SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 501
DEVELOPMENT AND PERFORMANCE EVALUATION OF
LOCALIZATION ALGORITHM FOR VARIETY OF TOPOLOGIES IN
WIRELESS SENSOR NETWORKS
Anil A. Agashe1
, R. S. Patil2
1
Electronics Engineering Dept. WCE, Sangli, Maharashtra, India,
2
Electronics Engineering Dept. D.Y. Patil COE, Kolhapur, Maharashtra, India
Abstract
Wireless sensor networks have emerged from military needs and found its way into civil applications. Today wireless sensor networks
have become a key technology for different kinds of smart environments. Sensor node localization which is determining where a given
sensor node is physically or relatively located is extremely crucial for most of the applications in wireless sensor networks. The
procedure through which the sensor nodes obtain their positions is called localization. Many localization algorithms have been
proposed for wireless sensor networks. In this article, we describe our newly developed localization algorithm and performance
evaluation of this localization algorithm with square, ‘C’ and ‘L’ shape network topology.
Keywords- sensor network, localization algorithms
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
The wireless field has been experiencing exponential growth in
the past decade. We have seen great advances in network
infrastructures, rapid growth of cellular network users, the
growing availability of wireless applications, and the emergence
of omnipresent wireless devices. The mobile devices are
becoming smaller, cheaper, more convenient, and more
powerful. In addition to that of the traditional cellular networks,
an exponential growth of the wireless device that connects
wireless communication devices together to create a wireless
network is also being experienced. Many wireless devices can
be connected together to create larger network, which is ad hoc
network. A wireless ad hoc network is a collection of
autonomous nodes or terminals that communicate with each
other by forming a multi hop radio network and maintaining
connectivity in a decentralized manner. The wireless nodes
communicate over wireless links; thus, they have to compete
with the effects of radio communication, such as noise, fading,
and interference. In addition, the links typically have less
bandwidth than in a wired network. Each node in a wireless ad
hoc network functions as both a host and a router, and the
control of the network is distributed among the nodes. Low-
cost, easily installed access points grew rapidly in popularity in
the late 1990s and early 2000s. They can also run more
applications on the network services. Ad hoc wireless networks,
in which a group of potentially mobile units equipped with radio
transceivers, can communicate without any fixed infrastructure.
Miniaturization of semiconductor technology has lead to the
development of small, low power and inexpensive sensor
devices often called as nodes. Network of such sensor devices is
nothing but wireless sensor network. A wireless sensor network
is a network made up of hundreds or thousands of devices using
sensors to monitor different conditions, such as temperature,
sound, vibration, pressure, motion, or pollutants, at different
locations. Usually these devices are small and inexpensive, so
that they can be produced and deployed in large numbers.
Nodes of such networks can be positioned, randomly or
following a predetermined scheme, over a given area; can both
collect data and, at the same time, act as communication
centers.
Self-localization capability is a highly desirable characteristic of
sensor network. In environmental monitoring applications,
water quality monitoring and precision agriculture, the
measurement data are meaningless without knowing the
location from where the data are obtained. Moreover, location
estimation may enable a number of applications such as
inventory management, intrusion detection, road traffic
monitoring, health monitoring, investigation and surveillance.
2. THE COMPONENTS OF LOCALIZATION
SYSTEM
Localization systems can be divided into three different
components:
• Distance and/or angle estimation: This component is
accountable for estimating information about the
distances and/or angles between two nodes. This
information will be used by the other components of the
localization system.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 502
• Location computation: This component is responsible for
computing a node’s position based on available
information concerning distances/ angles and positions of
reference nodes.
• Localization algorithm: This is the main component of a
localization system. It determines how the available
information will be manipulated in order to allow most or
all of the nodes of a WSN to estimate their positions.
Various methods are used to get distance and/or angle
estimation. These methods include received signal strength
indication (RSSI), time of arrival/time difference of arrival
(ToA/TDoA), angle of arrival (AoA), and communication
range.
3. SYSTEM MODEL
For most applications, sensed data without spatial and temporal
coordinates is of very limited use. Sensor nodes have to be
aware of their location to be able to specify “where” a certain
event takes place. Therefore, the problem of localizing the
sensors is of paramount importance for many classes of sensor
network applications. Determining the physical location of the
sensors after they have been deployed is known as the problem
of localization.
The system model considered here is a wireless sensor network
which is composed of n nodes with a communication range of r,
distributed in a two dimensional sensor field. It has been
considered that communication links are symmetric; that is, for
any two nodes u and v, u reaches v if and only if v reaches u
and with the same signal strength w.
We have deployed the nodes in Square area, C shape area and L
shape area. These deployed nodes can be divided into two
categories: Anchors and unknown nodes. Anchors are the static
nodes with well-defined coordinates. They constitute a
customized ad-hoc network for wireless data communication.
Unknown nodes, on the other hand, are distributed at a random.
While an unknown node falls in the signal coverage of a
specific static node, they communicate with each other by
making wireless links. Geometry of fixed anchors for above
said three topologies is as shown by Figure1, Figure 2 and
Figure 3. The symbols used to show Anchor Node and
Unknown node is as follows
Fig1 Deployment of anchors and unknown nodes in Square
topology
Fig2 Deployment of anchors and unknown nodes in C shape
topology
Fig3 Deployment of anchors and unknown nodes in L shape
topology
Anchor node refers to the nodes having predefined locations.
They are also known as landmarks, these are the nodes that do
not need a localization system in order to estimate their physical
positions. Their localization is obtained by manual placement or
external means such as GPS. These nodes form the base of
localization systems for WSNs. Unknown nodes refers to the
nodes of the network that do not know their localization
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 503
information. To estimate their positions is the main goal of a
localization system.
Ad hoc anchor nodes are those nodes which were initially
unknown nodes that manage to estimate their positions by using
the localization scheme. The number of ad hoc anchor nodes
and the normalized localization error of nodes are the main
parameters for determining the quality of a localization system.
4. PROPOSED METHOD OF LOCALIZATION
The proposed localization method is as follows
1. Initialize the sensor network which is consisting of
anchor nodes and unknown nodes.
2. Select the required topology from Square, C and L
shape topology.
3. Designate anchor nodes as fixed anchor nodes and
place the fixed anchor nodes according to particular
geometry.
4. The distances of the unknown node from all the anchor
nodes are calculated.
5. Choose the three anchor nodes which are nearest to
unknown node to form a triangle. The centroid of
triangle is determined which is the position of
unknown node.
6. If unknown node does not lie in the range of three
anchor nodes, select two anchor nodes, which are
nearest to unknown node.
7. If the unknown node lies in the range of two anchor
nodes its estimated position is calculated as centre of
the line joining the points of intersection of the two
circles whose centres are the anchor nodes and radii
are the radio range of these anchors.
8. Once an unknown node gets localized, designate this
node as candidate ad hoc anchor node. This node is
now available as ad hoc anchor node.
9. This ad hoc anchor node is now available to work as
anchor node for localization of remaining unknown
nodes.
10. Steps 4 to 9 will be repeated until all unknown nodes
get localized.
11. The performance of algorithm is measured with
following performance measures.
1. Number of Candidate Ad hoc nodes for particular radio
range,
2. Percentage of ad hoc anchor nodes and
3. Normalized localization error
Let us consider the scenario as shown in the Figure 4. It is
proposed to find out the location of node denoted as S, whose
co ordinates are
),( yx .
As a first step the number of fixed anchor nodes lying in the
radio range of node S is determined. From these nodes three
nodes are chosen arbitrarily to form a triangle denoted in the
Figure 4 as ΔABC. The positions of three known nodes A, B, C
are
),(),,(),,( 332211 yxyxyx
respectively. In order to find out
the location of unknown node (beacon) denoted by S the
centroid of a triangle ABC is calculated. The co ordinates of
centroid are nothing but location of S. As a second step node S
is designated as candidate ad hoc anchor node for further
localization.
Steps 1 and 2 are repeated for all nodes, until no more nodes can
be assigned designation as candidate ad hoc anchor.
Fig 4: Trilateration paradigm to find location of node that lies in
the radio range of three anchors three or more than nodes.
The location of remaining nodes (those who are within range of
less than three anchor or ad hoc anchor nodes) is estimated as
follows.
If the unknown node lies in the range of two anchor nodes, its
estimated position is given as the ‘Centre of the line joining the
points of intersection of the two circles whose centres are the
anchor nodes and radii are the radio range of these anchors’. To
find the centre Radical Line Algorithm [5] is used
Fig 5 An example of unknown node that lies in the range of two
anchor nodes.
5. SIMULATION MODEL
A simulation model is developed in MATLAB to study the
performance of proposed ad hoc anchor nodes based
localization algorithm. Selected deployment region is of
100x100, 200x200, 300x300, 400x400, and 500x500. The
anchor nodes are placed at particular location in the deployment
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 504
region. Unknown nodes are distributed at random in the
deployment region. Here simulation area considered is Square
shape, ‘C’ shape and ‘L’ shape.
For rectangular area eight anchor nodes are placed at certain
location which has been determined according to geometry of
deployment region. Similarly in ‘C’ shape region six anchor
nodes and in ‘L’ shape region four anchor nodes are placed at
certain locations.
6. PERFORMANCE MEASURES
Performance of network is evaluated by calculating following
performance measures
A) Candidate Ad hoc Anchor Nodes: During the execution of
localization algorithm the unknown nodes which get localized
and can work as ad hoc anchor node for localization of
remaining unknown nodes are called as Candidate Ad hoc
Anchor Nodes.
B) Percentage Ad hoc anchor nodes: During the execution of
localization algorithm, the percentage of candidate ad hoc
anchor nodes those actually work as ad hoc anchors is
calculated. It is desirable to have less percentage of ad hoc
anchor nodes used for localization process.
C) Normalized localization error: It is defined as follows.
Assume the real coordinate of the unknown node i ),( yx
and
its estimated co ordinates are ),( ii yx
. The localization error of
node i is defined as
RangeRadio
yyxx
e ii
i
22
)()( −+−
=
It is desirable to have a smaller amount of Normalized
localization error for ideal localization algorithm.
7. RESULTS
Fig 6 Radio Range Vs Candidate anchor nodes for 300×300
Square topology
Figure 6 gives candidate anchor nodes generated in the 300×300
Square topology network at various values of radio ranges from
60 to 75. As there is increase in radio range of sensor nodes,
number of candidate ad hoc anchor nodes increases. For the
radio range 65 with 200 node density in the network 140 nodes
are localized.
Fig 7 Radio Range Vs % of ad hoc anchor nodes for 300×300
Square topology
Figure 7 gives percentage of ad hoc anchor nodes in the
300×300 Square topology network at various values of radio
ranges from 60 to 75. As radio range increases percentage of ad
hoc anchor nodes also increases. For the radio range 70 and
node density 100, 13% nodes works as ad hoc anchor nodes in
the network. Here maximum value for percentage of ad hoc
anchor nodes is 15% for radio range 75.
Fig 8 Radio range Vs Normalized Localization error for
300×300 Square topology
Figure 8 gives Normalized Localization error in the 300×300
Square topology network at various values of radio ranges from
60 to 75. In this entire radio range Normalized Localization
error changes from 0.3 to 0.32 which is almost constant.
60 65 70 75
0
100
200
300
400
500
600
700
800
900
1000
Radio-range
No.ofcandidateanchornodes
Radio Range vs Candidate anchor nodes for 300x300 area and Square-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
60 65 70 75
0
10
20
30
40
50
60
Radio-range
%ofadhocnodes
Radio Range vs % of adhoc nodes for 300x300 area and Square-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
60 65 70 75
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Radio-range
NormalizedLocalizationError
Radio Range vs Normalized Localization Error for 300x300 area and Square-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 505
Fig 9 Radio Range Vs Candidate anchor nodes for 300×300 ‘C’
shape topology
Figure 9 gives candidate anchor nodes in the 300×300 C
topology network at various values of radio ranges from 85 to
100. Here minimum 85% and maximum 90% nodes are
localized.
Fig 10 Radio Range Vs % of ad hoc anchor nodes for 300×300
‘C’ shape topology
Figure 10 shows percentage of ad hoc anchor nodes in the
300×300 ‘C’ shape topology network at various values of radio
ranges from 85 to 100. As radio range increases percentage of
ad hoc anchor nodes increases. For the radio range 100 and
node density 100, 20 % nodes works as ad hoc anchor nodes in
the network. It demonstrates that for this typical scenario
maximum 20% nodes act as ad hoc anchor nodes.
Fig 11 Radio Range Vs Normalized Localization Error for
300×300 ‘C’ shape topology
Figure 11 gives Normalized Localization error in the 300×300
C shape topology network at various values of radio ranges
from 85 to 100. In this entire radio range Normalized
Localization Error remains almost constant that is near to 0.35.
Fig12 Radio Range Vs Candidate anchor nodes for 300×300 ‘L’
shape topology
Figure 12 gives candidate anchor nodes generated in the
300×300 L topology network at various values of radio ranges
from 90 to 105. It has been observed that even if the radio range
of fixed anchor nodes increases, number of localized nodes
remains almost constant to 90%.
85 90 95 100
0
100
200
300
400
500
600
700
800
900
1000
Radio-range
No.ofcandidateanchornodes
Radio Range vs Candidate anchor nodes for 300x300 area and C-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
85 90 95 100
0
10
20
30
40
50
60
70
80
90
100
Radio-range
%ofadhocnodes
Radio Range vs % of adhoc nodes for 300x300 area and C-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
85 90 95 100
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Radio-range
NormalizedLocalizationError
Radio Range vs Normalized Localization Error for 300x300 area and C-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
90 95 100 105
0
100
200
300
400
500
600
700
800
900
1000
Radio-range
No.ofcandidateanchornodes
Radio Range vs Candidate anchor nodes for 300x300 area and L-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 506
Fig 13 Radio Range Vs % of ad hoc anchor nodes for 300×300
‘L’ shape topology
Figure 13 gives percentage of ad hoc anchor nodes in the
300×300 ‘L’ shape topology network at various values of radio
ranges from 90 to 105. As radio range increases percentage of
ad hoc anchor nodes also increases up to 20%. For the radio
range 100 and node density 100, 15% nodes works as ad hoc
anchor nodes in the network.
Figure 14 gives Normalized Localization error in the 300×300 L
shape topology network at various values of radio ranges from
90 to 105. In this entire radio range Normalized Localization
Error remains almost constant. It is 0.34.
Fig 14 Radio Range Vs Normalized Localization Error for
300×300 ‘L’ shape topology
CONCLUSIONS
From the results to obtain better performance of localization
algorithm a typical radio range is required to be selected. For
Square shape topology radio range required is less compared to
“C” & “L” shape topology. Thus for Square topology less
amount of sensor node energy is consumed as radio range
required is less. The normalized localization error is less in
Square shape topology compared to “C” & “L” shape topology.
The developed algorithm gives less error compared to other
range free algorithms. The ad hoc sensor nodes are those nodes
which act as anchor nodes in further localization process; once
an unknown node is localized it can be used in localization
process. The developed localization algorithm distributes the
localization task to fixed anchor nodes as well as to ad hoc
anchor nodes, which will improve the overall performance of
the algorithm.
It has been observed that the percentage of ad hoc anchor nodes
required is less in Square topology. Based on a particular
localization application the given area is divided first in to
Square, then “L” & “C” shape to get better localization
performance. The suggested algorithm gives an insight
suggesting typical radio range required for sensor nodes, which
type of topology gives better performance, the percentage of ad
hoc anchor nodes required depending on no of nodes used in
network area.
REFERENCES
[1]. Eric D. Manley, Huzaifa Al Nahas, and Jitender S. Deogun,
“Localization and Tracking in Sensor Systems”,
Proceedings IEEE International Conference on Sensor
Networks, Ubiquitous, and Trustworthy Computing, IEEE
Computer Society 2006.
[2]. Salvador Jauregui, Mario Siller, “A big picture on
localization algorithms considering sensor logic location”,in
Proceedings 2009 IEEE International Conference on Systems,
Man, and Cybernetics , October 2009. San Antonio, TX, USA ,
pp. 734-739.
[3]. Anita Panwar, Sh. Ashok Kumar, “Localization Schemes in
Wireless Sensor Networks”, in Proceedings 2012 Second
International Conference on Advanced Computing &
Communication Technologies, IEEE Computer Society, pp.
443- 449.
[4]. D. Niculescu and B. Nath, “Ad-hoc Positioning System”,
Proceedings Global Telecommunications Conference, IEEE,
Volume 5, Nov 25-29, 2001, pp. 2926-2931.
[5]. Hongyang Chen, “Accurate and Energy efficient node
localization in wireless sensor networks”, University of Tokyo
[6]. Chu Bolin, Zheng Zengweillsiwsn, “A new Range-free
Localization Algorithm for Large Scale Wireless Sensor
Networks”, International Conference on Business Computing
and Global Information, 2011 pp. 408-411.
90 95 100 105
0
10
20
30
40
50
60
70
80
90
100
Radio-range
%ofadhocnodes
Radio Range vs % of adhoc nodes for 300x300 area and L-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000
90 95 100 105
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Radio-range
NormalizedLocalizationError
Radio Range vs Normalized Localization Error for 300x300 area and L-shaped topology
No. of Nodes=100
No. of Nodes=200
No. of Nodes=300
No. of Nodes=400
No. of Nodes=500
No. of Nodes=600
No. of Nodes=700
No. of Nodes=800
No. of Nodes=900
No. of Nodes=1000

More Related Content

What's hot

A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsKarthik Mohan
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receivereSAT Publishing House
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receivereSAT Journals
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET Journal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
Localization of wireless sensor network
Localization of wireless sensor networkLocalization of wireless sensor network
Localization of wireless sensor networkIRJET Journal
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 

What's hot (20)

A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless Sensors
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
A Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor NetworksA Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor Networks
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiver
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiver
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
Localization of wireless sensor network
Localization of wireless sensor networkLocalization of wireless sensor network
Localization of wireless sensor network
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 

Viewers also liked

Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...eSAT Publishing House
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Geopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialGeopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialeSAT Publishing House
 
On preemptive resume versus non preemtive disciplines relevant to monopoly se...
On preemptive resume versus non preemtive disciplines relevant to monopoly se...On preemptive resume versus non preemtive disciplines relevant to monopoly se...
On preemptive resume versus non preemtive disciplines relevant to monopoly se...eSAT Publishing House
 
Removal of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedRemoval of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedeSAT Publishing House
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filterseSAT Publishing House
 
Thermal necrosis experimental investigation on thermal exposure during bone...
Thermal necrosis   experimental investigation on thermal exposure during bone...Thermal necrosis   experimental investigation on thermal exposure during bone...
Thermal necrosis experimental investigation on thermal exposure during bone...eSAT Publishing House
 
Intelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designIntelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designeSAT Publishing House
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloudeSAT Publishing House
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steelEffectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steeleSAT Publishing House
 
Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &eSAT Publishing House
 
Effect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed onEffect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed oneSAT Publishing House
 
Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatmenteSAT Publishing House
 
Emotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifierEmotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifiereSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switcheseSAT Publishing House
 
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...eSAT Publishing House
 
Simulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flatSimulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flateSAT Publishing House
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedeSAT Publishing House
 
Behavior of self compacting concrete using ppc and opc with different proport...
Behavior of self compacting concrete using ppc and opc with different proport...Behavior of self compacting concrete using ppc and opc with different proport...
Behavior of self compacting concrete using ppc and opc with different proport...eSAT Publishing House
 

Viewers also liked (20)

Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Geopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialGeopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction material
 
On preemptive resume versus non preemtive disciplines relevant to monopoly se...
On preemptive resume versus non preemtive disciplines relevant to monopoly se...On preemptive resume versus non preemtive disciplines relevant to monopoly se...
On preemptive resume versus non preemtive disciplines relevant to monopoly se...
 
Removal of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedRemoval of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derived
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filters
 
Thermal necrosis experimental investigation on thermal exposure during bone...
Thermal necrosis   experimental investigation on thermal exposure during bone...Thermal necrosis   experimental investigation on thermal exposure during bone...
Thermal necrosis experimental investigation on thermal exposure during bone...
 
Intelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designIntelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform design
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloud
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steelEffectiveness of multilayer coated tool in turning of aisi 430 f steel
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
 
Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &
 
Effect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed onEffect of pouring temperature and stirring speed on
Effect of pouring temperature and stirring speed on
 
Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatment
 
Emotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifierEmotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifier
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
 
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
 
Simulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flatSimulation of solar intensity in performance of flat
Simulation of solar intensity in performance of flat
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
 
Behavior of self compacting concrete using ppc and opc with different proport...
Behavior of self compacting concrete using ppc and opc with different proport...Behavior of self compacting concrete using ppc and opc with different proport...
Behavior of self compacting concrete using ppc and opc with different proport...
 

Similar to Development and performance evaluation of

Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbeeeSAT Journals
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbeeeSAT Publishing House
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 

Similar to Development and performance evaluation of (20)

Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
O026084087
O026084087O026084087
O026084087
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
E010412433
E010412433E010412433
E010412433
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Development and performance evaluation of

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 501 DEVELOPMENT AND PERFORMANCE EVALUATION OF LOCALIZATION ALGORITHM FOR VARIETY OF TOPOLOGIES IN WIRELESS SENSOR NETWORKS Anil A. Agashe1 , R. S. Patil2 1 Electronics Engineering Dept. WCE, Sangli, Maharashtra, India, 2 Electronics Engineering Dept. D.Y. Patil COE, Kolhapur, Maharashtra, India Abstract Wireless sensor networks have emerged from military needs and found its way into civil applications. Today wireless sensor networks have become a key technology for different kinds of smart environments. Sensor node localization which is determining where a given sensor node is physically or relatively located is extremely crucial for most of the applications in wireless sensor networks. The procedure through which the sensor nodes obtain their positions is called localization. Many localization algorithms have been proposed for wireless sensor networks. In this article, we describe our newly developed localization algorithm and performance evaluation of this localization algorithm with square, ‘C’ and ‘L’ shape network topology. Keywords- sensor network, localization algorithms ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION The wireless field has been experiencing exponential growth in the past decade. We have seen great advances in network infrastructures, rapid growth of cellular network users, the growing availability of wireless applications, and the emergence of omnipresent wireless devices. The mobile devices are becoming smaller, cheaper, more convenient, and more powerful. In addition to that of the traditional cellular networks, an exponential growth of the wireless device that connects wireless communication devices together to create a wireless network is also being experienced. Many wireless devices can be connected together to create larger network, which is ad hoc network. A wireless ad hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi hop radio network and maintaining connectivity in a decentralized manner. The wireless nodes communicate over wireless links; thus, they have to compete with the effects of radio communication, such as noise, fading, and interference. In addition, the links typically have less bandwidth than in a wired network. Each node in a wireless ad hoc network functions as both a host and a router, and the control of the network is distributed among the nodes. Low- cost, easily installed access points grew rapidly in popularity in the late 1990s and early 2000s. They can also run more applications on the network services. Ad hoc wireless networks, in which a group of potentially mobile units equipped with radio transceivers, can communicate without any fixed infrastructure. Miniaturization of semiconductor technology has lead to the development of small, low power and inexpensive sensor devices often called as nodes. Network of such sensor devices is nothing but wireless sensor network. A wireless sensor network is a network made up of hundreds or thousands of devices using sensors to monitor different conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations. Usually these devices are small and inexpensive, so that they can be produced and deployed in large numbers. Nodes of such networks can be positioned, randomly or following a predetermined scheme, over a given area; can both collect data and, at the same time, act as communication centers. Self-localization capability is a highly desirable characteristic of sensor network. In environmental monitoring applications, water quality monitoring and precision agriculture, the measurement data are meaningless without knowing the location from where the data are obtained. Moreover, location estimation may enable a number of applications such as inventory management, intrusion detection, road traffic monitoring, health monitoring, investigation and surveillance. 2. THE COMPONENTS OF LOCALIZATION SYSTEM Localization systems can be divided into three different components: • Distance and/or angle estimation: This component is accountable for estimating information about the distances and/or angles between two nodes. This information will be used by the other components of the localization system.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 502 • Location computation: This component is responsible for computing a node’s position based on available information concerning distances/ angles and positions of reference nodes. • Localization algorithm: This is the main component of a localization system. It determines how the available information will be manipulated in order to allow most or all of the nodes of a WSN to estimate their positions. Various methods are used to get distance and/or angle estimation. These methods include received signal strength indication (RSSI), time of arrival/time difference of arrival (ToA/TDoA), angle of arrival (AoA), and communication range. 3. SYSTEM MODEL For most applications, sensed data without spatial and temporal coordinates is of very limited use. Sensor nodes have to be aware of their location to be able to specify “where” a certain event takes place. Therefore, the problem of localizing the sensors is of paramount importance for many classes of sensor network applications. Determining the physical location of the sensors after they have been deployed is known as the problem of localization. The system model considered here is a wireless sensor network which is composed of n nodes with a communication range of r, distributed in a two dimensional sensor field. It has been considered that communication links are symmetric; that is, for any two nodes u and v, u reaches v if and only if v reaches u and with the same signal strength w. We have deployed the nodes in Square area, C shape area and L shape area. These deployed nodes can be divided into two categories: Anchors and unknown nodes. Anchors are the static nodes with well-defined coordinates. They constitute a customized ad-hoc network for wireless data communication. Unknown nodes, on the other hand, are distributed at a random. While an unknown node falls in the signal coverage of a specific static node, they communicate with each other by making wireless links. Geometry of fixed anchors for above said three topologies is as shown by Figure1, Figure 2 and Figure 3. The symbols used to show Anchor Node and Unknown node is as follows Fig1 Deployment of anchors and unknown nodes in Square topology Fig2 Deployment of anchors and unknown nodes in C shape topology Fig3 Deployment of anchors and unknown nodes in L shape topology Anchor node refers to the nodes having predefined locations. They are also known as landmarks, these are the nodes that do not need a localization system in order to estimate their physical positions. Their localization is obtained by manual placement or external means such as GPS. These nodes form the base of localization systems for WSNs. Unknown nodes refers to the nodes of the network that do not know their localization
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 503 information. To estimate their positions is the main goal of a localization system. Ad hoc anchor nodes are those nodes which were initially unknown nodes that manage to estimate their positions by using the localization scheme. The number of ad hoc anchor nodes and the normalized localization error of nodes are the main parameters for determining the quality of a localization system. 4. PROPOSED METHOD OF LOCALIZATION The proposed localization method is as follows 1. Initialize the sensor network which is consisting of anchor nodes and unknown nodes. 2. Select the required topology from Square, C and L shape topology. 3. Designate anchor nodes as fixed anchor nodes and place the fixed anchor nodes according to particular geometry. 4. The distances of the unknown node from all the anchor nodes are calculated. 5. Choose the three anchor nodes which are nearest to unknown node to form a triangle. The centroid of triangle is determined which is the position of unknown node. 6. If unknown node does not lie in the range of three anchor nodes, select two anchor nodes, which are nearest to unknown node. 7. If the unknown node lies in the range of two anchor nodes its estimated position is calculated as centre of the line joining the points of intersection of the two circles whose centres are the anchor nodes and radii are the radio range of these anchors. 8. Once an unknown node gets localized, designate this node as candidate ad hoc anchor node. This node is now available as ad hoc anchor node. 9. This ad hoc anchor node is now available to work as anchor node for localization of remaining unknown nodes. 10. Steps 4 to 9 will be repeated until all unknown nodes get localized. 11. The performance of algorithm is measured with following performance measures. 1. Number of Candidate Ad hoc nodes for particular radio range, 2. Percentage of ad hoc anchor nodes and 3. Normalized localization error Let us consider the scenario as shown in the Figure 4. It is proposed to find out the location of node denoted as S, whose co ordinates are ),( yx . As a first step the number of fixed anchor nodes lying in the radio range of node S is determined. From these nodes three nodes are chosen arbitrarily to form a triangle denoted in the Figure 4 as ΔABC. The positions of three known nodes A, B, C are ),(),,(),,( 332211 yxyxyx respectively. In order to find out the location of unknown node (beacon) denoted by S the centroid of a triangle ABC is calculated. The co ordinates of centroid are nothing but location of S. As a second step node S is designated as candidate ad hoc anchor node for further localization. Steps 1 and 2 are repeated for all nodes, until no more nodes can be assigned designation as candidate ad hoc anchor. Fig 4: Trilateration paradigm to find location of node that lies in the radio range of three anchors three or more than nodes. The location of remaining nodes (those who are within range of less than three anchor or ad hoc anchor nodes) is estimated as follows. If the unknown node lies in the range of two anchor nodes, its estimated position is given as the ‘Centre of the line joining the points of intersection of the two circles whose centres are the anchor nodes and radii are the radio range of these anchors’. To find the centre Radical Line Algorithm [5] is used Fig 5 An example of unknown node that lies in the range of two anchor nodes. 5. SIMULATION MODEL A simulation model is developed in MATLAB to study the performance of proposed ad hoc anchor nodes based localization algorithm. Selected deployment region is of 100x100, 200x200, 300x300, 400x400, and 500x500. The anchor nodes are placed at particular location in the deployment
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 504 region. Unknown nodes are distributed at random in the deployment region. Here simulation area considered is Square shape, ‘C’ shape and ‘L’ shape. For rectangular area eight anchor nodes are placed at certain location which has been determined according to geometry of deployment region. Similarly in ‘C’ shape region six anchor nodes and in ‘L’ shape region four anchor nodes are placed at certain locations. 6. PERFORMANCE MEASURES Performance of network is evaluated by calculating following performance measures A) Candidate Ad hoc Anchor Nodes: During the execution of localization algorithm the unknown nodes which get localized and can work as ad hoc anchor node for localization of remaining unknown nodes are called as Candidate Ad hoc Anchor Nodes. B) Percentage Ad hoc anchor nodes: During the execution of localization algorithm, the percentage of candidate ad hoc anchor nodes those actually work as ad hoc anchors is calculated. It is desirable to have less percentage of ad hoc anchor nodes used for localization process. C) Normalized localization error: It is defined as follows. Assume the real coordinate of the unknown node i ),( yx and its estimated co ordinates are ),( ii yx . The localization error of node i is defined as RangeRadio yyxx e ii i 22 )()( −+− = It is desirable to have a smaller amount of Normalized localization error for ideal localization algorithm. 7. RESULTS Fig 6 Radio Range Vs Candidate anchor nodes for 300×300 Square topology Figure 6 gives candidate anchor nodes generated in the 300×300 Square topology network at various values of radio ranges from 60 to 75. As there is increase in radio range of sensor nodes, number of candidate ad hoc anchor nodes increases. For the radio range 65 with 200 node density in the network 140 nodes are localized. Fig 7 Radio Range Vs % of ad hoc anchor nodes for 300×300 Square topology Figure 7 gives percentage of ad hoc anchor nodes in the 300×300 Square topology network at various values of radio ranges from 60 to 75. As radio range increases percentage of ad hoc anchor nodes also increases. For the radio range 70 and node density 100, 13% nodes works as ad hoc anchor nodes in the network. Here maximum value for percentage of ad hoc anchor nodes is 15% for radio range 75. Fig 8 Radio range Vs Normalized Localization error for 300×300 Square topology Figure 8 gives Normalized Localization error in the 300×300 Square topology network at various values of radio ranges from 60 to 75. In this entire radio range Normalized Localization error changes from 0.3 to 0.32 which is almost constant. 60 65 70 75 0 100 200 300 400 500 600 700 800 900 1000 Radio-range No.ofcandidateanchornodes Radio Range vs Candidate anchor nodes for 300x300 area and Square-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 60 65 70 75 0 10 20 30 40 50 60 Radio-range %ofadhocnodes Radio Range vs % of adhoc nodes for 300x300 area and Square-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 60 65 70 75 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 Radio-range NormalizedLocalizationError Radio Range vs Normalized Localization Error for 300x300 area and Square-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 505 Fig 9 Radio Range Vs Candidate anchor nodes for 300×300 ‘C’ shape topology Figure 9 gives candidate anchor nodes in the 300×300 C topology network at various values of radio ranges from 85 to 100. Here minimum 85% and maximum 90% nodes are localized. Fig 10 Radio Range Vs % of ad hoc anchor nodes for 300×300 ‘C’ shape topology Figure 10 shows percentage of ad hoc anchor nodes in the 300×300 ‘C’ shape topology network at various values of radio ranges from 85 to 100. As radio range increases percentage of ad hoc anchor nodes increases. For the radio range 100 and node density 100, 20 % nodes works as ad hoc anchor nodes in the network. It demonstrates that for this typical scenario maximum 20% nodes act as ad hoc anchor nodes. Fig 11 Radio Range Vs Normalized Localization Error for 300×300 ‘C’ shape topology Figure 11 gives Normalized Localization error in the 300×300 C shape topology network at various values of radio ranges from 85 to 100. In this entire radio range Normalized Localization Error remains almost constant that is near to 0.35. Fig12 Radio Range Vs Candidate anchor nodes for 300×300 ‘L’ shape topology Figure 12 gives candidate anchor nodes generated in the 300×300 L topology network at various values of radio ranges from 90 to 105. It has been observed that even if the radio range of fixed anchor nodes increases, number of localized nodes remains almost constant to 90%. 85 90 95 100 0 100 200 300 400 500 600 700 800 900 1000 Radio-range No.ofcandidateanchornodes Radio Range vs Candidate anchor nodes for 300x300 area and C-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 85 90 95 100 0 10 20 30 40 50 60 70 80 90 100 Radio-range %ofadhocnodes Radio Range vs % of adhoc nodes for 300x300 area and C-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 85 90 95 100 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 Radio-range NormalizedLocalizationError Radio Range vs Normalized Localization Error for 300x300 area and C-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 90 95 100 105 0 100 200 300 400 500 600 700 800 900 1000 Radio-range No.ofcandidateanchornodes Radio Range vs Candidate anchor nodes for 300x300 area and L-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 506 Fig 13 Radio Range Vs % of ad hoc anchor nodes for 300×300 ‘L’ shape topology Figure 13 gives percentage of ad hoc anchor nodes in the 300×300 ‘L’ shape topology network at various values of radio ranges from 90 to 105. As radio range increases percentage of ad hoc anchor nodes also increases up to 20%. For the radio range 100 and node density 100, 15% nodes works as ad hoc anchor nodes in the network. Figure 14 gives Normalized Localization error in the 300×300 L shape topology network at various values of radio ranges from 90 to 105. In this entire radio range Normalized Localization Error remains almost constant. It is 0.34. Fig 14 Radio Range Vs Normalized Localization Error for 300×300 ‘L’ shape topology CONCLUSIONS From the results to obtain better performance of localization algorithm a typical radio range is required to be selected. For Square shape topology radio range required is less compared to “C” & “L” shape topology. Thus for Square topology less amount of sensor node energy is consumed as radio range required is less. The normalized localization error is less in Square shape topology compared to “C” & “L” shape topology. The developed algorithm gives less error compared to other range free algorithms. The ad hoc sensor nodes are those nodes which act as anchor nodes in further localization process; once an unknown node is localized it can be used in localization process. The developed localization algorithm distributes the localization task to fixed anchor nodes as well as to ad hoc anchor nodes, which will improve the overall performance of the algorithm. It has been observed that the percentage of ad hoc anchor nodes required is less in Square topology. Based on a particular localization application the given area is divided first in to Square, then “L” & “C” shape to get better localization performance. The suggested algorithm gives an insight suggesting typical radio range required for sensor nodes, which type of topology gives better performance, the percentage of ad hoc anchor nodes required depending on no of nodes used in network area. REFERENCES [1]. Eric D. Manley, Huzaifa Al Nahas, and Jitender S. Deogun, “Localization and Tracking in Sensor Systems”, Proceedings IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE Computer Society 2006. [2]. Salvador Jauregui, Mario Siller, “A big picture on localization algorithms considering sensor logic location”,in Proceedings 2009 IEEE International Conference on Systems, Man, and Cybernetics , October 2009. San Antonio, TX, USA , pp. 734-739. [3]. Anita Panwar, Sh. Ashok Kumar, “Localization Schemes in Wireless Sensor Networks”, in Proceedings 2012 Second International Conference on Advanced Computing & Communication Technologies, IEEE Computer Society, pp. 443- 449. [4]. D. Niculescu and B. Nath, “Ad-hoc Positioning System”, Proceedings Global Telecommunications Conference, IEEE, Volume 5, Nov 25-29, 2001, pp. 2926-2931. [5]. Hongyang Chen, “Accurate and Energy efficient node localization in wireless sensor networks”, University of Tokyo [6]. Chu Bolin, Zheng Zengweillsiwsn, “A new Range-free Localization Algorithm for Large Scale Wireless Sensor Networks”, International Conference on Business Computing and Global Information, 2011 pp. 408-411. 90 95 100 105 0 10 20 30 40 50 60 70 80 90 100 Radio-range %ofadhocnodes Radio Range vs % of adhoc nodes for 300x300 area and L-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000 90 95 100 105 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 Radio-range NormalizedLocalizationError Radio Range vs Normalized Localization Error for 300x300 area and L-shaped topology No. of Nodes=100 No. of Nodes=200 No. of Nodes=300 No. of Nodes=400 No. of Nodes=500 No. of Nodes=600 No. of Nodes=700 No. of Nodes=800 No. of Nodes=900 No. of Nodes=1000