained a localization error that is50.282% lower than amorphous. However, for energy consumption
parameter, amorphous algorithm gained 12.35%. lower than dv-hop algorithm.
Keywords:WSN, DV-HOP algorithm,amorphous algorithm,localization error,trilateral,energy
consumption
Copyright ยฉ 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
In this research, we discussed about the Wireless Sensor Network Localization, with
focus on performance analysis using DV-Hop and Amorphous algorithm. The DV-hop
algorithm [1] is the basic scheme and consists of three stages. First, the use of directional
classic distance by changing the protocol so all distances of nodes in the network to the anchor
can be obtained, and in this case the distance will be represented within a hop. Each node in
the table consists of {Xi, Yi, hi} and changes the update table in accordance their neighbor
nodes. The second stage, each anchor node determines the distance to the other anchor node.
Meanwhile, the amorphous algorithm is generally like DV-Hop algorithm that is used to calculate
the distance between two nodes but the difference is that amorphous algorithm calculates the
hop distances between the anchor nodes and unknown nodes. For computing the position, the
author used Trilateral algorithm to determine the position of the sensor node. The main reason
for using range free method in the application is because the range free method requires little
energy consumption, is low cost, and is suitable to be applied to a wide area as well as in the
field of high-risk observation.
The nodes are static and the effect of range communication and the number of anchor
nodes, the influence of the number of unknown nodes and a range communication to the
parameters of performance such as error position, energy consumption, and time position were
tested. The hypothesis was that the parameters of DV-hop algorithm performance is better than
Amorphous algorithm.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana)
1151
2. Related Works
There are numbers of sensor nodes deployed an observation area. Some have position
information (because it has a GPS or placed manually) while other nodesโ€™ positions have to be
determined by using localization techniques. The position that is determined is relatively
between nodes or other objects that are involved around it. Today, many localization schemes
depend on a few anchor deployed in sensor networks.
Anchor is a sensor node that knows its own position (via GPS or other manual
configuration) and act as a reference for other nodes whose position is unknown because their
position can spread. Here, the authors want to provide an additional reference. There are some
algorithms that can estimate range free distance. Those algorithms are dv-hop algorithm and
amorphous algorithm. A trilateral algorithm is used to estimate its position. However, do not
forget the critical issue in WSN which is the lifetime of the sensor that is limited by power [2].
Therefore, the author added performance parameters of energy consumption that is used to
determine the better performing algorithm from dv hop and amorphous which can then be used
as a reference for further research, especially into consideration the algorithm that want to be
improved [3-4].
3. Methodology
In this chapter, the analysis of simulation results using simulator NS2.34 will be
discussed. The analysis is aimed to find out the performance of the DV-Hop algorithm and
Amorphous algorithm. In this research, there were several scenarios:
a. Variation of anchor node scheme. The number of anchor nodes will be varied 5% to
25% with an increment of 5% for all nodes.
b. Variation of node density scheme. Number of nodes will be varied from 100 nodes to
500 nodes with an increment of 100 nodes.
c. Variation of range communication scheme. A value of range communication will be
varied from 200 meters to 400 meters with an increment of 50 meters.
3.1. Amorphous algorithm
In amorphous algorithm, to calculate hop distance successfully, the anchor nodes have
to find out three distances with applying maximum likelihood estimation to determine its position
or go through three sided measurements [5-6]:
a. Calculated the minimum hop from the Unknown Node to the Beacon Node. With the
flooding method, messages from beacon nodes can be sent to the unknown nodes.
(1)
Based on [5-6], eqn. (1) describes the calculation of the minimum hop from the node ๐‘– to ๐‘˜.
(๐‘–,) represents the minimum hop between the unknown node ๐‘– and beacon node ๐‘˜;
meanwhile โ„Ž(๐‘—,๐‘˜) describes the hop of unknown node ๐‘— to the beacon node ๐‘˜; โ„Ž(๐‘–,๐‘˜)
represents the calculating hop value of unknown node ๐‘– to the beacon node ๐‘˜; moreover
nbrs(๐‘–) describes the number neighbor nodes around the unknown node ๐‘–.
b. Calculated the distance between the Unknown Node to the Beacon Node.
(2)
where ๐‘Ÿ represents the wireless range of the node and ๐‘› local describes the network
average connectivity.
c. Use the trilateral algorithm to estimate the position. Trilateral algorithm calculates node
position using the line intersection of three anchor circles.
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157
1152
Figure 1. Model of Estimate Position Using Trilateral Algorithm [7]
To estimate a position using trilateration, unknown nodes have to know the position and
distance of the three anchor nodes. The distance can be calculated using the following formula:
(3)
Where (x, y) is the position of the nodes that will be counted, (xi, yi) is reference node position to
the i node, and (di) is the distance from the anchor node to the unknown node. From the
formula, there are three quadratic equations with two unknown, which in theory can be resolved
into an equation. equation 4 can be linearized by subtracting the last equation from the first
equation n-1, and can be formulated in linear multiplication system, which is AX=b, where:
(4)
x = ( )
3.2. DV-Hop Algorithm
DV-hop algorithm can estimate the average distance for every hop, which is then used
to correct the entire network [8]. The average hop-size for each anchor node can be calculated
with the following formula:
(5)
Where m represents as anchor node; hij represent as the number of hop between i and j. (xi, yi)
(xj, yj) are the coordinates of the anchor i and anchor j. Then, each anchor node notify the value
of hop size in the network. When an unknown node receives the information of hop size, the
estimated distance between unknown nodes and anchor nodes can be calculated as follows:
(6)
Figure 2 shows that the position of unknown nodes can be identified by the
computational position algorithm, which is one is trilateral algorithm. The following is a
representation of the DV-hop algorithm.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana)
1153
Figure 2 Basic of DV-Hop Method Using Three Node Reference [1]
Table 1. Parameter of Simulation
Channel Type WirelessChannel
Propagation Type freespace
Interface Type WirelessPhy
Queue Type Queue/Droptail/PriQueue
Link Layer Type LL
Antenna OmniAntena
Queue Length 50
Netw orkarea 1000mx1000m
Number of nodes 300
Communication range (m) 300
Number of Anchor Nodes 60
Simulation time 3 second
TransmitPow er 0.0744 w att
Receive Pow er 0.0648 w att
Idle Pow er 0.0000052 w att
Initial Energy 13770 joules
4. Result and Discussion
4.1. Analyze the effect of anchor node variation towards localization error and total
energy consumption
As already described in previous chapters, the localization error is a comparison
between error position nodes (meter) with communication ranges (meters). The error position of
a node is position error of the estimated node to the real position of node in meters. The total
energy consumption is the total energy consumption of the entire node in seconds [9-10].
Table 2 shows that the localization error due to the effect of anchor variation mostly gets lower
for Amorphous Algorithm except for the ratio of beacons 15%, it got higher than the previous
data. However, the results for location error in DVHOP, the values gets fluctuates. Table 3
shows that the total energy consumption due to the effect of anchor node variation for both
algorithm gets higher in each number of nodes value with increment 100 nodes.
Table 2. The Effect of Anchor Node Variation Towards Location Error
Ratio of Beacons AMORPHOUS (Joules) DVHOP (Joules)
5% 2,468 2,836
10% 1,82 3,274
15% 1,943 1,393
20% 1,436 1,34
25% 1,307 1,544
Table 3. The Effect of Anchor Node Variation Towards Total Energy Consumption
Number of nodes AMORPHOUS (Joules) DVHOP (Joules)
100 3,608 13,334
200 24,346 37,292
300 53,761 59,182
400 57,46 60,847
500 59,012 61,98
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157
1154
(a) Localization Error (b) Energy Consumption
Figure 3. The Effect of Anchor Node Variation towards Localization Error
and Energy Consumption
Figure 3 shows that the number of anchor nodes with an increment of 5%, where the
number of nodes is 300 and the range of communication is 300m, the localization error got
lower but the energy consumption is gets higher. The localization error got lower because the
more anchor nodes there are in network, the larger the coverage of network, resulting more hop
counts to go through. As more hop counts go through, the localization error gets lower. If the
localization error gets lower, it means a better position accuracy of nodes. The energy
consumption got higher because there were more anchor nodes in network, resulting in more
computation position that needs energy. Besides that, anchor nodes consume more energy
than unknown nodes because anchors have GPS.
For the localization error, the Amorphous algorithm have 13.60% less errors than DV-
Hop algorithm because the DV-Hop algorithm is based on hop count when estimating position.
Less anchor nodes will make the coverage in a network smaller, causing hop counts to get
lower. Less hop counts cause the accuracy to worsen. However, the value of the two algorithms
equally experienced fluctuations because of other factors. Those factors are node density,
random signaling, and deployment of node. For Energy Consumption, the Amorphous algorithm
use 24.538% less energy than DV-Hop algorithm because the DV-Hop algorithm is always
updating its table in accordance to their neighbor.
4.2. Analyze the effect of node density variation towards Localization error and total
energy consumption
Table 4 shows that the Localization Error due to the effect of node density variation for
both algorithm gets higher in each proportion of beacons value with increment 5%. Table 5
shows that the total energy consumption due to the effect of node density variation for both
algorithm gets fluctuate in each number of nodes value with increment 100 nodes.
Table 2. The Effect of Node Density Variation Towards Localization Error
Proportion of beacons AMORPHOUS (Joules) DVHOP (Joules)
5% 21,645 53,368
10% 36,849 56,803
15% 49,715 58,393
20% 53,761 59,182
25% 55,028 59,814
Table 5. The Effect of Node Density Variation to Energy Consumption
Number of nodes AMORPHOUS (Joules) DVHOP (Joules)
100 2,427 1,513
200 1,399 1,026
300 1,436 1,34
400 2,171 1,614
500 1,165 0,788
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana)
1155
(a) Localization Error (b) Energy Consumption
Figure 4. The Effect of Node Density Variation towards Localization Error
and Energy Consumption
Figure 4 shows that as the number of nodes increment by100, where the composition of
anchor nodes is 20% of nodes and the range of communication is 300m, the localization error is
gets lower but the energy consumption gets higher. The localization error became lower
because there were more unknown nodes in network which results in more hop count and
neighbor nodes. More hop counts and neighbor nodes cause the localization error to get lower.
If the localization error is low it means better accuracy of node positions. The energy
consumption gets higher because there were more nodes in network which means more energy
is required to estimate the position of nodes.
For the localization error, the DV-Hop algorithm has 26.95% less errors than the
amorphous algorithm because the DV-Hop algorithm is based on hop count when estimating
positions. More nodes in the network will create a larger hop count causing the computation to
be more accurate. However, the value of the two algorithms equally experienced fluctuations
because of other factors including node density, random signaling, and deployment of node.
For the Energy Consumption, the Amorphous algorithm uses 14.227% less energy than the
DV-Hop algorithm because the DV-Hop algorithm is always updating its table in accordance to
their neighbor and the computation of the DV-Hop algorithm is more complex than the
Amorphous algorithm, which uses more energy.
4.3. Analyze the effect of range communication variation towards localization error and
total energy consumption
Table 6 shows that the localization error due to the effect of range communication
variation mostly gets lower for Amorphous except for the wireless range 350, it gets higher than
the previous data. However, the results for location error in DVHOP, the values gets fluctuate.
Table 7 shows that the total energy consumption due to the effect of range communication
variations for both algorithm gets higher in each number of wireless range value with increment
50 nodes.
Table 6. Analysis The Effect of Range Communication Variation to Localization Error
Wireless range AMORPHOUS (Joules) DVHOP (Joules)
200 5,578 1,421
250 1,515 1,312
300 1,436 1,34
350 1,713 0,694
400 1,265 0,954
Table 7. Analysis The Effect of Range Communication Variation towards Energy Consumption
Wireless range AMORPHOUS (Joules) DVHOP (Joules)
200 38,723 52,151
250 47,956 56,985
300 53,761 59,182
350 56,473 60,638
400 57,485 61,301
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157
1156
(a) Localization Error (b) Energy Consumption
Figure 5. The Effect of Range Communication Variation towards Localization Error
and Energy Consumption
Figure 5 shows that as the communication range increment by 50m, where the number
of nodes is 300 and the composition of anchor nodes is 20% of all nodes, the localization error
is decreases but the energy consumption increases. The localization error decreases as the
there is an increase in node communication range, resulting a larger network coverage and
more hop count to go through. More hop count going through means a lower localization error.
If the localization error low, it means a better accuracy of node position. The energy
consumption also increases because the increase in node communication range uses more
power.
For the localization error, the DV-Hop algorithm has 50.282% less errors than the
amorphous algorithm because the DV-Hop algorithm is based on hop counts when estimating
positions. A higher node communication range will increase hop count, increasing the accuracy
of the computing. However, the value of the two algorithms equally experienced fluctuations
because of other factors such as node density, random signaling, and deployment of node.
For the Energy Consumption, the Amorphous algorithm uses 12.35% less energy than the DV-
Hop algorithm because the DV-Hop algorithm is always updating its table in accordance to their
neighbors and the computation of the DV-Hop algorithm is also more complex than the
Amorphous algorithm, which requires more energy.
5. Conclusion
This research which was conducted to analyze the performance of DV-Hop algorithm
and Amorphous algorithm towards localization schemes with error localization parameters and
energy consumption resulted the effect of increasing the number of anchor nodes: the number
of nodes and the number of communication range for the Amorphous algorithm and the DV-Hop
algorithm show that value of localization error gets lower. If the localization error is low, it means
a better accuracy of node positions. However, value of energy consumption gets higher. In the
localization error parameter: For the scheme of increasing the number of anchor nodes, the
Amorphous algorithm have 13.60% less errors than the DV-Hop. When increasing the number
of nodes, the DV-Hop algorithm has 26.95% less errors than the amorphous algorithm. For the
increase of communication range scheme, the DV-Hop algorithm has 50.282% less errors than
the amorphous algorithm because of the DV-Hop algorithm itself. In the energy consumption
parameter: For the scheme of increasing the number of anchor nodes: the Amorphous algorithm
uses 24.538% less energy than the DV-Hop algorithm. When increasing of nodes, the
Amorphous algorithm uses 14.227% less energy than the DV-Hop algorithm. For the increase of
communication range scheme, the Amorphous algorithm uses 12.35% less energy than the DV-
Hop algorithm.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana)
1157
References
[1] Nian-qiang,LI.A Range-Free Localization Scheme in Wireless Sensor Networks. IEEE International
Symposium on Knowledge Acquisition and Modeling Workshop. 2008: 525โ€“528.
http://doi.org/10.1109/KAMW.2008.4810540.
[2] F Wang, L Shi, F Ren. Self-localization systems and algorithms for wireless sensor networks. Journal
of Software. 2005; 16(5): 857-868.
[3] http://prima.lecturer.pens.ac.id/riset.html available of 17 November 2015.
[4] Pradipta, Stefanus Enggar. Analisa Algoritma Leach Pada Jaringan Sensor Nirkabel. Bandung:
Institut Teknologi Telkom, 2008.
[5] Qiqian Huang, S. Selvakennedy Schholof Information Technologies, Madsen Bldg.F09. A Range
Free Localization Algorithm for Wireless Sensor Network. Proc. of 63rd IEEE Vehicular Technology
Conference, Melbourne, Australia, 7-10 May 2006.
[6] Fauzi, Feblia Ulfah. Analisis Penggunaan T-MAC Untuk Lapis Protokol MAC Pada Jaringan Sensor
Nirkabel. Bandung: Institut Teknologi Telkom. 2010.
[7] L Hu, D Evans. Localization for mobile sensor networks. in Proc. IEEE Mobicom 2004, Sept. 2004:
45โ€“57.
[8] Zhao, L, Wen, X, Li, D. Amorphous Localization Algorithm Based on BP Artificial Neural Network,
2015.
[9] Kristalina, P. Fundamental Teknik Lokalisasi pada Jaringan Sensor Nirkabel (Fundamentals of
Localization Techniques on Wireless Sensor Networks). 2013.
[10] MAP Putra, D Perdana, RM Negara. Performance Analysis of Data Traffic Offload Scheme on Long-
Term Evolution and IEEE 802.11 ah. TELKOMNIKA (Telecommunication Computing Electronics and
Control. 2017; 15(4); 1659-1665.
[11] D Perdana, R Munadi, RC Manurung. Performance Evaluation of Gauss-Markov Mobility Model in
Hybrid LTE-VANET Networks. TELKOMNIKA (Telecommunication Computing Electronics and
Control. 2017, 2017; 15(2): 606-621.

More Related Content

What's hot

Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transformIJCNCJournal
ย 
F43063841
F43063841F43063841
F43063841IJERA Editor
ย 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparisoninventionjournals
ย 
Dq24746750
Dq24746750Dq24746750
Dq24746750IJERA Editor
ย 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
ย 
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...IJECEIAES
ย 
Simulation of Wireless Sensor Networks
Simulation of Wireless Sensor NetworksSimulation of Wireless Sensor Networks
Simulation of Wireless Sensor NetworksDaniel Zuniga
ย 
Blind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systemsBlind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systemstrungquang0207
ย 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339IJERA Editor
ย 
Automatic cluster formation and assigning address for wireless sensor net
Automatic cluster formation and assigning address for wireless sensor netAutomatic cluster formation and assigning address for wireless sensor net
Automatic cluster formation and assigning address for wireless sensor netIAEME Publication
ย 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locationsambitlick
ย 
TDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor NetworkTDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor Networkneha agarwal
ย 
Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...IJECEIAES
ย 
Performance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiuserPerformance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiusereSAT Publishing House
ย 
Iisrt dali martin (ec)
Iisrt dali martin (ec)Iisrt dali martin (ec)
Iisrt dali martin (ec)IISRT
ย 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...IOSR Journals
ย 

What's hot (18)

Masters Report 1
Masters Report 1Masters Report 1
Masters Report 1
ย 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transform
ย 
F43063841
F43063841F43063841
F43063841
ย 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparison
ย 
Dq24746750
Dq24746750Dq24746750
Dq24746750
ย 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
ย 
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...
A Summative Comparison of Blind Channel Estimation Techniques for Orthogonal ...
ย 
Simulation of Wireless Sensor Networks
Simulation of Wireless Sensor NetworksSimulation of Wireless Sensor Networks
Simulation of Wireless Sensor Networks
ย 
Blind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systemsBlind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systems
ย 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
ย 
Automatic cluster formation and assigning address for wireless sensor net
Automatic cluster formation and assigning address for wireless sensor netAutomatic cluster formation and assigning address for wireless sensor net
Automatic cluster formation and assigning address for wireless sensor net
ย 
B0510916
B0510916B0510916
B0510916
ย 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
ย 
TDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor NetworkTDMA Schleduling in Wireless Sensor Network
TDMA Schleduling in Wireless Sensor Network
ย 
Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...Investigations on real time RSSI based outdoor target tracking using kalman f...
Investigations on real time RSSI based outdoor target tracking using kalman f...
ย 
Performance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiuserPerformance comparison of blind adaptive multiuser
Performance comparison of blind adaptive multiuser
ย 
Iisrt dali martin (ec)
Iisrt dali martin (ec)Iisrt dali martin (ec)
Iisrt dali martin (ec)
ย 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
ย 

Similar to Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks

A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
ย 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
ย 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
ย 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5Shivlal Mewada
ย 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
ย 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
ย 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachIJMER
ย 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNASijassn
ย 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
ย 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
ย 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM ijassn
ย 
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...ijsrd.com
ย 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
ย 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
ย 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocoliosrjce
ย 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theoryidescitation
ย 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
ย 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
ย 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
ย 

Similar to Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks (20)

A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
ย 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
ย 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
ย 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
ย 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
ย 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
ย 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi Approach
ย 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORSโ€™ ANTENNAS
ย 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
ย 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
ย 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
ย 
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
ย 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
ย 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
ย 
E017332733
E017332733E017332733
E017332733
ย 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocol
ย 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
ย 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
ย 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
ย 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
ย 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
ย 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxnull - The Open Security Community
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
ย 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ย 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
ย 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
ย 

Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks

  • 1. TELKOMNIKA, Vol.16, No.3, June 2018, pp. 1150~1157 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v16i3.8560 ๏ฎ 1150 Received September 10, 2017; Revised January 9, 2018; Accepted April 2, 2018 Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks Doan Perdana, Adi Nugroho, Favian Dewanta School of Electrical Engineering, Telkom University, Bandung, Indonesia *Corresponding author, e-mail: doanperdana@telkomuniversity.ac.id, adinugrohoittelkom@gmail.com, favian@ telkomuniversity.ac.id Abstract In the field of high-risk observation,the nodes in Wireless Sensor Network (WSN) are distributed randomly.The result from sensing becomes meaningless ifit is not known from where the originating node is. Therefore, a sensor node positioning scheme, known as the localization scheme, is required. The localization scheme consists of distance estimation and position computing. Thus, this research used connectivity as distance estimation within range free algorithm DV-Hop and Amorphous,and then trilateral algorithm for computing the position. Besides that, distance estimation using the connectivity between nodes is not needed for the additional hardware ranging as required by a range-based localization scheme.In this research compared the localization algorithm based on range free localization, which are DV-Hop algorithm and Amorphous algorithm. The simulation result shows that the amorphous algorithm have achieved 13.60% and 24.538% lower than dv-hop algorithm for each parameter error localizationand energy consumption. On node density variations, dv-hop algorithm gained a localization error that is 26.95% lower than amorphous algorithm, but for energy consumption parameter, amorphous gained 14.227% lower than dv-hop algorithm. In the communication range variation scenario, dv-hop algorithm gained a localization error that is50.282% lower than amorphous. However, for energy consumption parameter, amorphous algorithm gained 12.35%. lower than dv-hop algorithm. Keywords:WSN, DV-HOP algorithm,amorphous algorithm,localization error,trilateral,energy consumption Copyright ยฉ 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction In this research, we discussed about the Wireless Sensor Network Localization, with focus on performance analysis using DV-Hop and Amorphous algorithm. The DV-hop algorithm [1] is the basic scheme and consists of three stages. First, the use of directional classic distance by changing the protocol so all distances of nodes in the network to the anchor can be obtained, and in this case the distance will be represented within a hop. Each node in the table consists of {Xi, Yi, hi} and changes the update table in accordance their neighbor nodes. The second stage, each anchor node determines the distance to the other anchor node. Meanwhile, the amorphous algorithm is generally like DV-Hop algorithm that is used to calculate the distance between two nodes but the difference is that amorphous algorithm calculates the hop distances between the anchor nodes and unknown nodes. For computing the position, the author used Trilateral algorithm to determine the position of the sensor node. The main reason for using range free method in the application is because the range free method requires little energy consumption, is low cost, and is suitable to be applied to a wide area as well as in the field of high-risk observation. The nodes are static and the effect of range communication and the number of anchor nodes, the influence of the number of unknown nodes and a range communication to the parameters of performance such as error position, energy consumption, and time position were tested. The hypothesis was that the parameters of DV-hop algorithm performance is better than Amorphous algorithm.
  • 2. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana) 1151 2. Related Works There are numbers of sensor nodes deployed an observation area. Some have position information (because it has a GPS or placed manually) while other nodesโ€™ positions have to be determined by using localization techniques. The position that is determined is relatively between nodes or other objects that are involved around it. Today, many localization schemes depend on a few anchor deployed in sensor networks. Anchor is a sensor node that knows its own position (via GPS or other manual configuration) and act as a reference for other nodes whose position is unknown because their position can spread. Here, the authors want to provide an additional reference. There are some algorithms that can estimate range free distance. Those algorithms are dv-hop algorithm and amorphous algorithm. A trilateral algorithm is used to estimate its position. However, do not forget the critical issue in WSN which is the lifetime of the sensor that is limited by power [2]. Therefore, the author added performance parameters of energy consumption that is used to determine the better performing algorithm from dv hop and amorphous which can then be used as a reference for further research, especially into consideration the algorithm that want to be improved [3-4]. 3. Methodology In this chapter, the analysis of simulation results using simulator NS2.34 will be discussed. The analysis is aimed to find out the performance of the DV-Hop algorithm and Amorphous algorithm. In this research, there were several scenarios: a. Variation of anchor node scheme. The number of anchor nodes will be varied 5% to 25% with an increment of 5% for all nodes. b. Variation of node density scheme. Number of nodes will be varied from 100 nodes to 500 nodes with an increment of 100 nodes. c. Variation of range communication scheme. A value of range communication will be varied from 200 meters to 400 meters with an increment of 50 meters. 3.1. Amorphous algorithm In amorphous algorithm, to calculate hop distance successfully, the anchor nodes have to find out three distances with applying maximum likelihood estimation to determine its position or go through three sided measurements [5-6]: a. Calculated the minimum hop from the Unknown Node to the Beacon Node. With the flooding method, messages from beacon nodes can be sent to the unknown nodes. (1) Based on [5-6], eqn. (1) describes the calculation of the minimum hop from the node ๐‘– to ๐‘˜. (๐‘–,) represents the minimum hop between the unknown node ๐‘– and beacon node ๐‘˜; meanwhile โ„Ž(๐‘—,๐‘˜) describes the hop of unknown node ๐‘— to the beacon node ๐‘˜; โ„Ž(๐‘–,๐‘˜) represents the calculating hop value of unknown node ๐‘– to the beacon node ๐‘˜; moreover nbrs(๐‘–) describes the number neighbor nodes around the unknown node ๐‘–. b. Calculated the distance between the Unknown Node to the Beacon Node. (2) where ๐‘Ÿ represents the wireless range of the node and ๐‘› local describes the network average connectivity. c. Use the trilateral algorithm to estimate the position. Trilateral algorithm calculates node position using the line intersection of three anchor circles.
  • 3. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157 1152 Figure 1. Model of Estimate Position Using Trilateral Algorithm [7] To estimate a position using trilateration, unknown nodes have to know the position and distance of the three anchor nodes. The distance can be calculated using the following formula: (3) Where (x, y) is the position of the nodes that will be counted, (xi, yi) is reference node position to the i node, and (di) is the distance from the anchor node to the unknown node. From the formula, there are three quadratic equations with two unknown, which in theory can be resolved into an equation. equation 4 can be linearized by subtracting the last equation from the first equation n-1, and can be formulated in linear multiplication system, which is AX=b, where: (4) x = ( ) 3.2. DV-Hop Algorithm DV-hop algorithm can estimate the average distance for every hop, which is then used to correct the entire network [8]. The average hop-size for each anchor node can be calculated with the following formula: (5) Where m represents as anchor node; hij represent as the number of hop between i and j. (xi, yi) (xj, yj) are the coordinates of the anchor i and anchor j. Then, each anchor node notify the value of hop size in the network. When an unknown node receives the information of hop size, the estimated distance between unknown nodes and anchor nodes can be calculated as follows: (6) Figure 2 shows that the position of unknown nodes can be identified by the computational position algorithm, which is one is trilateral algorithm. The following is a representation of the DV-hop algorithm.
  • 4. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana) 1153 Figure 2 Basic of DV-Hop Method Using Three Node Reference [1] Table 1. Parameter of Simulation Channel Type WirelessChannel Propagation Type freespace Interface Type WirelessPhy Queue Type Queue/Droptail/PriQueue Link Layer Type LL Antenna OmniAntena Queue Length 50 Netw orkarea 1000mx1000m Number of nodes 300 Communication range (m) 300 Number of Anchor Nodes 60 Simulation time 3 second TransmitPow er 0.0744 w att Receive Pow er 0.0648 w att Idle Pow er 0.0000052 w att Initial Energy 13770 joules 4. Result and Discussion 4.1. Analyze the effect of anchor node variation towards localization error and total energy consumption As already described in previous chapters, the localization error is a comparison between error position nodes (meter) with communication ranges (meters). The error position of a node is position error of the estimated node to the real position of node in meters. The total energy consumption is the total energy consumption of the entire node in seconds [9-10]. Table 2 shows that the localization error due to the effect of anchor variation mostly gets lower for Amorphous Algorithm except for the ratio of beacons 15%, it got higher than the previous data. However, the results for location error in DVHOP, the values gets fluctuates. Table 3 shows that the total energy consumption due to the effect of anchor node variation for both algorithm gets higher in each number of nodes value with increment 100 nodes. Table 2. The Effect of Anchor Node Variation Towards Location Error Ratio of Beacons AMORPHOUS (Joules) DVHOP (Joules) 5% 2,468 2,836 10% 1,82 3,274 15% 1,943 1,393 20% 1,436 1,34 25% 1,307 1,544 Table 3. The Effect of Anchor Node Variation Towards Total Energy Consumption Number of nodes AMORPHOUS (Joules) DVHOP (Joules) 100 3,608 13,334 200 24,346 37,292 300 53,761 59,182 400 57,46 60,847 500 59,012 61,98
  • 5. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157 1154 (a) Localization Error (b) Energy Consumption Figure 3. The Effect of Anchor Node Variation towards Localization Error and Energy Consumption Figure 3 shows that the number of anchor nodes with an increment of 5%, where the number of nodes is 300 and the range of communication is 300m, the localization error got lower but the energy consumption is gets higher. The localization error got lower because the more anchor nodes there are in network, the larger the coverage of network, resulting more hop counts to go through. As more hop counts go through, the localization error gets lower. If the localization error gets lower, it means a better position accuracy of nodes. The energy consumption got higher because there were more anchor nodes in network, resulting in more computation position that needs energy. Besides that, anchor nodes consume more energy than unknown nodes because anchors have GPS. For the localization error, the Amorphous algorithm have 13.60% less errors than DV- Hop algorithm because the DV-Hop algorithm is based on hop count when estimating position. Less anchor nodes will make the coverage in a network smaller, causing hop counts to get lower. Less hop counts cause the accuracy to worsen. However, the value of the two algorithms equally experienced fluctuations because of other factors. Those factors are node density, random signaling, and deployment of node. For Energy Consumption, the Amorphous algorithm use 24.538% less energy than DV-Hop algorithm because the DV-Hop algorithm is always updating its table in accordance to their neighbor. 4.2. Analyze the effect of node density variation towards Localization error and total energy consumption Table 4 shows that the Localization Error due to the effect of node density variation for both algorithm gets higher in each proportion of beacons value with increment 5%. Table 5 shows that the total energy consumption due to the effect of node density variation for both algorithm gets fluctuate in each number of nodes value with increment 100 nodes. Table 2. The Effect of Node Density Variation Towards Localization Error Proportion of beacons AMORPHOUS (Joules) DVHOP (Joules) 5% 21,645 53,368 10% 36,849 56,803 15% 49,715 58,393 20% 53,761 59,182 25% 55,028 59,814 Table 5. The Effect of Node Density Variation to Energy Consumption Number of nodes AMORPHOUS (Joules) DVHOP (Joules) 100 2,427 1,513 200 1,399 1,026 300 1,436 1,34 400 2,171 1,614 500 1,165 0,788
  • 6. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana) 1155 (a) Localization Error (b) Energy Consumption Figure 4. The Effect of Node Density Variation towards Localization Error and Energy Consumption Figure 4 shows that as the number of nodes increment by100, where the composition of anchor nodes is 20% of nodes and the range of communication is 300m, the localization error is gets lower but the energy consumption gets higher. The localization error became lower because there were more unknown nodes in network which results in more hop count and neighbor nodes. More hop counts and neighbor nodes cause the localization error to get lower. If the localization error is low it means better accuracy of node positions. The energy consumption gets higher because there were more nodes in network which means more energy is required to estimate the position of nodes. For the localization error, the DV-Hop algorithm has 26.95% less errors than the amorphous algorithm because the DV-Hop algorithm is based on hop count when estimating positions. More nodes in the network will create a larger hop count causing the computation to be more accurate. However, the value of the two algorithms equally experienced fluctuations because of other factors including node density, random signaling, and deployment of node. For the Energy Consumption, the Amorphous algorithm uses 14.227% less energy than the DV-Hop algorithm because the DV-Hop algorithm is always updating its table in accordance to their neighbor and the computation of the DV-Hop algorithm is more complex than the Amorphous algorithm, which uses more energy. 4.3. Analyze the effect of range communication variation towards localization error and total energy consumption Table 6 shows that the localization error due to the effect of range communication variation mostly gets lower for Amorphous except for the wireless range 350, it gets higher than the previous data. However, the results for location error in DVHOP, the values gets fluctuate. Table 7 shows that the total energy consumption due to the effect of range communication variations for both algorithm gets higher in each number of wireless range value with increment 50 nodes. Table 6. Analysis The Effect of Range Communication Variation to Localization Error Wireless range AMORPHOUS (Joules) DVHOP (Joules) 200 5,578 1,421 250 1,515 1,312 300 1,436 1,34 350 1,713 0,694 400 1,265 0,954 Table 7. Analysis The Effect of Range Communication Variation towards Energy Consumption Wireless range AMORPHOUS (Joules) DVHOP (Joules) 200 38,723 52,151 250 47,956 56,985 300 53,761 59,182 350 56,473 60,638 400 57,485 61,301
  • 7. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1150โ€“1157 1156 (a) Localization Error (b) Energy Consumption Figure 5. The Effect of Range Communication Variation towards Localization Error and Energy Consumption Figure 5 shows that as the communication range increment by 50m, where the number of nodes is 300 and the composition of anchor nodes is 20% of all nodes, the localization error is decreases but the energy consumption increases. The localization error decreases as the there is an increase in node communication range, resulting a larger network coverage and more hop count to go through. More hop count going through means a lower localization error. If the localization error low, it means a better accuracy of node position. The energy consumption also increases because the increase in node communication range uses more power. For the localization error, the DV-Hop algorithm has 50.282% less errors than the amorphous algorithm because the DV-Hop algorithm is based on hop counts when estimating positions. A higher node communication range will increase hop count, increasing the accuracy of the computing. However, the value of the two algorithms equally experienced fluctuations because of other factors such as node density, random signaling, and deployment of node. For the Energy Consumption, the Amorphous algorithm uses 12.35% less energy than the DV- Hop algorithm because the DV-Hop algorithm is always updating its table in accordance to their neighbors and the computation of the DV-Hop algorithm is also more complex than the Amorphous algorithm, which requires more energy. 5. Conclusion This research which was conducted to analyze the performance of DV-Hop algorithm and Amorphous algorithm towards localization schemes with error localization parameters and energy consumption resulted the effect of increasing the number of anchor nodes: the number of nodes and the number of communication range for the Amorphous algorithm and the DV-Hop algorithm show that value of localization error gets lower. If the localization error is low, it means a better accuracy of node positions. However, value of energy consumption gets higher. In the localization error parameter: For the scheme of increasing the number of anchor nodes, the Amorphous algorithm have 13.60% less errors than the DV-Hop. When increasing the number of nodes, the DV-Hop algorithm has 26.95% less errors than the amorphous algorithm. For the increase of communication range scheme, the DV-Hop algorithm has 50.282% less errors than the amorphous algorithm because of the DV-Hop algorithm itself. In the energy consumption parameter: For the scheme of increasing the number of anchor nodes: the Amorphous algorithm uses 24.538% less energy than the DV-Hop algorithm. When increasing of nodes, the Amorphous algorithm uses 14.227% less energy than the DV-Hop algorithm. For the increase of communication range scheme, the Amorphous algorithm uses 12.35% less energy than the DV- Hop algorithm.
  • 8. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Performance Evaluation of DV-HOP and Amorphous Algorithms based on... (Doan Perdana) 1157 References [1] Nian-qiang,LI.A Range-Free Localization Scheme in Wireless Sensor Networks. IEEE International Symposium on Knowledge Acquisition and Modeling Workshop. 2008: 525โ€“528. http://doi.org/10.1109/KAMW.2008.4810540. [2] F Wang, L Shi, F Ren. Self-localization systems and algorithms for wireless sensor networks. Journal of Software. 2005; 16(5): 857-868. [3] http://prima.lecturer.pens.ac.id/riset.html available of 17 November 2015. [4] Pradipta, Stefanus Enggar. Analisa Algoritma Leach Pada Jaringan Sensor Nirkabel. Bandung: Institut Teknologi Telkom, 2008. [5] Qiqian Huang, S. Selvakennedy Schholof Information Technologies, Madsen Bldg.F09. A Range Free Localization Algorithm for Wireless Sensor Network. Proc. of 63rd IEEE Vehicular Technology Conference, Melbourne, Australia, 7-10 May 2006. [6] Fauzi, Feblia Ulfah. Analisis Penggunaan T-MAC Untuk Lapis Protokol MAC Pada Jaringan Sensor Nirkabel. Bandung: Institut Teknologi Telkom. 2010. [7] L Hu, D Evans. Localization for mobile sensor networks. in Proc. IEEE Mobicom 2004, Sept. 2004: 45โ€“57. [8] Zhao, L, Wen, X, Li, D. Amorphous Localization Algorithm Based on BP Artificial Neural Network, 2015. [9] Kristalina, P. Fundamental Teknik Lokalisasi pada Jaringan Sensor Nirkabel (Fundamentals of Localization Techniques on Wireless Sensor Networks). 2013. [10] MAP Putra, D Perdana, RM Negara. Performance Analysis of Data Traffic Offload Scheme on Long- Term Evolution and IEEE 802.11 ah. TELKOMNIKA (Telecommunication Computing Electronics and Control. 2017; 15(4); 1659-1665. [11] D Perdana, R Munadi, RC Manurung. Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Networks. TELKOMNIKA (Telecommunication Computing Electronics and Control. 2017, 2017; 15(2): 606-621.