SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
308
CLUSTERING BASED PERFORMANCE IMPROVEMENT STRATEGIES
FOR MOBILE AD-HOC NETWORK
Mr. Rahul A Jichkar1
, Dr. M.B.Chandak2
1
M.Tech Scholar, CSE Department, SRCOEM, Nagpur, India
2
Associate Professor and Head, CSE Department, SRCOEM, Nagpur, India
ABSTRACT
Mobile Ad hoc Networks (MANETs) consist of a large number of relatively low-powered
mobile nodes communicating in a network using radio signals. Clustering is one of the techniques
used to manage data exchange amongst interacting nodes. Each group of nodes has one or more
elected Cluster head(s)(CH), where all Cluster heads are interconnected for forming a
communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining
communication with limited energy sources for longer period of time. Misbehaving nodes and cluster
heads can drain energy rapidly and reduce the total life span of the network. According to that, this
paper presents reviews of most clustering techniques that improves the power conservation in
mobile ad hoc network and increase the battery usage in ad hoc wireless network devices and
conserve the power energy consumption.
Keywords : Mobile ad-hoc networks, Clustering, clusterhead, gateway.
1. INTRODUCTION
In an ad hoc network, mobile nodes communicate with each other using multihop wireless
links. The infrastructure is completely is dynamic; for instance, there are no base stations. Each
node in the network also acts as a router, forwarding data packets for other nodes. A research
issue in the design of ad hoc networks is the development of dynamic routing protocols that can
efficiently find routes between two communicating nodes. The routing protocol must be able to
keep pace with the high degree of node mobility that often changes the network topology.Also,
nodes heterogeneity must be taken in to account, since nodes may have variety of available
resources, and this produces different level in their roles within the network. The Solution for
nodes heterogeneity is the Cluster-Based Routing which also limits the amount of routing
information that propagates inside the network. The concept behind clustering is to divide the
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 4, July-August (2013), pp. 308-314
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
309
network nodes into a number of overlapping clusters. This gives clustering the ability to make a
hierarchical routing in which paths are recorded between clusters instead of between nodes. The
remaining part of this paper shows briefing about the clustering concepts and in later sections it
shows some clustering algorithms that applied in MANETs.
2. CONCEPT OVERVIEW
Most of the researchers defined Mobile Ad Hoc Networks (MANETs) as a self-configuring
network platform of mobile computing devices connected by wireless links. Towards this, many
challenges appear to face this kind of network, such as route discovery and maintenance. Almost, all
devices in mobile ad hoc networks has same prosperities i.e. usage, batteries, power consumption
with respect to transmission range, type of application running on each device, location,etc, all make
power usage as standard factor that specify the device lifetime which indicate the overall
network lifetime. Since, MANET operates on either rechargeable or replaceable batteries. Even
though it must works with respect to the absence of infrastructure that come from the type of
applications which make the construction of this kind of network an important issue [1], [2]. Some
concept reduced the energy consumption level by providing routing Discovery process with
single path in MANET as mentioned on DSR (Dynamic Source Routing)[3] and AODV (Ad-hoc
On Demand Distance Vector Routing)[4], even though others focus on multi-path outing protocol as
modeled in AODVM [5]. On the contrary, clustering technique is one of the most important
techniques that used to provide resource management in MANET [6]. Also, it influences the usage
of energy in this kind of network.
3. CLUSTER HEAD SELECTION
The feasibility of a clustering method can be primarily determined by the complexity
of the cluster head selection. Optimizing the cluster head selection allows for the network to
be more efficient by minimizing the signaling overhead while ensuring that the network
connectivity is maintained despite topology changes. In this paper, we investigate the problems
of cluster head selection for large and dense MANETs. Two variants of the cluster head selection are
examined: (1) the distance-constrained selection where every node in the network must be
located within a certain distance to the nearest cluster head; and (2) the size-constrained
selection where each cluster is only allowed to have a limited number of members.
4. CLUSTERING TECHNIQUES IN MANET
The most popular method that developed to provide resource management over mobile ad
hoc networks is clustering. This technique based on partitioning the network in smaller and
manageable groups each group called cluster [6]. Clustering offers several benefits when it used
with MANETs listed as following:
1. Enhances routing process and mobility.
2. Stabilizes dynamic network topology
3. Helps to perform more efficient resource allocation
4. Provides hierarchical routing architecture.
This techniques dividing nodes of a self-organized network like MANET into a number of
disjointed or overlapped clusters[7],[8]. Thereby, cluster based network defines three types of
node in MANET as shown in Fig. 1 and defined as follows:
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
310
1) Cluster Head: can defined as a local coordinator for its cluster. It performs inter-cluster
routing, data forwarding and many other operations.
2) Gateway: is a node that can access neighboring cluster and forward information between
clusters.
3) Cluster Member or Ordinary Node: is the one neither a Cluster Head nor Gateway.
Fig. 1 Cluster heads, Gateways and ordinary nodes in MANET
Clustering techniques is designed by defining structural partitioning of nodes inside particular
network as shown in fig.1. This mean; for particular network, the nodes will grouped to define set of
clusters based on specific techniques to specify:
1. Cluster formation phase.
2. Cluster maintenance phase.
Regarding to clustering concepts in MANET, one node must be elected as a special node or
incharge node called Cluster Head (CH) which provides virtual infrastructure for particular cluster.
Hence, remaining nodes will be referred as Ordinary Nodes (CN) except Cluster Gateways (CG)
which are the nodes that act as shared nodes between more than one cluster. All of these agreed that
the clustering formation and maintenance phases are very important concepts in power consumption
enhancement for MANETs. Some of the techniques are briefly described in the following
subsections :
4.1 LOWEST-ID CLUSTERING
The Lowest-ID as shown in fig. 2 is considered as a simplest clustering scheme algorithm [9].
In this scheme unique identifier (ID) is assigned to each node. All nodes recognize its neighbors ID
and CH is chosen according to minimum ID. Thus, the nodes IDs of the neighbors of the CH will be
higher than that CH. The main drawback with this scheme is; there is no limitation to the number of
nodes attached to the same CH. Also, CHs are prone to power drainage due to serving as cluster
heads longer period of time.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
311
Fig. 2 Lowest ID Clustering Technique
4.2 HIGHEST DEGREE CLUSTERING
In comparison with Lowest-ID scheme, the degree of nodes is computed based on its distance
from each other’s [10]. All nodes flood its connectivity value within their transmission range. Thus, a
node decides to become a CH or remain as CN by comparing the connectivity value of its neighbours
with its own value. Node with highest connectivity value in its vicinity will become CH as shown in
Fig. 3. Connectivity-based clustering follows the same circumstances of ID-based regarding to
cluster size and performance degradation.
Fig. 3 Highest Degree Clustering Technique
4.3 LEAST CLUSTERING CHANGE ALGORITHM (LLC)
LLC has an important improvement over Lowest-ID and Highest-Degree Clustering
Algorithms [11]. Since most of algorithms require performing procedure of clustering periodically to
satisfy specific characteristics of CHs, the cost of cluster maintenance must be taken into account. In
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
312
Highest-Degree Clustering, the algorithm is performed to check the local highest node degree
periodically as it specifies the aspect of CH election. Thus, current CH will force to hand over its
roles if it finds any member node with higher degree. Frequent re-clustering involved by this
mechanism. In contrast, LLC clustering algorithm is divided into two phases:
1. Cluster formation.
2. Cluster maintenance.
The first phase simply applied as Lowest-ID algorithm by choosing mobile nodes
with Lowest-ID in their neighborhoods as CHs. But, cluster maintenance is performed as event-
Driven and called only under two circumstances; first, when a node can’t access any CH. Thus, it
call cluster formation phase to rebuilds the cluster structure according to Lowest-ID techniques.
Second, when more than one node reaches the transmission range of each other, this
requires giving up CH roles except only one which become a CH. Hence, LLC significantly
enhances clustering and increase its stability in mobile ad hoc network by releasing the
requirement that a CH should reserve some special features and characteristics within its local
area.
4.4 TRUST-BASED CLUSTERING TECHNIQUE
In [12] a trust based approach for Cluster head (TA) selection algorithm. Each cluster is
nothing but a group of nodes which is headed by one or more node(s) known as Cluster
head(s)(TAs).In this proposal Cluster head is elected by the member nodes in order to make the TA
more stable depending upon some metrics. The Cluster head(s) selection is totally distributed and
secured. The challenges can be handled by formalizing a trust relationship between the participating
nodes within 1 hop distance away. To formalize the trust of a particular node, nodes monitor the
behavior of other nodes and collect information from its neighbors and then take the decision about
the node. We have used a quantitative trust evaluation algorithm at each node to evaluate the direct
trust of its neighbor nodes.
Fig. 4 Node-based Secured Interactions
The Node-based Trust Management(NTM) (fig.4)scheme is based on a Clustered mobile
sensor network with backbone; it introduces a trust of a node within local management strategy with
help from the mobile agents running on each node. That is, a node’s trust-based information is stored
as a history on the node itself and managed by the local mobile agent of the node. However, there are
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
313
a couple of limitations in this approach. The way the messages passed through may overload the
Cluster head, creating a bottleneck due to additional message exchanges. Another possible limitation
is the way that the message authentication between intermediate Cluster heads are treated, where
there can be a delay in identifying a malicious neighboring node(s).
4.5 CLUSTERING BASED ON OUTLIER DETECTION MECHANISM
In this clustering technique we first determine whether all the nodes participating in the
cluster formation are trusted or not.To determine the malacious or dishonest nodes, we use the outlier
detection technique used in data mining which is based on linear method of deviation detection
[13].The objective of this indirect trust computation is to determine the trustworthiness of an
unfamiliar servic requester from the set of recommendations that narrow the gap between the derived
recommendation and the actual trustworthiness of the target service.
A dishonest recommendation is defined as an outlier that appears to be inconsistent with other
recommendations and has a low probability that it originated from the same statistical distribution as
the other recommendation in the data set. The algorithm uses a smoothing factor which detects
malicious recommendations by evaluating the impact on the dissimilarity metric by removing a
subset of recommendation classes from the set of recommendations.The node which is evaluated as
the most trusted node is selected as the cluster head (CH).
5. CONCLUSION
We have reviewed various clustering techinques,most of them provide performance
enhancement in Mobile Adhoc Network (MANET), the central theme of any algorithm is the
selection of the Cluster Head (CH),which facilitates the intra as well asinternetwork communication.
Also, the selection of the cluster head is quite critical task ,for this many CH selection algorithms
have been developed of which trust based selection scheme is an new area of research.
With this survey we can also observe that a cluster-based MANET has many important
issues to examine, such as the cluster structure stability, the control overhead of cluster
construction and maintenance, the energy consumption of mobile nodes with different cluster-
related status, the traffic load distribution in clusters, and the fairness of serving as clusterheads for a
mobile node.
6. REFERENCES
[1] J.-E. Garcia, A. Kallel, K. Kyamakya, K. Jobmann, J.-C. Cano, and P. Manzoni, A novel
DSR-based energy-efficient routing algorithm for mobile ad-hoc networks, presented at the
IEEE Vehicular Technology Conference, Florida, USA, 2003.
[2] N. Ghanem, S. Boumerdassi, and E. Renault, New energy saving mechanisms for mobile ad-
hoc networks using OLSR, in PE-WASUN '05 Proceedings of the 2nd
ACM international
workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks,
Canada, Oct. 2005, pp. 273-274.
[3] D. Johnson, D. Maltz, T. Imielinksi, and H. Korth, Dynamic source routing in ad hoc
wireless networks, in Mobile Computing, Kluwe, 1996, pp. 153-181.
[4] C. Perkins and E. Royer, Ad-Hoc on-Demand Distance Vector Routing, in Proceedings
WMCSA'99. 2nd Annual IEEE Workshop on Mobile Computing Systems and Applications,
New Orleans, 1999, pp. 90-100.
[5] I. I. Er and W. K. G. Seah, Mobility-based d-Hop Clustering Algorithm for Mobile Ad Hoc
Networks, presented at the Proceedings of IEEE Wireless Communications and Networking
Conference, Atlanta, Georgia, USA, Mar. 2004.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
314
[6] S. Sarkar, T. G. Basavaraju, and C. Puttamadappa, Ad Hoc Mobile Wireless Networks:
Principles, Protocols and Applications. New York: Auerbach Publications, 2007.
[7] Dr. Mohammad U. Bokhari , Hatem S. A. Hamatta and Shams Tabrez Siddigui, A Review of
Clustering Algorithms as Applied in MANETs , International Journal of Advanced Research
in Computer Science and Software Engineering, Volume 2, Issue 11, November 2012.
[8] Dr. Mahesh Motwani and Ratish Agarwal, Survey of clustering algorithms for MANET,
International Journal on Computer Science and Engineering Vol.1(2), 2009, 98-104
[9] M. Gerla and J. Tsai, Multicluster, mobile, multimedia radio network, ACM-Baltzer Journal
of Wireless Networks, vol. 1, pp. 255-265, 1995.
[10] A. Ephremides, J. E. Wieselthier, and D. J. Baker, A design concept for reliable mobile radio
networks with frequency hopping signaling, presented at the Proceedings of the IEEE, Jan.
1987.
[11] C.-c. Chiang, H.-K. Wu, W. Liu, and M. Gerla, Routing in Clustered Multihop, Mobile
Wireless Networks with Fading Channel, presented at the Proceeding IEEE Singapore
International Conference of Networks, SICON'97, Singapore, Apr. 1997.
[12] Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Trust-based
Cluster head Selection Algorithm for Mobile Ad hoc Networks, TRUSTCOM '11
Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in
Computing and Communications Pages 589-596.
[13] Naima Iltaf, Abdul Ghafoor and Uzman Zia, A mechanism for detecting dishonest
recommendation in indirect trust computation, EURASIP Journal on Wireless
Communications and Networking 2013.
[14] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained
Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2,
2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[15] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile
Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[16] Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of
Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc
Networks”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...IJCNCJournal
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringcsandit
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK ijsc
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
 
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKAN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKijwmn
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414IJRAT
 
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Associate Professor in VSB Coimbatore
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septianIAESIJEECS
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 

What's hot (16)

Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
 
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKAN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414
 
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 

Viewers also liked

Novel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsNovel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsIAEME Publication
 
Work stress a study on retail sector employees of jaipur
Work stress a study on retail sector employees of jaipurWork stress a study on retail sector employees of jaipur
Work stress a study on retail sector employees of jaipurIAEME Publication
 
Los amigos verdaderos
Los amigos verdaderosLos amigos verdaderos
Los amigos verdaderosolgarios
 
Rurouni Kenshin
Rurouni KenshinRurouni Kenshin
Rurouni KenshinGCUEVAJOEL
 
Klöckner & Co - Roadshow Presentation January 31, 2007
Klöckner & Co - Roadshow Presentation January 31, 2007Klöckner & Co - Roadshow Presentation January 31, 2007
Klöckner & Co - Roadshow Presentation January 31, 2007Klöckner & Co SE
 
Klöckner & Co - Roadshow Presentation November 2011
Klöckner & Co - Roadshow Presentation November 2011Klöckner & Co - Roadshow Presentation November 2011
Klöckner & Co - Roadshow Presentation November 2011Klöckner & Co SE
 
ο ηλεκτρονικός υπολογιστήςβ1
ο ηλεκτρονικός υπολογιστήςβ1ο ηλεκτρονικός υπολογιστήςβ1
ο ηλεκτρονικός υπολογιστήςβ1iliilischgr
 
Siosi comercio
Siosi comercioSiosi comercio
Siosi comercioader45
 
Tutorial de cómo crear una cuenta en facebook
Tutorial de cómo crear una cuenta en facebookTutorial de cómo crear una cuenta en facebook
Tutorial de cómo crear una cuenta en facebookEmanuel Cañate Jones
 

Viewers also liked (20)

Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Novel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsNovel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transforms
 
Work stress a study on retail sector employees of jaipur
Work stress a study on retail sector employees of jaipurWork stress a study on retail sector employees of jaipur
Work stress a study on retail sector employees of jaipur
 
1941 Dominion Provincial Conference
1941 Dominion Provincial Conference1941 Dominion Provincial Conference
1941 Dominion Provincial Conference
 
Solución 1 normal
Solución 1 normalSolución 1 normal
Solución 1 normal
 
Cetiex fundación centro_tecnológico_industrial_extremadura_2012
Cetiex fundación centro_tecnológico_industrial_extremadura_2012Cetiex fundación centro_tecnológico_industrial_extremadura_2012
Cetiex fundación centro_tecnológico_industrial_extremadura_2012
 
Daniela
DanielaDaniela
Daniela
 
Los amigos verdaderos
Los amigos verdaderosLos amigos verdaderos
Los amigos verdaderos
 
Clasificacio medios
Clasificacio mediosClasificacio medios
Clasificacio medios
 
Actividad 1 diana y yohenis (1)
Actividad 1 diana y yohenis (1)Actividad 1 diana y yohenis (1)
Actividad 1 diana y yohenis (1)
 
Rurouni Kenshin
Rurouni KenshinRurouni Kenshin
Rurouni Kenshin
 
Klöckner & Co - Roadshow Presentation January 31, 2007
Klöckner & Co - Roadshow Presentation January 31, 2007Klöckner & Co - Roadshow Presentation January 31, 2007
Klöckner & Co - Roadshow Presentation January 31, 2007
 
Klöckner & Co - Roadshow Presentation November 2011
Klöckner & Co - Roadshow Presentation November 2011Klöckner & Co - Roadshow Presentation November 2011
Klöckner & Co - Roadshow Presentation November 2011
 
ο ηλεκτρονικός υπολογιστήςβ1
ο ηλεκτρονικός υπολογιστήςβ1ο ηλεκτρονικός υπολογιστήςβ1
ο ηλεκτρονικός υπολογιστήςβ1
 
Siosi comercio
Siosi comercioSiosi comercio
Siosi comercio
 
Chin aby oppenheimer
Chin aby oppenheimerChin aby oppenheimer
Chin aby oppenheimer
 
2011 09 01_keynote
2011 09 01_keynote2011 09 01_keynote
2011 09 01_keynote
 
Tutorial de cómo crear una cuenta en facebook
Tutorial de cómo crear una cuenta en facebookTutorial de cómo crear una cuenta en facebook
Tutorial de cómo crear una cuenta en facebook
 
Presentación1
Presentación1Presentación1
Presentación1
 
Publisher
PublisherPublisher
Publisher
 

Similar to Clustering based performance improvement strategies for mobile ad hoc netwo

Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET Journal
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...rahulmonikasharma
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...Journal For Research
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 

Similar to Clustering based performance improvement strategies for mobile ad hoc netwo (20)

Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
40120130406013
4012013040601340120130406013
40120130406013
 
F017123439
F017123439F017123439
F017123439
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Clustering based performance improvement strategies for mobile ad hoc netwo

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 308 CLUSTERING BASED PERFORMANCE IMPROVEMENT STRATEGIES FOR MOBILE AD-HOC NETWORK Mr. Rahul A Jichkar1 , Dr. M.B.Chandak2 1 M.Tech Scholar, CSE Department, SRCOEM, Nagpur, India 2 Associate Professor and Head, CSE Department, SRCOEM, Nagpur, India ABSTRACT Mobile Ad hoc Networks (MANETs) consist of a large number of relatively low-powered mobile nodes communicating in a network using radio signals. Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s)(CH), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited energy sources for longer period of time. Misbehaving nodes and cluster heads can drain energy rapidly and reduce the total life span of the network. According to that, this paper presents reviews of most clustering techniques that improves the power conservation in mobile ad hoc network and increase the battery usage in ad hoc wireless network devices and conserve the power energy consumption. Keywords : Mobile ad-hoc networks, Clustering, clusterhead, gateway. 1. INTRODUCTION In an ad hoc network, mobile nodes communicate with each other using multihop wireless links. The infrastructure is completely is dynamic; for instance, there are no base stations. Each node in the network also acts as a router, forwarding data packets for other nodes. A research issue in the design of ad hoc networks is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. The routing protocol must be able to keep pace with the high degree of node mobility that often changes the network topology.Also, nodes heterogeneity must be taken in to account, since nodes may have variety of available resources, and this produces different level in their roles within the network. The Solution for nodes heterogeneity is the Cluster-Based Routing which also limits the amount of routing information that propagates inside the network. The concept behind clustering is to divide the INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 308-314 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 309 network nodes into a number of overlapping clusters. This gives clustering the ability to make a hierarchical routing in which paths are recorded between clusters instead of between nodes. The remaining part of this paper shows briefing about the clustering concepts and in later sections it shows some clustering algorithms that applied in MANETs. 2. CONCEPT OVERVIEW Most of the researchers defined Mobile Ad Hoc Networks (MANETs) as a self-configuring network platform of mobile computing devices connected by wireless links. Towards this, many challenges appear to face this kind of network, such as route discovery and maintenance. Almost, all devices in mobile ad hoc networks has same prosperities i.e. usage, batteries, power consumption with respect to transmission range, type of application running on each device, location,etc, all make power usage as standard factor that specify the device lifetime which indicate the overall network lifetime. Since, MANET operates on either rechargeable or replaceable batteries. Even though it must works with respect to the absence of infrastructure that come from the type of applications which make the construction of this kind of network an important issue [1], [2]. Some concept reduced the energy consumption level by providing routing Discovery process with single path in MANET as mentioned on DSR (Dynamic Source Routing)[3] and AODV (Ad-hoc On Demand Distance Vector Routing)[4], even though others focus on multi-path outing protocol as modeled in AODVM [5]. On the contrary, clustering technique is one of the most important techniques that used to provide resource management in MANET [6]. Also, it influences the usage of energy in this kind of network. 3. CLUSTER HEAD SELECTION The feasibility of a clustering method can be primarily determined by the complexity of the cluster head selection. Optimizing the cluster head selection allows for the network to be more efficient by minimizing the signaling overhead while ensuring that the network connectivity is maintained despite topology changes. In this paper, we investigate the problems of cluster head selection for large and dense MANETs. Two variants of the cluster head selection are examined: (1) the distance-constrained selection where every node in the network must be located within a certain distance to the nearest cluster head; and (2) the size-constrained selection where each cluster is only allowed to have a limited number of members. 4. CLUSTERING TECHNIQUES IN MANET The most popular method that developed to provide resource management over mobile ad hoc networks is clustering. This technique based on partitioning the network in smaller and manageable groups each group called cluster [6]. Clustering offers several benefits when it used with MANETs listed as following: 1. Enhances routing process and mobility. 2. Stabilizes dynamic network topology 3. Helps to perform more efficient resource allocation 4. Provides hierarchical routing architecture. This techniques dividing nodes of a self-organized network like MANET into a number of disjointed or overlapped clusters[7],[8]. Thereby, cluster based network defines three types of node in MANET as shown in Fig. 1 and defined as follows:
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 310 1) Cluster Head: can defined as a local coordinator for its cluster. It performs inter-cluster routing, data forwarding and many other operations. 2) Gateway: is a node that can access neighboring cluster and forward information between clusters. 3) Cluster Member or Ordinary Node: is the one neither a Cluster Head nor Gateway. Fig. 1 Cluster heads, Gateways and ordinary nodes in MANET Clustering techniques is designed by defining structural partitioning of nodes inside particular network as shown in fig.1. This mean; for particular network, the nodes will grouped to define set of clusters based on specific techniques to specify: 1. Cluster formation phase. 2. Cluster maintenance phase. Regarding to clustering concepts in MANET, one node must be elected as a special node or incharge node called Cluster Head (CH) which provides virtual infrastructure for particular cluster. Hence, remaining nodes will be referred as Ordinary Nodes (CN) except Cluster Gateways (CG) which are the nodes that act as shared nodes between more than one cluster. All of these agreed that the clustering formation and maintenance phases are very important concepts in power consumption enhancement for MANETs. Some of the techniques are briefly described in the following subsections : 4.1 LOWEST-ID CLUSTERING The Lowest-ID as shown in fig. 2 is considered as a simplest clustering scheme algorithm [9]. In this scheme unique identifier (ID) is assigned to each node. All nodes recognize its neighbors ID and CH is chosen according to minimum ID. Thus, the nodes IDs of the neighbors of the CH will be higher than that CH. The main drawback with this scheme is; there is no limitation to the number of nodes attached to the same CH. Also, CHs are prone to power drainage due to serving as cluster heads longer period of time.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 311 Fig. 2 Lowest ID Clustering Technique 4.2 HIGHEST DEGREE CLUSTERING In comparison with Lowest-ID scheme, the degree of nodes is computed based on its distance from each other’s [10]. All nodes flood its connectivity value within their transmission range. Thus, a node decides to become a CH or remain as CN by comparing the connectivity value of its neighbours with its own value. Node with highest connectivity value in its vicinity will become CH as shown in Fig. 3. Connectivity-based clustering follows the same circumstances of ID-based regarding to cluster size and performance degradation. Fig. 3 Highest Degree Clustering Technique 4.3 LEAST CLUSTERING CHANGE ALGORITHM (LLC) LLC has an important improvement over Lowest-ID and Highest-Degree Clustering Algorithms [11]. Since most of algorithms require performing procedure of clustering periodically to satisfy specific characteristics of CHs, the cost of cluster maintenance must be taken into account. In
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 312 Highest-Degree Clustering, the algorithm is performed to check the local highest node degree periodically as it specifies the aspect of CH election. Thus, current CH will force to hand over its roles if it finds any member node with higher degree. Frequent re-clustering involved by this mechanism. In contrast, LLC clustering algorithm is divided into two phases: 1. Cluster formation. 2. Cluster maintenance. The first phase simply applied as Lowest-ID algorithm by choosing mobile nodes with Lowest-ID in their neighborhoods as CHs. But, cluster maintenance is performed as event- Driven and called only under two circumstances; first, when a node can’t access any CH. Thus, it call cluster formation phase to rebuilds the cluster structure according to Lowest-ID techniques. Second, when more than one node reaches the transmission range of each other, this requires giving up CH roles except only one which become a CH. Hence, LLC significantly enhances clustering and increase its stability in mobile ad hoc network by releasing the requirement that a CH should reserve some special features and characteristics within its local area. 4.4 TRUST-BASED CLUSTERING TECHNIQUE In [12] a trust based approach for Cluster head (TA) selection algorithm. Each cluster is nothing but a group of nodes which is headed by one or more node(s) known as Cluster head(s)(TAs).In this proposal Cluster head is elected by the member nodes in order to make the TA more stable depending upon some metrics. The Cluster head(s) selection is totally distributed and secured. The challenges can be handled by formalizing a trust relationship between the participating nodes within 1 hop distance away. To formalize the trust of a particular node, nodes monitor the behavior of other nodes and collect information from its neighbors and then take the decision about the node. We have used a quantitative trust evaluation algorithm at each node to evaluate the direct trust of its neighbor nodes. Fig. 4 Node-based Secured Interactions The Node-based Trust Management(NTM) (fig.4)scheme is based on a Clustered mobile sensor network with backbone; it introduces a trust of a node within local management strategy with help from the mobile agents running on each node. That is, a node’s trust-based information is stored as a history on the node itself and managed by the local mobile agent of the node. However, there are
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 313 a couple of limitations in this approach. The way the messages passed through may overload the Cluster head, creating a bottleneck due to additional message exchanges. Another possible limitation is the way that the message authentication between intermediate Cluster heads are treated, where there can be a delay in identifying a malicious neighboring node(s). 4.5 CLUSTERING BASED ON OUTLIER DETECTION MECHANISM In this clustering technique we first determine whether all the nodes participating in the cluster formation are trusted or not.To determine the malacious or dishonest nodes, we use the outlier detection technique used in data mining which is based on linear method of deviation detection [13].The objective of this indirect trust computation is to determine the trustworthiness of an unfamiliar servic requester from the set of recommendations that narrow the gap between the derived recommendation and the actual trustworthiness of the target service. A dishonest recommendation is defined as an outlier that appears to be inconsistent with other recommendations and has a low probability that it originated from the same statistical distribution as the other recommendation in the data set. The algorithm uses a smoothing factor which detects malicious recommendations by evaluating the impact on the dissimilarity metric by removing a subset of recommendation classes from the set of recommendations.The node which is evaluated as the most trusted node is selected as the cluster head (CH). 5. CONCLUSION We have reviewed various clustering techinques,most of them provide performance enhancement in Mobile Adhoc Network (MANET), the central theme of any algorithm is the selection of the Cluster Head (CH),which facilitates the intra as well asinternetwork communication. Also, the selection of the cluster head is quite critical task ,for this many CH selection algorithms have been developed of which trust based selection scheme is an new area of research. With this survey we can also observe that a cluster-based MANET has many important issues to examine, such as the cluster structure stability, the control overhead of cluster construction and maintenance, the energy consumption of mobile nodes with different cluster- related status, the traffic load distribution in clusters, and the fairness of serving as clusterheads for a mobile node. 6. REFERENCES [1] J.-E. Garcia, A. Kallel, K. Kyamakya, K. Jobmann, J.-C. Cano, and P. Manzoni, A novel DSR-based energy-efficient routing algorithm for mobile ad-hoc networks, presented at the IEEE Vehicular Technology Conference, Florida, USA, 2003. [2] N. Ghanem, S. Boumerdassi, and E. Renault, New energy saving mechanisms for mobile ad- hoc networks using OLSR, in PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Canada, Oct. 2005, pp. 273-274. [3] D. Johnson, D. Maltz, T. Imielinksi, and H. Korth, Dynamic source routing in ad hoc wireless networks, in Mobile Computing, Kluwe, 1996, pp. 153-181. [4] C. Perkins and E. Royer, Ad-Hoc on-Demand Distance Vector Routing, in Proceedings WMCSA'99. 2nd Annual IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, 1999, pp. 90-100. [5] I. I. Er and W. K. G. Seah, Mobility-based d-Hop Clustering Algorithm for Mobile Ad Hoc Networks, presented at the Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, Georgia, USA, Mar. 2004.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 314 [6] S. Sarkar, T. G. Basavaraju, and C. Puttamadappa, Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. New York: Auerbach Publications, 2007. [7] Dr. Mohammad U. Bokhari , Hatem S. A. Hamatta and Shams Tabrez Siddigui, A Review of Clustering Algorithms as Applied in MANETs , International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 11, November 2012. [8] Dr. Mahesh Motwani and Ratish Agarwal, Survey of clustering algorithms for MANET, International Journal on Computer Science and Engineering Vol.1(2), 2009, 98-104 [9] M. Gerla and J. Tsai, Multicluster, mobile, multimedia radio network, ACM-Baltzer Journal of Wireless Networks, vol. 1, pp. 255-265, 1995. [10] A. Ephremides, J. E. Wieselthier, and D. J. Baker, A design concept for reliable mobile radio networks with frequency hopping signaling, presented at the Proceedings of the IEEE, Jan. 1987. [11] C.-c. Chiang, H.-K. Wu, W. Liu, and M. Gerla, Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel, presented at the Proceeding IEEE Singapore International Conference of Networks, SICON'97, Singapore, Apr. 1997. [12] Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks, TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications Pages 589-596. [13] Naima Iltaf, Abdul Ghafoor and Uzman Zia, A mechanism for detecting dishonest recommendation in indirect trust computation, EURASIP Journal on Wireless Communications and Networking 2013. [14] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [15] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [16] Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.