SlideShare a Scribd company logo
1 of 8
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A NOVEL APPROACH TO DETECT THE MOVEMENT OF
TARGET IN WIRELESS SENSOR NETWORKS
Anitha.S1
and Prabaharan.P2
1
Department of CSE, Vivekanandha College of Engineering for Women
2
Department of CSE, Vivekanandha College of Engineering for Women
Abstract— The ultimate aim of a wireless sensor network is to provide accurate and reliable
information regarding the environment in which the sensors are deployed. Among the various
applications of a sensor network, target tracking is the one of the key application of WSNs. In
existing system To design a Face Track for detecting the movement of a target in polygon. Develop a
brink detection algorithm used to reconstruct another conceptual polygon. Optimal node selection
algorithm to select which sensor of spatial region to track data. All wireless sensors are activated and
idle listening is a major source of energy waste. Once an active sensor runs out of energy, that
sensors are not present in the network. So communication is not fully completed. We enhance the
proposed algorithm Probability-Based Prediction and Sleep Scheduling (PPSS) to overcome this
problem also it improve the power efficiency and increase the network life time.
Keywords- Wireless sensor networks, mobile target, edge detection, face tracking, multiple tracking
I. INTRODUCTION
Wireless sensor networks (WSN) is used to bring about the interaction between humans and the
environment. Wireless sensor network was originally developed for application in battlefield. A
wireless sensor networks consist of spatially distributes sensor nodes. Each distributed sensor node is
able to perform some processing and sensing task independently. The sensor nodes are able to
communicate with each other to forward the sensed information to a station. This target tracking
method for wireless sensor networks make use of a centralized approach. As the number of sensors
rise in the network, more messages are passed on towards the sink and will consume additional
bandwidth. Thus this approach is not fault tolerant as there is single point of failure and lacks
scalability. Moreover in traditional target tracking methods, sensing task is usually performed by one
node at a time resulting in less accuracy and heavy computation burden on that node. In WSNs each
node has very limited power; consequently traditional tracking methods based on complex signal
processing algorithms are not useful.
Some nodes like black nodes are used for detecting and sending messages to the node about
whether the node is in wake up state are in motion. To find path of some moving object in an area of
network, nodes plays a important role in it. Node that has very close path will help to participate in
tracking and provide continuous coverage. This helps in improve energy efficient and provide
accuracy in tracking objects.
Various type of target tracking objects are 1) finding the location, distance and measurements of
the target from the node; 2) Nodes must be in groups example clustering for tracking the target
mobile;3) the leading sensor must report about the target movement to the central sink, where sink is
a resource-rich node for getting information from leading node.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 232
WSNs has some challenging problems like
1) To get a group of nodes that provide accurate measurement of a target that is in motion is very
difficult.
2)Getting accurate target location is very difficult.
3)Maintaining the operation of node in time is difficult.4)node failure or loss of target tracking is
often occurs.
In a target tracking application, the sensor nodes which can sense the target at a particular time
are kept in active mode while the remaining nodes are to be retained in inactive mode so as to
conserve energy until the target approaches them. To continuously monitor mobile target, a group of
sensors must be turned in active mode just before target reaches to them.
Target tracking has major duty to maintaining the balance networks resources like energy,
bandwidth, and over heads. In wireless sensor networks target tracking classified into many types.
There are Tree-Based tracking, Cluster-Based Tracking, Prediction-based Tracking, Mob cost
Message-Based Tracking and Hybrid methods.
Figure: 1 Types of target tracking
We present a prediction based target prediction and sleep scheduling protocol (PPSS) to improve
the efficiency and enhance the energy efficiency of proactive wake up with limited loss on the
tracking performance. PPSS enhances energy efficiency by reducing the number of proactively
awakened nodes and controlling their active time in an integrated manner.
Related neighborhood graph (RNG) is used width p points for dividing the plane into spatial non
overlapping region which is called as face. Each face in the network helps in finding the points that
are connected. Each neighboring face shares edge which is common to them.
In WSNs face can be of diffence sizes and geometrical polygonal-shape form. For finding inter
node edge of polygons a complete WSNs is generated by using planarization algorithm. By
introducing the edge detection algorithm the polygon location is identified and wakes up the node
before the target moves, which helps in tracking the target in time. That target is about to cross its
location it is called as brink and each node are the couple node. To identify the brink in the network
the target must move towards the brink by marking rectangular or square shape around the move.
Characteristic requirements
The following are the characteristic requirements that are shared among the wireless sensor network
application
1. Type of service used by a conventional communication network is unmistakable.
2. Quality of Service traditionally bounded with multimedia application where delay and bandwidth
requirements are given more importance.
3. Fault Tolerance in wireless sensor network is able to tolerate the faults that are raised due to
damage in the or communication between two wireless nodes.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 233
4. Lifetime-the sensor node have to rely on limit energy because of the use of batteries.
5. Scalability employed architectures and protocols must be able to scale these numbers.
6. Wide range of Densities the number of unit per area. This density can vary considerably. Different
application will have diverse node densities.
II. RELATED WORKS
One of the major goal of the wireless sensor networks is to detect the object and monitor the
change in region.WSNs originally developed for Military purpose in battle surveillance. But now a
day’s used for health care, environmental industries. This RSSI algorithm very useful especially in
the case exploited for localization, distance estimation and link assessment. Variations of the signals
strength in the region can reveal the movements of persons.Instusion detection system minimize the
transmitting information to sink and instead of transmitting information it gives only alert
notifications about the unauthorized movement in the respective region. This method used to detect
the intrusion of a moving person inside the region and correctly keep tracking of the path. It is
possible to estimate the velocity of the movement by knowing the transmission rate of the system
and the sensitivity area of a radio link.
Once Target is detected creates an awake region and based on the prediction results assigns Sleep
scheduling to individual sensors at synchronized time and the graph is plotted for Energy efficiency
in comparison with the Existing concept along with Throughput, Packet Delivery ratio. The wake-up
scheduling of sensors has significant impact on the lifetime and coverage of a WSN. In this paper, a
duty-cycled sensor network, proactive wake up and sleep scheduling can create a local active
environment to provide guarantee for the tracking performance.
In the wireless sensor network target tracking is that individual homogeneous sensors only can
able to target the position and velocity in the Cartesian coordinates. This extended kalman filtering is
used to detect the nonlinearity. But some cases its leads to unsatisfactory or unstable tracking
performance. To overcome this problem introduced new algorithm called maximum likelihood
estimator.MLE especially for prelocalization also overcome the nonlinearity before applying the
extended kalman filter.
Most existing work on sensor networks widely concentrates on finding efficient way to send a
message or a information to the base station, and much work has been done on collecting local data
and generating the data report.
III.DESIGN OF FACE TRACK
Polygon is used for tracking target when it is in moving. The active polygon for polygon and
active nodes for nodes is used for detecting the target of some nodes in the WSNs. The active node
always follows
1) its own information
2) information about adjacent neighbors
3) Information about active neighboring nodes
4) Information about neighbors through direct communication.
The target can move anywhere of the adjacent polygon. The adjustment polygon is called as
forward polygon (Pf).correspond to adjust cent neighbor the target is been detected and are called
immediate neighbors. Node that are corresponds to the number of polygon is depend on the number
of edges or adjacent neighbor. The polygon size can be determined by the number of edges
surrounding.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 234
IV.BRINK DETECTION ALGORITHM
An edge detection algorithm used to reconstruct another polygon called critical region by
determining an edge which is called a brink to the active polygon. Since the brink generated on the
boundary of active polygon which crates polygon region problem that in turns into a critical region
problem. The main objective is to find the brink when the target is moving to a brink between couple
node (CN).This CNs will help in conforming that the target is leaving the active polygon and moving
to forward polygon. This forward polygon allowed for tracking the target in time.The edges of active
polygon are mapped by brinks. The target moves towards brink, the target is aimed on a spot which
is called as follow spots. Since the target moves towards a brink of active polygon, the follow spot is
divided into three phase detection spots.
1) Square detection phase:
The target is preliminarily detected by two nodes from active polygon but don’t guarantee
that the target cross the brink.
2) Rectangular detection phase:
The target crosses the brink between the nodes.
3) Crossing phase:
The target is going to cross the brink between the nodes.
Figure 2: Brink detection process
Each brink in forward polygon is identified during when the target crosses network by three
phase detection. If the target is in square phase are touch as the rectangular phase a joined-message is
sent to forward polygon. Some of the different parameter of the brink are brink length,loal mean
length and local standard deviation. This brink is easily identified when CNs is allowed.
=	1/ ∫
/
/ s(CN,j)dx∫
/
/
,
ρ’
=1/A∫
/
/ s(CN,j)dx∫
/
/
,
ρ’’
=1/A∫
/
/ s(CN,j)dx∫
/
/
.
P,p1
and p11
be the detection probability for three-phases respectively. This values of P,p1
and p11
are
relay on the length of the brink. To find the target, node should have to two condition:1) The node
must be in an active polygon2) The node must be in active state when target pass through brink.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 235
Figure3: Polygon-Based Tracking Framework
V.CONCLUSION
The main challenge in wireless sensor network is to determine how to perceive the target in an
efficient manner. The proposed algorithm archives a WSNs system for identifying the movement of
a target using polygon tracking. The proposed method also track framework which estimate target
position area. It archives high accuracy while tracking. It also reduces energy cost of a WSNs.The
target is detected inside a polygon by means of brink detection. It is strong to sensor node failure and
error in target location.
REFERANCE
[1] O. Kaltiokallio, M. Bocca, and L.M. Eriksson, “Distributed RSSI Processing for Intrusion Detection in Indoor
Environments,” Proc. Ninth ACM/IEEE Int’l Conf. Information Processing in Sensor Networks (IPSN), pp. 404-
405, 2010.
[2] Y. Wang, M. Vuran, and S. Goddard, “Analysis of Event Detectio Delay in Wireless Sensor Networks,” Proc. IEEE
INFOCOM,pp. 1296-1304, 2011.
[3] Z. Zhong, T. Zhu, D. Wang, and T. He, “Tracking with UnreliableNode Sequence,” Proc. IEEE INFOCOM, pp.
1215-1223, 2009.
[4] W. Zhang and G. Cao, “Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks,” IEEE
Trans. Wireless Comm., vol. 3, no. 5, Sept. 2004.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 236
[5] Z. Wang, W. Lou, Z. Wang, J. Ma, and H. Chen, “A Novel Mobility Management Scheme for Target Tracking in
Cluster-Based Sensor Networks,” Proc. Sixth IEEE Int’l Conf. Distributed Computing in Sensor Systems (DCOSS),
pp. 172-186, 2010.
[6] L.M. Kaplan, “Global Node Selection for Localization in a Distributed Sensor Network,” IEEE Trans. Aerospace and
Electronic Systems, vol. 42, no. 1, pp. 113-135, Jan. 2006.
[7] T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. Stankovic, and T. Abdelzaher, “Achieving
Real-Time Target Tracking Using Wireless Sensor Networks,” Proc. 12th IEEE Real-Time and Embedded
Technology and Applications Symp. (RTAS), pp. 37-48, 2006.
[8] M. Waelchli, M. Scheidegger, and T. Braun, “Intensity-Based Event Localization in Wireless Sensor Networks,”
Proc. Conf. Int’l Federation for Information Processing Wireless On-Demand Network Systems and Services (IFIP
WONS), pp. 41-49, 2006.
[9] Y. Zhou, J. Li, and D. Wang, “Posterior Cramer-Rao Lower Bounds for Target Tracking in Sensor Networks with
Quantized Range-Only Measurements,” IEEE Signal Processing Letters, vol. 17, no. 2, pp. 377-388, Feb. 2010.
[10] X. Wang, M. Fu, and H. Zhang, “Target Tracking in Wireless Sensor Networks Based on the Combination of KF
and MLE Using Distance Measurements,” IEEE Trans. Mobile Computing, vol. 11, no. 4, pp. 567-576, Apr. 2012.
[11] M. Chu, H. Haussecker, and F. Zhao, “Scalable Information Driven Sensor Querying and Routing for Ad Hoc
Heterogeneous Sensor Networks,” J. High Performance Computing Applications, vol. 16, no. 3, pp. 293-313, 2002.
[12] B. Leong, S. Mitra, and B. Liskov, “Path Vector Face Routing: Geographic Routing with Local Face Information,”
Proc. IEEE Int’l Conf. Network Protocols (ICNP), pp. 47-158, 2005.
.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS

More Related Content

What's hot

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingmarwaeng
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
 
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...csandit
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
 

What's hot (18)

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
 
50120140503002
5012014050300250120140503002
50120140503002
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...
 
O026084087
O026084087O026084087
O026084087
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
 

Viewers also liked

Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
Refining Underwater Target Localization and Tracking Estimates
Refining Underwater Target Localization and Tracking EstimatesRefining Underwater Target Localization and Tracking Estimates
Refining Underwater Target Localization and Tracking EstimatesCSCJournals
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLogicMindtech Nologies
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksSachin MS
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsnSajida Imran
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...chennaijp
 
Use of ICT in Education in Pakistan
Use of ICT in Education in PakistanUse of ICT in Education in Pakistan
Use of ICT in Education in PakistanAbdul Ghafoor Mangi
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkIJASCSE
 
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...Nasia Fatsi
 
Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...LogicMindtech Nologies
 
Oracle Inventory – Inventory Controls
Oracle Inventory – Inventory ControlsOracle Inventory – Inventory Controls
Oracle Inventory – Inventory ControlsBoopathy CS
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Ahmad Muzaffar Baharudin
 

Viewers also liked (19)

Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
certificate-Hypermesh
certificate-Hypermeshcertificate-Hypermesh
certificate-Hypermesh
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Refining Underwater Target Localization and Tracking Estimates
Refining Underwater Target Localization and Tracking EstimatesRefining Underwater Target Localization and Tracking Estimates
Refining Underwater Target Localization and Tracking Estimates
 
Targettracking
TargettrackingTargettracking
Targettracking
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networks
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsn
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
Use of ICT in Education in Pakistan
Use of ICT in Education in PakistanUse of ICT in Education in Pakistan
Use of ICT in Education in Pakistan
 
Peizolelectric Sensors Explained
Peizolelectric Sensors ExplainedPeizolelectric Sensors Explained
Peizolelectric Sensors Explained
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...
 
Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...Coordinated and adaptive information collecting in target tracking wireless s...
Coordinated and adaptive information collecting in target tracking wireless s...
 
Oracle Inventory – Inventory Controls
Oracle Inventory – Inventory ControlsOracle Inventory – Inventory Controls
Oracle Inventory – Inventory Controls
 
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
 

Similar to A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS

Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...eSAT Journals
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation ofeSAT Publishing House
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNjake henry
 

Similar to A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS (20)

Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation of
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
IJET-V2I6P1
IJET-V2I6P1IJET-V2I6P1
IJET-V2I6P1
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 
J017345864
J017345864J017345864
J017345864
 
G017644454
G017644454G017644454
G017644454
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-ISSN: 2349-9745 p-ISSN: 2393-8161 A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS Anitha.S1 and Prabaharan.P2 1 Department of CSE, Vivekanandha College of Engineering for Women 2 Department of CSE, Vivekanandha College of Engineering for Women Abstract— The ultimate aim of a wireless sensor network is to provide accurate and reliable information regarding the environment in which the sensors are deployed. Among the various applications of a sensor network, target tracking is the one of the key application of WSNs. In existing system To design a Face Track for detecting the movement of a target in polygon. Develop a brink detection algorithm used to reconstruct another conceptual polygon. Optimal node selection algorithm to select which sensor of spatial region to track data. All wireless sensors are activated and idle listening is a major source of energy waste. Once an active sensor runs out of energy, that sensors are not present in the network. So communication is not fully completed. We enhance the proposed algorithm Probability-Based Prediction and Sleep Scheduling (PPSS) to overcome this problem also it improve the power efficiency and increase the network life time. Keywords- Wireless sensor networks, mobile target, edge detection, face tracking, multiple tracking I. INTRODUCTION Wireless sensor networks (WSN) is used to bring about the interaction between humans and the environment. Wireless sensor network was originally developed for application in battlefield. A wireless sensor networks consist of spatially distributes sensor nodes. Each distributed sensor node is able to perform some processing and sensing task independently. The sensor nodes are able to communicate with each other to forward the sensed information to a station. This target tracking method for wireless sensor networks make use of a centralized approach. As the number of sensors rise in the network, more messages are passed on towards the sink and will consume additional bandwidth. Thus this approach is not fault tolerant as there is single point of failure and lacks scalability. Moreover in traditional target tracking methods, sensing task is usually performed by one node at a time resulting in less accuracy and heavy computation burden on that node. In WSNs each node has very limited power; consequently traditional tracking methods based on complex signal processing algorithms are not useful. Some nodes like black nodes are used for detecting and sending messages to the node about whether the node is in wake up state are in motion. To find path of some moving object in an area of network, nodes plays a important role in it. Node that has very close path will help to participate in tracking and provide continuous coverage. This helps in improve energy efficient and provide accuracy in tracking objects. Various type of target tracking objects are 1) finding the location, distance and measurements of the target from the node; 2) Nodes must be in groups example clustering for tracking the target mobile;3) the leading sensor must report about the target movement to the central sink, where sink is a resource-rich node for getting information from leading node.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 232 WSNs has some challenging problems like 1) To get a group of nodes that provide accurate measurement of a target that is in motion is very difficult. 2)Getting accurate target location is very difficult. 3)Maintaining the operation of node in time is difficult.4)node failure or loss of target tracking is often occurs. In a target tracking application, the sensor nodes which can sense the target at a particular time are kept in active mode while the remaining nodes are to be retained in inactive mode so as to conserve energy until the target approaches them. To continuously monitor mobile target, a group of sensors must be turned in active mode just before target reaches to them. Target tracking has major duty to maintaining the balance networks resources like energy, bandwidth, and over heads. In wireless sensor networks target tracking classified into many types. There are Tree-Based tracking, Cluster-Based Tracking, Prediction-based Tracking, Mob cost Message-Based Tracking and Hybrid methods. Figure: 1 Types of target tracking We present a prediction based target prediction and sleep scheduling protocol (PPSS) to improve the efficiency and enhance the energy efficiency of proactive wake up with limited loss on the tracking performance. PPSS enhances energy efficiency by reducing the number of proactively awakened nodes and controlling their active time in an integrated manner. Related neighborhood graph (RNG) is used width p points for dividing the plane into spatial non overlapping region which is called as face. Each face in the network helps in finding the points that are connected. Each neighboring face shares edge which is common to them. In WSNs face can be of diffence sizes and geometrical polygonal-shape form. For finding inter node edge of polygons a complete WSNs is generated by using planarization algorithm. By introducing the edge detection algorithm the polygon location is identified and wakes up the node before the target moves, which helps in tracking the target in time. That target is about to cross its location it is called as brink and each node are the couple node. To identify the brink in the network the target must move towards the brink by marking rectangular or square shape around the move. Characteristic requirements The following are the characteristic requirements that are shared among the wireless sensor network application 1. Type of service used by a conventional communication network is unmistakable. 2. Quality of Service traditionally bounded with multimedia application where delay and bandwidth requirements are given more importance. 3. Fault Tolerance in wireless sensor network is able to tolerate the faults that are raised due to damage in the or communication between two wireless nodes.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 233 4. Lifetime-the sensor node have to rely on limit energy because of the use of batteries. 5. Scalability employed architectures and protocols must be able to scale these numbers. 6. Wide range of Densities the number of unit per area. This density can vary considerably. Different application will have diverse node densities. II. RELATED WORKS One of the major goal of the wireless sensor networks is to detect the object and monitor the change in region.WSNs originally developed for Military purpose in battle surveillance. But now a day’s used for health care, environmental industries. This RSSI algorithm very useful especially in the case exploited for localization, distance estimation and link assessment. Variations of the signals strength in the region can reveal the movements of persons.Instusion detection system minimize the transmitting information to sink and instead of transmitting information it gives only alert notifications about the unauthorized movement in the respective region. This method used to detect the intrusion of a moving person inside the region and correctly keep tracking of the path. It is possible to estimate the velocity of the movement by knowing the transmission rate of the system and the sensitivity area of a radio link. Once Target is detected creates an awake region and based on the prediction results assigns Sleep scheduling to individual sensors at synchronized time and the graph is plotted for Energy efficiency in comparison with the Existing concept along with Throughput, Packet Delivery ratio. The wake-up scheduling of sensors has significant impact on the lifetime and coverage of a WSN. In this paper, a duty-cycled sensor network, proactive wake up and sleep scheduling can create a local active environment to provide guarantee for the tracking performance. In the wireless sensor network target tracking is that individual homogeneous sensors only can able to target the position and velocity in the Cartesian coordinates. This extended kalman filtering is used to detect the nonlinearity. But some cases its leads to unsatisfactory or unstable tracking performance. To overcome this problem introduced new algorithm called maximum likelihood estimator.MLE especially for prelocalization also overcome the nonlinearity before applying the extended kalman filter. Most existing work on sensor networks widely concentrates on finding efficient way to send a message or a information to the base station, and much work has been done on collecting local data and generating the data report. III.DESIGN OF FACE TRACK Polygon is used for tracking target when it is in moving. The active polygon for polygon and active nodes for nodes is used for detecting the target of some nodes in the WSNs. The active node always follows 1) its own information 2) information about adjacent neighbors 3) Information about active neighboring nodes 4) Information about neighbors through direct communication. The target can move anywhere of the adjacent polygon. The adjustment polygon is called as forward polygon (Pf).correspond to adjust cent neighbor the target is been detected and are called immediate neighbors. Node that are corresponds to the number of polygon is depend on the number of edges or adjacent neighbor. The polygon size can be determined by the number of edges surrounding.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 234 IV.BRINK DETECTION ALGORITHM An edge detection algorithm used to reconstruct another polygon called critical region by determining an edge which is called a brink to the active polygon. Since the brink generated on the boundary of active polygon which crates polygon region problem that in turns into a critical region problem. The main objective is to find the brink when the target is moving to a brink between couple node (CN).This CNs will help in conforming that the target is leaving the active polygon and moving to forward polygon. This forward polygon allowed for tracking the target in time.The edges of active polygon are mapped by brinks. The target moves towards brink, the target is aimed on a spot which is called as follow spots. Since the target moves towards a brink of active polygon, the follow spot is divided into three phase detection spots. 1) Square detection phase: The target is preliminarily detected by two nodes from active polygon but don’t guarantee that the target cross the brink. 2) Rectangular detection phase: The target crosses the brink between the nodes. 3) Crossing phase: The target is going to cross the brink between the nodes. Figure 2: Brink detection process Each brink in forward polygon is identified during when the target crosses network by three phase detection. If the target is in square phase are touch as the rectangular phase a joined-message is sent to forward polygon. Some of the different parameter of the brink are brink length,loal mean length and local standard deviation. This brink is easily identified when CNs is allowed. = 1/ ∫ / / s(CN,j)dx∫ / / , ρ’ =1/A∫ / / s(CN,j)dx∫ / / , ρ’’ =1/A∫ / / s(CN,j)dx∫ / / . P,p1 and p11 be the detection probability for three-phases respectively. This values of P,p1 and p11 are relay on the length of the brink. To find the target, node should have to two condition:1) The node must be in an active polygon2) The node must be in active state when target pass through brink.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 235 Figure3: Polygon-Based Tracking Framework V.CONCLUSION The main challenge in wireless sensor network is to determine how to perceive the target in an efficient manner. The proposed algorithm archives a WSNs system for identifying the movement of a target using polygon tracking. The proposed method also track framework which estimate target position area. It archives high accuracy while tracking. It also reduces energy cost of a WSNs.The target is detected inside a polygon by means of brink detection. It is strong to sensor node failure and error in target location. REFERANCE [1] O. Kaltiokallio, M. Bocca, and L.M. Eriksson, “Distributed RSSI Processing for Intrusion Detection in Indoor Environments,” Proc. Ninth ACM/IEEE Int’l Conf. Information Processing in Sensor Networks (IPSN), pp. 404- 405, 2010. [2] Y. Wang, M. Vuran, and S. Goddard, “Analysis of Event Detectio Delay in Wireless Sensor Networks,” Proc. IEEE INFOCOM,pp. 1296-1304, 2011. [3] Z. Zhong, T. Zhu, D. Wang, and T. He, “Tracking with UnreliableNode Sequence,” Proc. IEEE INFOCOM, pp. 1215-1223, 2009. [4] W. Zhang and G. Cao, “Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks,” IEEE Trans. Wireless Comm., vol. 3, no. 5, Sept. 2004.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 236 [5] Z. Wang, W. Lou, Z. Wang, J. Ma, and H. Chen, “A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks,” Proc. Sixth IEEE Int’l Conf. Distributed Computing in Sensor Systems (DCOSS), pp. 172-186, 2010. [6] L.M. Kaplan, “Global Node Selection for Localization in a Distributed Sensor Network,” IEEE Trans. Aerospace and Electronic Systems, vol. 42, no. 1, pp. 113-135, Jan. 2006. [7] T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. Stankovic, and T. Abdelzaher, “Achieving Real-Time Target Tracking Using Wireless Sensor Networks,” Proc. 12th IEEE Real-Time and Embedded Technology and Applications Symp. (RTAS), pp. 37-48, 2006. [8] M. Waelchli, M. Scheidegger, and T. Braun, “Intensity-Based Event Localization in Wireless Sensor Networks,” Proc. Conf. Int’l Federation for Information Processing Wireless On-Demand Network Systems and Services (IFIP WONS), pp. 41-49, 2006. [9] Y. Zhou, J. Li, and D. Wang, “Posterior Cramer-Rao Lower Bounds for Target Tracking in Sensor Networks with Quantized Range-Only Measurements,” IEEE Signal Processing Letters, vol. 17, no. 2, pp. 377-388, Feb. 2010. [10] X. Wang, M. Fu, and H. Zhang, “Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLE Using Distance Measurements,” IEEE Trans. Mobile Computing, vol. 11, no. 4, pp. 567-576, Apr. 2012. [11] M. Chu, H. Haussecker, and F. Zhao, “Scalable Information Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks,” J. High Performance Computing Applications, vol. 16, no. 3, pp. 293-313, 2002. [12] B. Leong, S. Mitra, and B. Liskov, “Path Vector Face Routing: Geographic Routing with Local Face Information,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), pp. 47-158, 2005. .