SlideShare a Scribd company logo
1 of 8
Download to read offline
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
15
A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES
IN MANETS
Aswathy P Sreevatsan, Diya Thomas
1, 2
(Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kakkanad, India)
ABSTRACT
Ad hoc networks are dynamic in nature due to the mobility of nodes. The routing in ad-hoc networks is a
tedious process because of the link breakage between the mobile nodes. Clustering is the process of grouping the nodes
into different groups known as clusters. A cluster head is a node present in the geographical region of the cluster and
takes care of the routing and allocation of resources for the cluster members. Nodes that have registered with the cluster
head become members of the cluster. The cluster heads form a dominant set in the network. After clustering the path
between any two nodes is explored between the cluster heads of the cluster which they belong to. Thus the path consists
of only cluster heads. This leads to long lived paths between any two nodes. The association and dissociation of nodes to
and from clusters perturb the stability of the network topology, and hence a reconfiguration of the system is often
unavoidable. However, it is vital to keep the topology stable as long as possible. This paper analyses some of the existing
weighted clustering algorithms in MANETS.
Keywords: Clustering, Cluster Head Selection, MANETs, Weighted Clustering.
1. INTRODUCTION
Clustering is the technique that aggregates nodes into groups to make network management easier. The network
is divided into a number of clusters and each cluster has a cluster head that monitors the cluster. Nodes play completely
different roles in clustering techniques and there are 3 kinds of nodes
a. Ordinary nodes
b. Cluster head
c. Cluster gateways nodes
Cluster head nodes: Cluster head is a support or backbone to sustain all essential control functions. The function of
cluster heads is internal node communication, to forward inter cluster messages.
Cluster gateway Nodes: A node is called a gateway if it lies within the transmission range of two or more cluster heads.
Gateway nodes are generally used for routing between clusters.
Ordinary nodes (cluster member): They are members of the cluster and does not have any specific function.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 15-22
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
16
The Fig. below illustrates the different types of nodes and cluster structure.
Fig.1: Cluster structure
2. CATEGORIES OF CLUSTERING
The clusters may change dynamically due to the movement of nodes. A number of methods have been proposed
to choose cluster heads in ad hoc networks. They include (i) Highest-Degree heuristic, (ii) Lowest-ID heuristic, and (iii)
Node-Weight heuristic.
2.1. Highest-Degree heuristic
The Highest-Degree, also known as connectivity-based clustering is a clustering algorithm in which the degree
of a node is computed based on its distance from others. Each node broadcasts its id to the nodes that are within its
transmission range. A node x is considered to be a neighbour of another node y if x lies within the transmission range of
y. Cluster head will be the node with maximum number of neighbours and any tie is broken by the unique node ids. The
neighbours of a cluster head become members of that cluster and can no longer participate in the election process. Any
two nodes in a cluster are at most two-hops away since the cluster head is directly linked to each of its neighbours in the
cluster. Basically, each node either becomes a cluster head or remains an ordinary. Experiments demonstrate that the
system has a low rate of cluster head change but the throughput is low under the Highest-Degree heuristic. The re-
affiliation counts of nodes are high due to node movements and as a result, the highest-degree node may not be re-elected
to be a cluster head even if it loses one neighbour. All these drawbacks occur because this approach does not have any
restriction on the upper bound on the number of nodes in a cluster.
2.2. Lowest-ID heuristic
The Lowest-ID, also as known as identifier-based clustering, is a heuristic that assigns a unique id to each node
and chooses the node with the minimum id as a cluster head. Thus, the ids of cluster head will be lesser than that of the
neighbours of the cluster head. However, the cluster head can delegate its responsibility to the next node with the
minimum id in its cluster. For this heuristic, the system performance is better compared with the Highest-Degree
heuristic in terms of throughput. However, the drawback of this heuristic is its bias towards nodes with smaller ids which
may lead to the battery drainage of certain nodes. Moreover, it does not attempt to balance the load uniformly across all
the nodes.
2.3. Node-Weight heuristic
In this approach, each node is assigned weights based on its suitability of being a cluster head depending upon a
parameter (eg. mobility). A node is chosen to be a cluster head if its weight is higher than any of its neighbours’ weight;
otherwise, it joins a neighbouring cluster head. The smaller node id is chosen in case of a tie. Results proved that the
number of updates required is smaller than the Highest-Degree and Lowest-ID heuristics. Since node weights were
varied in each simulation cycle, computing the cluster heads becomes very expensive and there are no optimizations on
the system parameters such as throughput and power control.
2.4. Limitations of existing heuristics
None of the above three heuristics leads to an optimal election of cluster heads since each deals with only a
subset of parameters which can possibly impose constraints on the system. Each of these heuristics is suitable for a
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
17
specific application rather than for arbitrary wireless mobile networks. Thus weighted clustering algorithm was
introduced to compute node weights taking different factors into consideration.
3. LITERATURE SURVEY
3.1 Weighted Clustering Algorithm (WCA) [1]
WCA take into account node’s degree, transmission power, mobility and battery power to select a cluster head.
WCA combines each of these four parameters with certain weighing factors chosen according to the system needs. The
flexibility of changing the weight factors helps to apply the algorithm to various networks. The output of cluster head
election procedure is a set of nodes called the dominant set. Let the number of nodes that a cluster head can handle
ideally be δ. This is to ensure that cluster heads are not over-loaded and the efficiency of the system is maintained at the
expected level. The procedure consists of eight steps as described below.
Step 1. Find the neighbours of each node v (i.e., nodes within its transmission range txrange) within vertex set V, which
defines its degree, dv, as :
(1)
Step 2. Compute the degree-difference, ∆v = |dv − δ|, for every node v.
Step 3. For every node, compute the sum of the distances, Dv, with all its neighbours, as :
(2)
Step 4. Compute the running average of the speed for every node till current time T . This gives a measure of mobility
and is denoted by Mv, as :
(3)
where (Xt, Yt ) and (Xt−1,Yt−1) are the coordinates of the node v at time t and (t − 1), respectively.
Step 5. Compute the cumulative time, Pv, during which a node v acts as a cluster head. Pv implies how much battery
power has been consumed which is assumed more for a cluster head than an ordinary node.
Step 6. Calculate the combined weight Wv for each node v :
Wv = w1∆v + w2Dv + w3Mv + w4Pv (4)
Where w1,w2,w3 and w4 are the weighing factors for the corresponding system parameters.
Step 7. Choose that node with the smallest Wv as the cluster head. All the neighbours of the chosen cluster head are no
longer allowed to participate in the election procedure.
Step 8. Repeat steps 2–7 for the remaining nodes not yet selected as a cluster head or assigned to a cluster.
3.2 CBDM [2]
New weighted distributed clustering algorithm, called CBMD takes into consideration the parameters:
connectivity (C), residual battery power (B), average mobility (M), and distance (D) of the nodes to choose locally
optimal cluster heads. The goals of this algorithm are maintaining stable clustering structure with a lowest number of
clusters formed, to minimize the overhead for the clustering formation and maintenance and to maximize the lifespan of
mobile nodes in the system. The algorithm is an extended version of Weighted Clustering Algorithm (WCA). The main
feature of this algorithm is that each mobile node starts to measure its weight after n successive ‘hello messages’, where
the result specifies the accurate value for the mobility and battery power. The nodes with the largest local weights are
elected as cluster heads. As the nodes have various battery powers to start with, a more accurate metric to measure the
power currently available at the node was also introduced.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
18
a. Connectivity Metric (C)
The first parameter is the connectivity. Neither nodes with the highest connectivity nor the lowest should be
elected as cluster heads. This gives a measure of connectivity and is denoted by C, as:
(5)
Let N be the number of nodes in the system. Let Li,j(t) be the indication that whether node i is a neighbor of
node j, at time t. Where Li,j(t)=0 if node i is not a neighbour of node j at time t, Li,j(t)=1 If node i is a neighbour of node j
at time t.
b. Residual Battery power metric (RBP)
The second parameter is the residual battery power. a node with high residual battery power can perform well as
cluster head for a longer duration.
c. Average mobility metric (M)
The third parameter is the average mobility of the node. Each node i measures its own average mobility M . This
is achieved through contrasting the topology information it obtains during successive Hello messages (HMs). Mobile
nodes maintain a short ‘Neighbourhood Record Table’ (NRT). NRT rows comprise vectors representing the IDs of
neighboring nodes, where each NRT row refers to different HM.
d. Distance metric (D)
The fourth parameter is the distance between node and other nodes within transmission range. It’s better to
elect a cluster head with the nearest members. For a node i, D is computed as the cumulative mean square distance to
neighbours divided by the total number of neighbours.
The above parameters are then normalized and the combined weight W for each node i is:
W= W1Cn+W2Bn+W3Dn+W4Mn (6)
Where W1+W2+W3+W4<=1 and Cn, Bn, Dn, Mn are the normalized parameters and i is the ID number of node
1<=i<=N. A node with the highest weight is the best candidate for a cluster head.
3.3 Enhanced algorithm based on WCA [3]
This clustering algorithm is also based on node degree, received power level, stationary factor and remaining
time battery. Each node in a MANET broadcasts its initial ch_info message periodically to declare its existence. The
ch_info message of a node carries its address, fitness, address of Cluster Head and node state. Thus, each node can obtain
information about its neighbors by its received ch_info message. Next, nodes with the highest fitness will be elected as
Cluster Heads. The clustering algorithm is two stages procedure. The first one is the nomination stage and the second one
is the election stage.
Each node after sending initial message calculate its fitness. The fitness (F) is the weight function of few
parameters, like degree of the node, received power level, stationary factor and battery level. This parameter is calculated
using the formula:
(7)
and W1, W2, W3, W4 are weighting factors for the corresponding system parameters where:
λ Degree of the node (DG)
λ The received power level (PR)
λ Stationary factor (SF)
λ Battery level (BL)
These factors should be fulfil the following condition w1+w2+w3+w4=1
All values obtained above are normalized in the range (0,1). The cluster is created by the nodes within one-hop
distance. Among nodes within transmission range are selected nodes with the highest fitness. These nodes are nominated
nodes and they change their status to NOMINATED. The nomination stage is complete. The next stage is election stage.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
19
During election stage final cluster heads are selected, the nodes change their status to SELECTED and the selection is
advertised. The main disadvantage of this method is that there is no guarantee that the messages sent will reach the other
nodes.
3.4 AWCBRP – An Adaptive Weighted Cluster Based Routing Protocol [4]
Here the cluster head selection is performed by assigning a weight value based on the factors Energy Level,
Connectivity and Stability. From time to time every node sends a beacon called Alive Beacon (AB). Time stamp and
NODE ID field are present in AB. The neighbour data table (NDT) is checked by the nodes that hear AB. A new entry is
created for the sender of AB when there is no entry with AB’s NODE ID it creates a new entry for the sender of AB, AB
sets it’s AT field to zero and initiates a timer. Earlier to expiration of timer, if the NODE ID received in AB is same, it
sets AT corresponding to that node to 1 and restarts the timer. The corresponding entry in the NDT is removed. ABs are
not forwarded. Before the arrival of AB node if a timer expires the following node is considered to have moved and the
CH is informed about this. Cluster head Beacon (CHBs) is heard by every node. There are four possible cases:
a. The CH and the node are inside the cluster when a CHB is heard.
b. When a node listens to one more cluster’s CHB with its CHB, then it inserts the CH ID of the former’s CHB in a
gateway table (GT). If within a specified period of time (GETTHRESHOLD) it hears both the CHBs once again, it
affirms itself as the gateway between these two clusters by sending a “gateway assert”(GA) packet to both the CHs. A
GT is checked by CH when it receives GA packet and looks for other gateway.
i) GA is affirmed of the absence of another gateway by registering the gateway’s NODE ID in its GT and a
“gateway registered” packet.
ii) When a cluster has a gateway entry the hop count of the current gateway is compared with the GA sender by
the CH .When the hop count of the GA is less than CH a “gateway registered “ packet is sent to the GA after
CH is deregistered. Otherwise GA packet is ignored. The GA packet is not sent for a particular period of time
and the process is repeated again.
c. It register’s with the cluster using a “register me” packet when it hears the CHB of that cluster. The table of nodes
which are available in the cluster of the CH is updated and a “registered packet” is sent to the node.
d. If no CHB is heard two possibilities happen
i) The node moves from the cluster.
ii) When CH moves to a considerable distance the nodes start the cluster formation phase once again by
reversing for a random time interval.
Cluster heads are selected based on the following weighted sum :
(8)
Where D1 is the power level of the node , D2 is the connectivity factor and D3 is the stability index and W1,W2
and W3 are the weighting factors. Cluster head has the least W value. After the node is formed as a cluster head, the node
or the members of the node will be discerned as “considered". Every “unconsidered” node undergoes the election
process. After the selection of “considered nodes” the election algorithm will be terminated.
3.5 PAIWCA – Probability Based Adaptive Invoked Weighted Clustering Algorithm [5]
In PAIWCA each node computes its weight value based on the following parameters:
a) Mobility of the node: Calculate the average speed for every node until the current time T. This gives the
measure of the mobility Mv.
b) Power consumed: Determine how much battery power has been consumed, Pv. This is assumed to be more for a
cluster-head when compared to an ordinary node
c) Transmission Rate: Determine the transmission rate for each node at Tx. This is assumed to be high for a
cluster-head.
d) Transmission Range: Transmission range for each node (Tr) is calculated independently for each node.
e) Cluster head probability of node(Chprob).
The weight Wv for each node is calculated independent of the neighbours and the clusters, using the parameters:
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
20
Wv=(w1 x Tr)+ (w2 x Tx) + (w3 x Mv) + (w4 x Pv) - Chprob. (9)
Once the weights of the nodes are calculated before the clustering setup, the node with minimum weight is
chosen to be the cluster-head and its neighbours are no longer allowed to participate in the election procedure. All the
above steps are repeated for remaining nodes which is not yet elected as a cluster-head or assigned to a cluster. One
disadvantage of WCA is that the clustering algorithm is called on new nodes arrival, which increases the overhead of re-
clustering process and the cluster becomes unstable. To avoid this and to increase cluster stability, a probability based
approach using Cluster-Head Probability of a node. If a newly arrived node has higher probability than the existing
cluster head of a cluster to which it wishes to join, then the newly arrived node becomes the cluster-head for that cluster
without disrupting the entire topology which increases the stability of the network. If the newly arrived node has lower
probability than the existing cluster-head of the cluster to which it wishes to join then it becomes the member of that
cluster-head .
3.6 A dynamic clustering algorithm with mobility prediction [6]
This algorithm propose to reduce the overhead in communication by predicting mobility of node using linear
auto regression and cluster formation. Initially, each node broadcasts a beacon message to notify its presence to the
neighbours. A beacon message contains the state of the node. Each node builds its neighbour list based on the beacon
messages received. The cluster-heads .Election is based on the weight values of the nodes and the node having the lowest
weight is chosen as CH.
Each node computes its weight value based on the following algorithm:
Step 1: Decide the weights
Step 2: Compute the weight of each node, given by:
(10)
Where ∆sp is the spreading degree, Dv is the distance with its neighbours, Mv is the mobility of the node, and
power consumed is represented by Pv .
Step 3: The node with the smallest Wv is elected as a cluster-head. All the neighbours of the chosen cluster-head are no
more allowed to participate in the election procedure.
The Concept of Linear Auto Regression is, given a time series of data, the autoregressive (AR) models is a tool
for understanding and predicting future values in this series. It is used in statistics and signal processing. For i = 1…P :
(11)
Where Xτ is the predicted value at time τ based on the average rate of change of the previous values. N is the
total number of differences calculated. The value of i and j are 1 and 2 respectively. Using the regression technique a
time series data about the previous position of the node are analyzed and the next value in the series is predicted. Using
this predicted value the cluster calculation is done. It was found that the cluster formed with predicted values and actual
values are the same and thus the power of the mobile node can be saved if we use prediction calculation and avoid the
beacon signals between mobile node and its Cluster-Head to get the geographical position of the node. Bandwidth that
must be utilized for data transfer is also saved in this case. A stable cluster topology is thus obtained.
3.7 IWCA – Improved Weighted Clustering Algorithm [7]
The IWCA algorithm enhance the trust of cluster formation by malicious node removal from cluster head or
member selection .Initially, each node broadcasts a beacon message to notify its presence to the neighbours. A beacon
message contains the state of the node. Every node builds its neighbour list based on the beacon messages received. The
cluster-heads election is based on the weight values of the nodes and the node having the lowest weight is chosen as CH.
Every node calculates the following:
a. PDR(Packet Data Rate)-PDR= (Number of Packet's Dropped)/ (Total Number of Incoming Nodes)
b. PMOR (Packet Modification Rate)- PMOR= (Number of Packet's Modified)/ (Total Number of Incoming Nodes)
c. PMIR(Packet Misroute Rate)- PMIR= (Number of Packet's Misrouted)/ (Total Number of Incoming Nodes)
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
21
Then for each node, check threshold value of PDR, PMR and PMIR. Assign behaviour to node according
threshold value as malicious or normal .Calculate weight for each node by:
W = (a x Nv) + (b x Pv) + (c x Sv) + (d xDv) (12)
where Nv =list of neighbours for every node until the current time T of the node v at instant t, Pv =The amount of
remain battery power. Assumed to be more for a cluster-head when compared to an ordinary node , Sv =speed of
movement of a node, Dv =Direction of movement of a node .
3.8 An Innovative Clustering Algorithm Based on Cluster Stability [8]
The goal of this algorithm is to decrease the number of cluster forming, maintain stable clustering structure and
maximize lifespan of mobile nodes in the system. The used parameters in weighted function for giving a weight to nodes
include:
• Relative speed (RS)
• Battery remaining (Br)
• Number of nodes moving towards a node (Ndm)
• Stability(S)
Each node uses the above mentioned four parameters to calculate its weight :
(13)
ci(s) are the weight factors of normalization.
This algorithm describes how to include a newly arrived node. Once a wireless node is activated, its idCH field is
equal to NULL since it does not belong to any cluster. The node continuously monitors the channel until it figures out
that there is some activity in its neighborhood. This is due to the ability to receive the signals from other present nodes in
the network. The node still has no stable state, thus its state is not full identified. In this case, it broadcasts a
Join_Request in order to join the most powerful clusterhead. Thus, it waits either for a CH_Wel or for a CH_NWel.
When the entry node does receive neither CH_Wel nor CH_NWel . If this persists for certain number of attempts, the
node declares itself as an isolated node, and restarts by broadcasting a new Join_Request after a period of time. Just the
clusterheads may response by a CH_Wel or CH_NWel ; the ordinary members have to ignore any Join_Request received
even if they are in the transmission range of the new entry node. This allows simplifying the management of the clusters.
4. Comparison
The summarization of the techniques is shown in the Table below .As we can see the algorithms described above
are variations of the weighted clustering algorithm .
Table 1: Comparison of the Techniques
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
22
5. CONCLUSION
Clustering will offer an efficient way to organize a outsized MANET for routing. It brings attention to important
components relating to routing operations, network management, mobility management, quality of service support etc.
Many vital problems where found with clustering such as steadiness of cluster structure, the management overhead of
cluster construction and maintenance, the energy consumption of mobile nodes with totally different cluster-related
status, the traffic load distribution in clusters, and finally the fairness of serving as cluster heads for a mobile node. In
addition different weight based schemes have their own role in the clustering structures .Selecting appropriate cluster
head is one of the main research issues. Therefore, in this paper, we compared multiple metric based weighted clustering
algorithms.
REFERENCES
[1] Mainak Chatterjee, Sajal K. Das, and Damla Turgut, “WCA: A Weighted Clustering Algorithm for Mobile Ad
Hoc Networks”, Cluster Computing, Vol. 5, No. 2, pp. 193-204, April 2002.
[2] AbdelRahman Hussein, Sufian Yousef, Samir Al-Khayatt, Omar S. Arabeyyat, “An Efficient Weighted
Distributed Clustering Algorithm for Mobile Ad hoc Networks” , 978-1-4244-7042-6/10 ©2010 IEEE
[3] Wojciech Bednarczyk, Piotr Gajewski1,” An Enhanced Algorithm for MANET Clustering Based on Weighted
Parameters”, Universal Journal of Communications and Network 1(3): 88-94, 2013
[4] S.Karunakaran And Dr.P.Thangaraj , “An Adaptive Weighted Cluster Based Routing (AWCBRP) Protocol for
Mobile Ad-hoc Networks” ISSN: 1109-2742 Issue 4, Volume 7, April 2008
[5] S.Rohini, K.Indumathi, “Consistent Cluster Maintenance Using Probability Based Adaptive Invoked Weighted
Clustering Algorithm in MANETs”, Proceedings of the National Conference on Innovations in Emerging
Technology-2011C. M. Teng, ―Correcting noisy dataǁ, Proceedings of the Sixteenth International Conference on
Machine Learning, pp 239-248, 1999.
[6] S.Muthuramalingam, R.RajaRam, Kothai Pethaperumal and V.Karthiga Devi , “A Dynamic Clustering Algorithm
for MANETs by modifying Weighted Clustering Algorithm with Mobility Prediction”, International Journal of
Computer and Electrical Engineering, Vol. 2, No. 4, August, 2010
[7] Likun Zou, Qishan Zhang, Jianwei Liu, “An Improved Weight-Based Clustering Algorithm in MANETs”,
978-1-4244-2108-4/08/$25.00 © 2008 IEEE
[8] Mohammad Shayesteh and Nima Karimi, “An Innovative Clustering Algorithm for MANETs Based on Cluster
Stability”, International Journal of Modeling and Optimization, Vol. 2, No. 3, June 2012.
[9] Mohanaradhya, Sumithra Devi K A and Andhe Dharani, “Distance Based Cluster Head Section in Sensor
Networks for Efficient Energy Utilization”, International Journal of Advanced Research in Engineering &
Technology (IJARET), Volume 4, Issue 1, 2013, pp. 50 - 58, ISSN Print: 0976-6480, ISSN Online: 0976-6499.

More Related Content

What's hot

A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...csandit
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...eSAT Publishing House
 
Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...eSAT Publishing House
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...ijsrd.com
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
 

What's hot (16)

A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
D031202018023
D031202018023D031202018023
D031202018023
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
C04511822
C04511822C04511822
C04511822
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
Connected Dominating Set Construction Algorithm for Wireless Sensor Networks ...
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
 

Viewers also liked

The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...
The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...
The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...Timothy Duckett
 
Comparison of therapist to patient judgment bias in low vision
Comparison of therapist to patient judgment bias in low visionComparison of therapist to patient judgment bias in low vision
Comparison of therapist to patient judgment bias in low visionGuy Davis
 
Online framework for video stabilization
Online framework for video stabilizationOnline framework for video stabilization
Online framework for video stabilizationIAEME Publication
 
Husky Pensions for Newbies
Husky Pensions for NewbiesHusky Pensions for Newbies
Husky Pensions for NewbiesHusky Finance
 
Crowdfunding for Sustainable Entrepreneurship and Innovation
Crowdfunding for Sustainable Entrepreneurship and InnovationCrowdfunding for Sustainable Entrepreneurship and Innovation
Crowdfunding for Sustainable Entrepreneurship and InnovationCrowdsourcing Week
 

Viewers also liked (10)

The Monarch School and Institute - About
The Monarch School and Institute - AboutThe Monarch School and Institute - About
The Monarch School and Institute - About
 
SAURABH RESUME
SAURABH RESUMESAURABH RESUME
SAURABH RESUME
 
The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...
The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...
The Well-EQUIPped Classroom: Using the Electronic Quality of Inquiry Protocol...
 
Comparison of therapist to patient judgment bias in low vision
Comparison of therapist to patient judgment bias in low visionComparison of therapist to patient judgment bias in low vision
Comparison of therapist to patient judgment bias in low vision
 
Online framework for video stabilization
Online framework for video stabilizationOnline framework for video stabilization
Online framework for video stabilization
 
5989 8541 es
5989 8541 es5989 8541 es
5989 8541 es
 
Husky Pensions for Newbies
Husky Pensions for NewbiesHusky Pensions for Newbies
Husky Pensions for Newbies
 
Tecnicas de recoleccion de datos
Tecnicas de recoleccion de datosTecnicas de recoleccion de datos
Tecnicas de recoleccion de datos
 
Introduction of GS Caltex_2015
Introduction of GS Caltex_2015Introduction of GS Caltex_2015
Introduction of GS Caltex_2015
 
Crowdfunding for Sustainable Entrepreneurship and Innovation
Crowdfunding for Sustainable Entrepreneurship and InnovationCrowdfunding for Sustainable Entrepreneurship and Innovation
Crowdfunding for Sustainable Entrepreneurship and Innovation
 

Similar to A survey on weighted clustering techniques in manets

Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...csandit
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 

Similar to A survey on weighted clustering techniques in manets (20)

F017123439
F017123439F017123439
F017123439
 
I04503075078
I04503075078I04503075078
I04503075078
 
O0106395100
O0106395100O0106395100
O0106395100
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
1909 1913
1909 19131909 1913
1909 1913
 
1909 1913
1909 19131909 1913
1909 1913
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
20320130406029
2032013040602920320130406029
20320130406029
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
B045070510
B045070510B045070510
B045070510
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

A survey on weighted clustering techniques in manets

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 15 A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS Aswathy P Sreevatsan, Diya Thomas 1, 2 (Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kakkanad, India) ABSTRACT Ad hoc networks are dynamic in nature due to the mobility of nodes. The routing in ad-hoc networks is a tedious process because of the link breakage between the mobile nodes. Clustering is the process of grouping the nodes into different groups known as clusters. A cluster head is a node present in the geographical region of the cluster and takes care of the routing and allocation of resources for the cluster members. Nodes that have registered with the cluster head become members of the cluster. The cluster heads form a dominant set in the network. After clustering the path between any two nodes is explored between the cluster heads of the cluster which they belong to. Thus the path consists of only cluster heads. This leads to long lived paths between any two nodes. The association and dissociation of nodes to and from clusters perturb the stability of the network topology, and hence a reconfiguration of the system is often unavoidable. However, it is vital to keep the topology stable as long as possible. This paper analyses some of the existing weighted clustering algorithms in MANETS. Keywords: Clustering, Cluster Head Selection, MANETs, Weighted Clustering. 1. INTRODUCTION Clustering is the technique that aggregates nodes into groups to make network management easier. The network is divided into a number of clusters and each cluster has a cluster head that monitors the cluster. Nodes play completely different roles in clustering techniques and there are 3 kinds of nodes a. Ordinary nodes b. Cluster head c. Cluster gateways nodes Cluster head nodes: Cluster head is a support or backbone to sustain all essential control functions. The function of cluster heads is internal node communication, to forward inter cluster messages. Cluster gateway Nodes: A node is called a gateway if it lies within the transmission range of two or more cluster heads. Gateway nodes are generally used for routing between clusters. Ordinary nodes (cluster member): They are members of the cluster and does not have any specific function. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 15-22 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 16 The Fig. below illustrates the different types of nodes and cluster structure. Fig.1: Cluster structure 2. CATEGORIES OF CLUSTERING The clusters may change dynamically due to the movement of nodes. A number of methods have been proposed to choose cluster heads in ad hoc networks. They include (i) Highest-Degree heuristic, (ii) Lowest-ID heuristic, and (iii) Node-Weight heuristic. 2.1. Highest-Degree heuristic The Highest-Degree, also known as connectivity-based clustering is a clustering algorithm in which the degree of a node is computed based on its distance from others. Each node broadcasts its id to the nodes that are within its transmission range. A node x is considered to be a neighbour of another node y if x lies within the transmission range of y. Cluster head will be the node with maximum number of neighbours and any tie is broken by the unique node ids. The neighbours of a cluster head become members of that cluster and can no longer participate in the election process. Any two nodes in a cluster are at most two-hops away since the cluster head is directly linked to each of its neighbours in the cluster. Basically, each node either becomes a cluster head or remains an ordinary. Experiments demonstrate that the system has a low rate of cluster head change but the throughput is low under the Highest-Degree heuristic. The re- affiliation counts of nodes are high due to node movements and as a result, the highest-degree node may not be re-elected to be a cluster head even if it loses one neighbour. All these drawbacks occur because this approach does not have any restriction on the upper bound on the number of nodes in a cluster. 2.2. Lowest-ID heuristic The Lowest-ID, also as known as identifier-based clustering, is a heuristic that assigns a unique id to each node and chooses the node with the minimum id as a cluster head. Thus, the ids of cluster head will be lesser than that of the neighbours of the cluster head. However, the cluster head can delegate its responsibility to the next node with the minimum id in its cluster. For this heuristic, the system performance is better compared with the Highest-Degree heuristic in terms of throughput. However, the drawback of this heuristic is its bias towards nodes with smaller ids which may lead to the battery drainage of certain nodes. Moreover, it does not attempt to balance the load uniformly across all the nodes. 2.3. Node-Weight heuristic In this approach, each node is assigned weights based on its suitability of being a cluster head depending upon a parameter (eg. mobility). A node is chosen to be a cluster head if its weight is higher than any of its neighbours’ weight; otherwise, it joins a neighbouring cluster head. The smaller node id is chosen in case of a tie. Results proved that the number of updates required is smaller than the Highest-Degree and Lowest-ID heuristics. Since node weights were varied in each simulation cycle, computing the cluster heads becomes very expensive and there are no optimizations on the system parameters such as throughput and power control. 2.4. Limitations of existing heuristics None of the above three heuristics leads to an optimal election of cluster heads since each deals with only a subset of parameters which can possibly impose constraints on the system. Each of these heuristics is suitable for a
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 17 specific application rather than for arbitrary wireless mobile networks. Thus weighted clustering algorithm was introduced to compute node weights taking different factors into consideration. 3. LITERATURE SURVEY 3.1 Weighted Clustering Algorithm (WCA) [1] WCA take into account node’s degree, transmission power, mobility and battery power to select a cluster head. WCA combines each of these four parameters with certain weighing factors chosen according to the system needs. The flexibility of changing the weight factors helps to apply the algorithm to various networks. The output of cluster head election procedure is a set of nodes called the dominant set. Let the number of nodes that a cluster head can handle ideally be δ. This is to ensure that cluster heads are not over-loaded and the efficiency of the system is maintained at the expected level. The procedure consists of eight steps as described below. Step 1. Find the neighbours of each node v (i.e., nodes within its transmission range txrange) within vertex set V, which defines its degree, dv, as : (1) Step 2. Compute the degree-difference, ∆v = |dv − δ|, for every node v. Step 3. For every node, compute the sum of the distances, Dv, with all its neighbours, as : (2) Step 4. Compute the running average of the speed for every node till current time T . This gives a measure of mobility and is denoted by Mv, as : (3) where (Xt, Yt ) and (Xt−1,Yt−1) are the coordinates of the node v at time t and (t − 1), respectively. Step 5. Compute the cumulative time, Pv, during which a node v acts as a cluster head. Pv implies how much battery power has been consumed which is assumed more for a cluster head than an ordinary node. Step 6. Calculate the combined weight Wv for each node v : Wv = w1∆v + w2Dv + w3Mv + w4Pv (4) Where w1,w2,w3 and w4 are the weighing factors for the corresponding system parameters. Step 7. Choose that node with the smallest Wv as the cluster head. All the neighbours of the chosen cluster head are no longer allowed to participate in the election procedure. Step 8. Repeat steps 2–7 for the remaining nodes not yet selected as a cluster head or assigned to a cluster. 3.2 CBDM [2] New weighted distributed clustering algorithm, called CBMD takes into consideration the parameters: connectivity (C), residual battery power (B), average mobility (M), and distance (D) of the nodes to choose locally optimal cluster heads. The goals of this algorithm are maintaining stable clustering structure with a lowest number of clusters formed, to minimize the overhead for the clustering formation and maintenance and to maximize the lifespan of mobile nodes in the system. The algorithm is an extended version of Weighted Clustering Algorithm (WCA). The main feature of this algorithm is that each mobile node starts to measure its weight after n successive ‘hello messages’, where the result specifies the accurate value for the mobility and battery power. The nodes with the largest local weights are elected as cluster heads. As the nodes have various battery powers to start with, a more accurate metric to measure the power currently available at the node was also introduced.
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 18 a. Connectivity Metric (C) The first parameter is the connectivity. Neither nodes with the highest connectivity nor the lowest should be elected as cluster heads. This gives a measure of connectivity and is denoted by C, as: (5) Let N be the number of nodes in the system. Let Li,j(t) be the indication that whether node i is a neighbor of node j, at time t. Where Li,j(t)=0 if node i is not a neighbour of node j at time t, Li,j(t)=1 If node i is a neighbour of node j at time t. b. Residual Battery power metric (RBP) The second parameter is the residual battery power. a node with high residual battery power can perform well as cluster head for a longer duration. c. Average mobility metric (M) The third parameter is the average mobility of the node. Each node i measures its own average mobility M . This is achieved through contrasting the topology information it obtains during successive Hello messages (HMs). Mobile nodes maintain a short ‘Neighbourhood Record Table’ (NRT). NRT rows comprise vectors representing the IDs of neighboring nodes, where each NRT row refers to different HM. d. Distance metric (D) The fourth parameter is the distance between node and other nodes within transmission range. It’s better to elect a cluster head with the nearest members. For a node i, D is computed as the cumulative mean square distance to neighbours divided by the total number of neighbours. The above parameters are then normalized and the combined weight W for each node i is: W= W1Cn+W2Bn+W3Dn+W4Mn (6) Where W1+W2+W3+W4<=1 and Cn, Bn, Dn, Mn are the normalized parameters and i is the ID number of node 1<=i<=N. A node with the highest weight is the best candidate for a cluster head. 3.3 Enhanced algorithm based on WCA [3] This clustering algorithm is also based on node degree, received power level, stationary factor and remaining time battery. Each node in a MANET broadcasts its initial ch_info message periodically to declare its existence. The ch_info message of a node carries its address, fitness, address of Cluster Head and node state. Thus, each node can obtain information about its neighbors by its received ch_info message. Next, nodes with the highest fitness will be elected as Cluster Heads. The clustering algorithm is two stages procedure. The first one is the nomination stage and the second one is the election stage. Each node after sending initial message calculate its fitness. The fitness (F) is the weight function of few parameters, like degree of the node, received power level, stationary factor and battery level. This parameter is calculated using the formula: (7) and W1, W2, W3, W4 are weighting factors for the corresponding system parameters where: λ Degree of the node (DG) λ The received power level (PR) λ Stationary factor (SF) λ Battery level (BL) These factors should be fulfil the following condition w1+w2+w3+w4=1 All values obtained above are normalized in the range (0,1). The cluster is created by the nodes within one-hop distance. Among nodes within transmission range are selected nodes with the highest fitness. These nodes are nominated nodes and they change their status to NOMINATED. The nomination stage is complete. The next stage is election stage.
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 19 During election stage final cluster heads are selected, the nodes change their status to SELECTED and the selection is advertised. The main disadvantage of this method is that there is no guarantee that the messages sent will reach the other nodes. 3.4 AWCBRP – An Adaptive Weighted Cluster Based Routing Protocol [4] Here the cluster head selection is performed by assigning a weight value based on the factors Energy Level, Connectivity and Stability. From time to time every node sends a beacon called Alive Beacon (AB). Time stamp and NODE ID field are present in AB. The neighbour data table (NDT) is checked by the nodes that hear AB. A new entry is created for the sender of AB when there is no entry with AB’s NODE ID it creates a new entry for the sender of AB, AB sets it’s AT field to zero and initiates a timer. Earlier to expiration of timer, if the NODE ID received in AB is same, it sets AT corresponding to that node to 1 and restarts the timer. The corresponding entry in the NDT is removed. ABs are not forwarded. Before the arrival of AB node if a timer expires the following node is considered to have moved and the CH is informed about this. Cluster head Beacon (CHBs) is heard by every node. There are four possible cases: a. The CH and the node are inside the cluster when a CHB is heard. b. When a node listens to one more cluster’s CHB with its CHB, then it inserts the CH ID of the former’s CHB in a gateway table (GT). If within a specified period of time (GETTHRESHOLD) it hears both the CHBs once again, it affirms itself as the gateway between these two clusters by sending a “gateway assert”(GA) packet to both the CHs. A GT is checked by CH when it receives GA packet and looks for other gateway. i) GA is affirmed of the absence of another gateway by registering the gateway’s NODE ID in its GT and a “gateway registered” packet. ii) When a cluster has a gateway entry the hop count of the current gateway is compared with the GA sender by the CH .When the hop count of the GA is less than CH a “gateway registered “ packet is sent to the GA after CH is deregistered. Otherwise GA packet is ignored. The GA packet is not sent for a particular period of time and the process is repeated again. c. It register’s with the cluster using a “register me” packet when it hears the CHB of that cluster. The table of nodes which are available in the cluster of the CH is updated and a “registered packet” is sent to the node. d. If no CHB is heard two possibilities happen i) The node moves from the cluster. ii) When CH moves to a considerable distance the nodes start the cluster formation phase once again by reversing for a random time interval. Cluster heads are selected based on the following weighted sum : (8) Where D1 is the power level of the node , D2 is the connectivity factor and D3 is the stability index and W1,W2 and W3 are the weighting factors. Cluster head has the least W value. After the node is formed as a cluster head, the node or the members of the node will be discerned as “considered". Every “unconsidered” node undergoes the election process. After the selection of “considered nodes” the election algorithm will be terminated. 3.5 PAIWCA – Probability Based Adaptive Invoked Weighted Clustering Algorithm [5] In PAIWCA each node computes its weight value based on the following parameters: a) Mobility of the node: Calculate the average speed for every node until the current time T. This gives the measure of the mobility Mv. b) Power consumed: Determine how much battery power has been consumed, Pv. This is assumed to be more for a cluster-head when compared to an ordinary node c) Transmission Rate: Determine the transmission rate for each node at Tx. This is assumed to be high for a cluster-head. d) Transmission Range: Transmission range for each node (Tr) is calculated independently for each node. e) Cluster head probability of node(Chprob). The weight Wv for each node is calculated independent of the neighbours and the clusters, using the parameters:
  • 6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 20 Wv=(w1 x Tr)+ (w2 x Tx) + (w3 x Mv) + (w4 x Pv) - Chprob. (9) Once the weights of the nodes are calculated before the clustering setup, the node with minimum weight is chosen to be the cluster-head and its neighbours are no longer allowed to participate in the election procedure. All the above steps are repeated for remaining nodes which is not yet elected as a cluster-head or assigned to a cluster. One disadvantage of WCA is that the clustering algorithm is called on new nodes arrival, which increases the overhead of re- clustering process and the cluster becomes unstable. To avoid this and to increase cluster stability, a probability based approach using Cluster-Head Probability of a node. If a newly arrived node has higher probability than the existing cluster head of a cluster to which it wishes to join, then the newly arrived node becomes the cluster-head for that cluster without disrupting the entire topology which increases the stability of the network. If the newly arrived node has lower probability than the existing cluster-head of the cluster to which it wishes to join then it becomes the member of that cluster-head . 3.6 A dynamic clustering algorithm with mobility prediction [6] This algorithm propose to reduce the overhead in communication by predicting mobility of node using linear auto regression and cluster formation. Initially, each node broadcasts a beacon message to notify its presence to the neighbours. A beacon message contains the state of the node. Each node builds its neighbour list based on the beacon messages received. The cluster-heads .Election is based on the weight values of the nodes and the node having the lowest weight is chosen as CH. Each node computes its weight value based on the following algorithm: Step 1: Decide the weights Step 2: Compute the weight of each node, given by: (10) Where ∆sp is the spreading degree, Dv is the distance with its neighbours, Mv is the mobility of the node, and power consumed is represented by Pv . Step 3: The node with the smallest Wv is elected as a cluster-head. All the neighbours of the chosen cluster-head are no more allowed to participate in the election procedure. The Concept of Linear Auto Regression is, given a time series of data, the autoregressive (AR) models is a tool for understanding and predicting future values in this series. It is used in statistics and signal processing. For i = 1…P : (11) Where Xτ is the predicted value at time τ based on the average rate of change of the previous values. N is the total number of differences calculated. The value of i and j are 1 and 2 respectively. Using the regression technique a time series data about the previous position of the node are analyzed and the next value in the series is predicted. Using this predicted value the cluster calculation is done. It was found that the cluster formed with predicted values and actual values are the same and thus the power of the mobile node can be saved if we use prediction calculation and avoid the beacon signals between mobile node and its Cluster-Head to get the geographical position of the node. Bandwidth that must be utilized for data transfer is also saved in this case. A stable cluster topology is thus obtained. 3.7 IWCA – Improved Weighted Clustering Algorithm [7] The IWCA algorithm enhance the trust of cluster formation by malicious node removal from cluster head or member selection .Initially, each node broadcasts a beacon message to notify its presence to the neighbours. A beacon message contains the state of the node. Every node builds its neighbour list based on the beacon messages received. The cluster-heads election is based on the weight values of the nodes and the node having the lowest weight is chosen as CH. Every node calculates the following: a. PDR(Packet Data Rate)-PDR= (Number of Packet's Dropped)/ (Total Number of Incoming Nodes) b. PMOR (Packet Modification Rate)- PMOR= (Number of Packet's Modified)/ (Total Number of Incoming Nodes) c. PMIR(Packet Misroute Rate)- PMIR= (Number of Packet's Misrouted)/ (Total Number of Incoming Nodes)
  • 7. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 21 Then for each node, check threshold value of PDR, PMR and PMIR. Assign behaviour to node according threshold value as malicious or normal .Calculate weight for each node by: W = (a x Nv) + (b x Pv) + (c x Sv) + (d xDv) (12) where Nv =list of neighbours for every node until the current time T of the node v at instant t, Pv =The amount of remain battery power. Assumed to be more for a cluster-head when compared to an ordinary node , Sv =speed of movement of a node, Dv =Direction of movement of a node . 3.8 An Innovative Clustering Algorithm Based on Cluster Stability [8] The goal of this algorithm is to decrease the number of cluster forming, maintain stable clustering structure and maximize lifespan of mobile nodes in the system. The used parameters in weighted function for giving a weight to nodes include: • Relative speed (RS) • Battery remaining (Br) • Number of nodes moving towards a node (Ndm) • Stability(S) Each node uses the above mentioned four parameters to calculate its weight : (13) ci(s) are the weight factors of normalization. This algorithm describes how to include a newly arrived node. Once a wireless node is activated, its idCH field is equal to NULL since it does not belong to any cluster. The node continuously monitors the channel until it figures out that there is some activity in its neighborhood. This is due to the ability to receive the signals from other present nodes in the network. The node still has no stable state, thus its state is not full identified. In this case, it broadcasts a Join_Request in order to join the most powerful clusterhead. Thus, it waits either for a CH_Wel or for a CH_NWel. When the entry node does receive neither CH_Wel nor CH_NWel . If this persists for certain number of attempts, the node declares itself as an isolated node, and restarts by broadcasting a new Join_Request after a period of time. Just the clusterheads may response by a CH_Wel or CH_NWel ; the ordinary members have to ignore any Join_Request received even if they are in the transmission range of the new entry node. This allows simplifying the management of the clusters. 4. Comparison The summarization of the techniques is shown in the Table below .As we can see the algorithms described above are variations of the weighted clustering algorithm . Table 1: Comparison of the Techniques
  • 8. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 22 5. CONCLUSION Clustering will offer an efficient way to organize a outsized MANET for routing. It brings attention to important components relating to routing operations, network management, mobility management, quality of service support etc. Many vital problems where found with clustering such as steadiness of cluster structure, the management overhead of cluster construction and maintenance, the energy consumption of mobile nodes with totally different cluster-related status, the traffic load distribution in clusters, and finally the fairness of serving as cluster heads for a mobile node. In addition different weight based schemes have their own role in the clustering structures .Selecting appropriate cluster head is one of the main research issues. Therefore, in this paper, we compared multiple metric based weighted clustering algorithms. REFERENCES [1] Mainak Chatterjee, Sajal K. Das, and Damla Turgut, “WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks”, Cluster Computing, Vol. 5, No. 2, pp. 193-204, April 2002. [2] AbdelRahman Hussein, Sufian Yousef, Samir Al-Khayatt, Omar S. Arabeyyat, “An Efficient Weighted Distributed Clustering Algorithm for Mobile Ad hoc Networks” , 978-1-4244-7042-6/10 ©2010 IEEE [3] Wojciech Bednarczyk, Piotr Gajewski1,” An Enhanced Algorithm for MANET Clustering Based on Weighted Parameters”, Universal Journal of Communications and Network 1(3): 88-94, 2013 [4] S.Karunakaran And Dr.P.Thangaraj , “An Adaptive Weighted Cluster Based Routing (AWCBRP) Protocol for Mobile Ad-hoc Networks” ISSN: 1109-2742 Issue 4, Volume 7, April 2008 [5] S.Rohini, K.Indumathi, “Consistent Cluster Maintenance Using Probability Based Adaptive Invoked Weighted Clustering Algorithm in MANETs”, Proceedings of the National Conference on Innovations in Emerging Technology-2011C. M. Teng, ―Correcting noisy dataǁ, Proceedings of the Sixteenth International Conference on Machine Learning, pp 239-248, 1999. [6] S.Muthuramalingam, R.RajaRam, Kothai Pethaperumal and V.Karthiga Devi , “A Dynamic Clustering Algorithm for MANETs by modifying Weighted Clustering Algorithm with Mobility Prediction”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 4, August, 2010 [7] Likun Zou, Qishan Zhang, Jianwei Liu, “An Improved Weight-Based Clustering Algorithm in MANETs”, 978-1-4244-2108-4/08/$25.00 © 2008 IEEE [8] Mohammad Shayesteh and Nima Karimi, “An Innovative Clustering Algorithm for MANETs Based on Cluster Stability”, International Journal of Modeling and Optimization, Vol. 2, No. 3, June 2012. [9] Mohanaradhya, Sumithra Devi K A and Andhe Dharani, “Distance Based Cluster Head Section in Sensor Networks for Efficient Energy Utilization”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 1, 2013, pp. 50 - 58, ISSN Print: 0976-6480, ISSN Online: 0976-6499.