SlideShare a Scribd company logo
1 of 4
Download to read offline
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Minimizing Radio Resource Usage for Machine-to-Machine Communications through
Data-Centric Clustering
ABSTRACT
While clustered communication has been considered as one key technology for wireless
sensor networks, existing work on cluster formation predominantly takes a pure graph theoretic
approach with the goal of optimizing the performance of individual machines. Since the radio
resource available for M2M communications. the proposed algorithm, cluster formation is an
NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a
reasonably good cluster structure without incurring prohibitive computation complexity.
EXISTING SYSTEM
Work on cluster formation predominantly takes a pure graph theoretic approach with the
goal of optimizing the performance of individual machines. Since the radio resource available for
M2Mcommunications is typically limited yet the amount of data to transport is large, such
“resource-agnostic” and “data-agnostic” clustering techniques could lead to sub-optimal
performance. To address this problem, we propose “data-centric” clustering in a resource-
constrained M2M network by prioritizing the quality of overall data over the performance of
individual machines.
DISADVANTAGES
1. It has been envisioned that a huge amount of machines will be installed and inter-
connected in the near future to facilitate better living experiences for human beings
through various M2M (machine-to-machine) applications such as home automation,
neighborhood surveillance, intelligent transportation, and smart energy.
2. Different from conventional wireless sensor networks (WSNs), in many of these M2M
applications machines are not necessarily limited in the form factor.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM
While power control can be optimally solved for any given cluster structure by the
proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime,
guided, stochastic search algorithm to find a reasonably good cluster structure without incurring
prohibitive computation complexity. Compared with baseline approaches, our evaluation results
show that data-centric clustering can achieve noticeable performance gain by select in only
important machines and forming a cluster structure that can balance the radio resource usage of
the two tiers. We there for motivate data-centric clustering as a promising communication model
for resource-constrained M2M networks.
ADVANTAGES
1. densely distributed machines with high aggregate data rate, one promising approach for
overcoming the problem of radio resource scarcity is to leverage spatial reuse by
grouping machines into clusters.
2. The random access channel (RACH) when a large number of machines need to access
the network in a short burst. While these endeavors can potentially alleviate the
performance bottleneck by exploiting the delay tolerant nature of the target M2M
applications, the proposed solutions still fall short for many M2M applications involving
a considerable volume of real-time data to transport .
MODULES
1. problem formulation
2. performance evaluation
3. cluster formation sub-problem
ARCHITECTURE
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM CONFIGURATION
HARDWARE CONFIGURATION
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION
 Operating System - Windows Family
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Programming Language - JAVA
 Java Version - JDK 1.6 & above.

More Related Content

Viewers also liked

TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Connect
 
Homicidio doloso - Febrero
Homicidio doloso - FebreroHomicidio doloso - Febrero
Homicidio doloso - Febrero
Consejo Cívico
 
MRMyersResume2016-07-18
MRMyersResume2016-07-18MRMyersResume2016-07-18
MRMyersResume2016-07-18
Michael Myers
 

Viewers also liked (16)

62 1231 la contienda
62 1231 la contienda62 1231 la contienda
62 1231 la contienda
 
55 0119 josué el gran guerrero
55 0119 josué el gran guerrero55 0119 josué el gran guerrero
55 0119 josué el gran guerrero
 
Educación social pp
Educación social ppEducación social pp
Educación social pp
 
TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50
 
Homicidio doloso - Febrero
Homicidio doloso - FebreroHomicidio doloso - Febrero
Homicidio doloso - Febrero
 
Informe de práctica
Informe de práctica Informe de práctica
Informe de práctica
 
61 0402 el verdadero sello de la pascua
61 0402 el verdadero sello de la pascua61 0402 el verdadero sello de la pascua
61 0402 el verdadero sello de la pascua
 
Manejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabéticaManejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabética
 
MRMyersResume2016-07-18
MRMyersResume2016-07-18MRMyersResume2016-07-18
MRMyersResume2016-07-18
 
Roteiro 2 provas da rematerialização
Roteiro 2   provas da rematerializaçãoRoteiro 2   provas da rematerialização
Roteiro 2 provas da rematerialização
 
Educación social
Educación socialEducación social
Educación social
 
Novidades 11.80 materiais
Novidades 11.80   materiaisNovidades 11.80   materiais
Novidades 11.80 materiais
 
Roteiro 2 mediunidade e médium
Roteiro 2   mediunidade e médiumRoteiro 2   mediunidade e médium
Roteiro 2 mediunidade e médium
 
Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.
 
Історія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мовіІсторія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мові
 
презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*
 

Similar to Minimizing radio resource usage for machine to-machine communications through data-centric clustering

ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
Shakas Technologies
 

Similar to Minimizing radio resource usage for machine to-machine communications through data-centric clustering (20)

Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networks
 
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...
 
Ieee 2014 2014 .net project titles
Ieee 2014 2014 .net  project titlesIeee 2014 2014 .net  project titles
Ieee 2014 2014 .net project titles
 
Clustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clustersClustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clusters
 
A fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor networkA fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor network
 
Universal network coding based opportunistic routing for
Universal network coding based opportunistic routing forUniversal network coding based opportunistic routing for
Universal network coding based opportunistic routing for
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Data aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networksData aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networks
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Real time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation systemReal time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation system
 

More from Shakas Technologies

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Minimizing radio resource usage for machine to-machine communications through data-centric clustering

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering ABSTRACT While clustered communication has been considered as one key technology for wireless sensor networks, existing work on cluster formation predominantly takes a pure graph theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2M communications. the proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a reasonably good cluster structure without incurring prohibitive computation complexity. EXISTING SYSTEM Work on cluster formation predominantly takes a pure graph theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2Mcommunications is typically limited yet the amount of data to transport is large, such “resource-agnostic” and “data-agnostic” clustering techniques could lead to sub-optimal performance. To address this problem, we propose “data-centric” clustering in a resource- constrained M2M network by prioritizing the quality of overall data over the performance of individual machines. DISADVANTAGES 1. It has been envisioned that a huge amount of machines will be installed and inter- connected in the near future to facilitate better living experiences for human beings through various M2M (machine-to-machine) applications such as home automation, neighborhood surveillance, intelligent transportation, and smart energy. 2. Different from conventional wireless sensor networks (WSNs), in many of these M2M applications machines are not necessarily limited in the form factor.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM While power control can be optimally solved for any given cluster structure by the proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a reasonably good cluster structure without incurring prohibitive computation complexity. Compared with baseline approaches, our evaluation results show that data-centric clustering can achieve noticeable performance gain by select in only important machines and forming a cluster structure that can balance the radio resource usage of the two tiers. We there for motivate data-centric clustering as a promising communication model for resource-constrained M2M networks. ADVANTAGES 1. densely distributed machines with high aggregate data rate, one promising approach for overcoming the problem of radio resource scarcity is to leverage spatial reuse by grouping machines into clusters. 2. The random access channel (RACH) when a large number of machines need to access the network in a short burst. While these endeavors can potentially alleviate the performance bottleneck by exploiting the delay tolerant nature of the target M2M applications, the proposed solutions still fall short for many M2M applications involving a considerable volume of real-time data to transport . MODULES 1. problem formulation 2. performance evaluation 3. cluster formation sub-problem ARCHITECTURE
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM CONFIGURATION HARDWARE CONFIGURATION  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION  Operating System - Windows Family
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Programming Language - JAVA  Java Version - JDK 1.6 & above.