SlideShare a Scribd company logo
80 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
Cut Detection in Wireless Sensor
Network
Prof.Vrushali Kondhalkar1
| Tambe Bhagyashri2
| Temkar Gaurav3
| Thorawat Prafull4
1Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
2Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
3Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
4Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India.
Wireless sensor network can get separated into multiple connected components due to the failure of some
of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining
nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the
connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the
special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous:
every node needs to communicate with only those nodes that are within its communication range. The
algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The
convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
KEYWORDS: CUT DETECTION,NETWORK SEPERATION,SENSOR NETWORK,ITERATIVE COMPUTATION.
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Wireless sensor networks (WSNs) are a promising
technology for monitoring large regions at high
spatial and temporal resolution. However, the
small size and low cost of the nodes that makes
them attractive for wide spread deployment also
causes the disadvantage of low-operational
reliability. A node may fail due to various factors
such as mechanical/electrical problems,
environmental degradation, battery depletion, or
hostile tampering. In fact, node failure is expected
to be quite common due to the typically limited
energy budget of the nodes that are powered by
small batteries. Failure of a set of nodes will reduce
the number of multi-hop paths in the network.
Such failures can cause a subset of nodes—that
have not failed—to become disconnected from the
rest, resulting in a ―cut.‖ Two nodes are said to be
disconnected if there is no path between them[1].
In this paper, we propose a distributed algorithm
to detect cuts , named the Distributed Cut
Detection (DCD)algorithm. The algorithm allows
each node to detect DOS events and a subset of
nodes to detect CCOS events. The algorithm we
propose is distributed and asynchronous: it
involves only local communication between
neighboring nodes, and is robust to temporary
communication failure between node pairs. A key
component of the DCD algorithm is a distributed
iterative computational step through which the
nodes compute their (fictitious) electrical
potentials. The convergence rate of the
computation is independent of the size and
structure of the network[2].The DOS detection part
of the algorithm is applicable to arbitrary networks;
a node only needs to communicate a scalar variable
to its neighbors. The CCOS detection part of the
algorithm is limited to networks that are deployed
in 2D euclidean spaces, and nodes need to know
their own positions. The position information need
not be highly accurate. The proposed algorithm is
an extension of partially examined the DOS
detection problem [3].
II. DISTRIBUTION CUT DETECTION
The algorithm we propose is asynchronous and
distributed: it involves communication between
ABSTRACT
81 International Journal for Modern Trends in Science and Technology
Cut Detection in Wireless Sensor Network
neighboring nodes, and is robust to temporary
communication failure between node pairs. A key
component of the DCD algorithm is a distributed
iterative computational step through which the
nodes from sensor network compute their electrical
potentials.[2]
A. Cut
Wireless sensor networks (WSNs) are a promising
technology for monitoring large regions at high
spatial and temporal resolution. In fact, node
failure is expected to be quite common due to the
typically limited energy budget of the nodes.
Failure of a set of nodes will reduce the number of
multi-hop paths in the network. Such failures can
cause a subset of nodes – that have not failed – to
become disconnected from the rest, resulting in a
―cut‖. Two nodes are said to be disconnected if
there is no path between them.[1]
B. Source node
We consider the problem of detecting cuts by the
nodes of a wireless sensor network. We assume
that there is a specially designated node in the
network, which we call the source node. The source
node may be a base
station that serves as an interface between the
network and its users. Since a cut may or may not
separate a node from the source node, we
distinguish between two distinct outcomes of a cut
for a particular node [1]
C. CCOS and DOS
When a node u is disconnected from the source,
we say that a DOS (Disconnected frOm Source)
event has occurred for u. When a cut occurs in the
network that does not separate a node u from the
source node, we say that CCOS (Connected, but a
Cut Occurred Somewhere) event has occurred for
u. By cut detection we mean (i) detection by each
node of a DOS event when it occurs, and (ii)
detection of CCOS events by the nodes close to a
cut, and the approximate location of the cut.[1]
III. DCD ALGORITHM
Comes with provable characterization on the DOS
detection accuracy CCOS events detection can be
identified
DCD algorithm enables base station and also every
node to detect if it is disconnected from the base
station.
A. DOS DETECTION
As the name of algorithm says its Disconnected
from source. To send packets we use Shortest path
algorithm, it is based on energy that means at the
time of sending packets from source sensors node
to destination sensor node, due to throughput or
any energy related issue packets are not reaching
to destination. And that disturbance is from near to
source sensor node [3]. To resolve this problem we
use the alternative shortest path. After repairing
the cut, packets are transferred from earlier path.
Diagram 1(a) shows cut occurred near to the
source sensor node. Due to this it find some
another alternative path to transferred a packets to
destination sensor node. Diagram 1(b) shows
alternative shortest path [2].
1(a)
1(b)
B. CCOS Detection
As the name of algorithm says it’s Connected but
Cut Occurred From Source. At the time of sanding
packets cut is occurred somewhere middle in the
path. To resolve this problem it uses alternative
shortest path. Cut occurred in respective node, i.e.
node not having sufficient energy to pass the
packets forward. diagram 2(a) shows cut occurred
in between the path[1]. To resolve this , it does the
same thing as done in DOS.
2(a)
82 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
2(b)
IV. RESULTS
Status of Different Communicating Nodes:
Cut Detection Network Monitor:
83 International Journal for Modern Trends in Science and Technology
Cut Detection in Wireless Sensor Network
V. CONCLUSION
We conclude that, The DCD algorithm we
propose here enables every node of a wireless
sensor network to detect disconnected from source
event if they occur. Second, it enables the subset of
nodes that experiences CCOS event to detect them
and estimate the approximate location of the cut in
the form of a list of active nodes that lie at
theboundary of the cut/hole. A key strength of the
DCD algorithm is that the convergence rate of the
underlying iterative scheme is quite fast and
independent of the size and structure of the
network, which makes detection using this
algorithm quite fast[5].
REFERENCES
[1] G. Dini, M. Pelagatti, and I.M. Savino, ―An
Algorithm for Reconnecting Wireless Sensor
Network Partitions,‖ Proc. European Conf. Wireless
Sensor Networks, pp. 253-267, 2008.
[2] N. Shrivastava, S. Suri, and C.D. To´ th, ―Detecting
Cuts in Sensor Networks,‖ ACM Trans. Sensor
Networks, vol. 4, no. 2, pp. 1-25, 2008.
[3] H. Ritter, R. Winter, and J. Schiller, ―A Partition
Detection System for Mobile Ad-hoc Networks,‖ Proc.
First Ann. IEEE Comm. Soc. Conf. Sensor and Ad
Hoc Comm. And Networks (IEEE SECON ’04), pp.
489-497, Oct. 2004.
[4] M. Hauspie, J. Carle, and D. Simplot, ―Partition
Detection in Mobile Ad-Hoc Networks,‖ Proc. Second
Mediterranean Workshop Ad-Hoc Networks, pp.
25-27, 2003.
84 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
[5] P. Barooah, ―Distributed Cut Detection in Sensor
Networks,‖ Proc. 47th IEEE Conf. Decision and
Control, pp. 1097-1102, Dec.2008.
[6] A.D. Wood, J.A. Stankovic, and S.H. Son, ―Jam: A
Jammed-Area Mapping Service for Sensor
Networks,‖ Proc. IEEE Real Time Systems Symp.,
2003.

More Related Content

What's hot

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
ER Publication.org
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
IJNSA Journal
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
Prafull Maktedar
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
ijeei-iaes
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
IDES Editor
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
ambitlick
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
IDES Editor
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
IJORCS
 
Br33421423
Br33421423Br33421423
Br33421423
IJERA Editor
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
Prafull Maktedar
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
IJCNCJournal
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
IJERA Editor
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit
 

What's hot (19)

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Br33421423
Br33421423Br33421423
Br33421423
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 

Viewers also liked

Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
IJMTST Journal
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
IJMTST Journal
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
IJMTST Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
IJMTST Journal
 
Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram Signals
IJMTST Journal
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
IJMTST Journal
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using Sensors
IJMTST Journal
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
IJMTST Journal
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
IJMTST Journal
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
IJMTST Journal
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
IJMTST Journal
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
IJMTST Journal
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
IJMTST Journal
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
IJMTST Journal
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality Improvement
IJMTST Journal
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
IJMTST Journal
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
IJMTST Journal
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
IJMTST Journal
 

Viewers also liked (19)

Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
 
Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram Signals
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using Sensors
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality Improvement
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
 

Similar to Cut Detection in Wireless Sensor Network

18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
IAESIJEECS
 
Cut detection
Cut detectionCut detection
Cut detection
shaguftayasmin123
 
Cut detection
Cut detectionCut detection
Cut detection
shaguftayasmin123
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
Pulkit Chhabra
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
Editor IJARCET
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
Editor IJARCET
 
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc NetworksConstructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
GiselleginaGloria
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
IJMER
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
eSAT Publishing House
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
eSAT Publishing House
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
F04503057062
F04503057062F04503057062
F04503057062
ijceronline
 
K010526570
K010526570K010526570
K010526570
IOSR Journals
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Iaetsd Iaetsd
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
csijjournal
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
cscpconf
 

Similar to Cut Detection in Wireless Sensor Network (20)

18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
Cut detection
Cut detectionCut detection
Cut detection
 
Cut detection
Cut detectionCut detection
Cut detection
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc NetworksConstructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
F04503057062
F04503057062F04503057062
F04503057062
 
K010526570
K010526570K010526570
K010526570
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
 

Recently uploaded

CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 

Recently uploaded (20)

CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 

Cut Detection in Wireless Sensor Network

  • 1. 80 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST Cut Detection in Wireless Sensor Network Prof.Vrushali Kondhalkar1 | Tambe Bhagyashri2 | Temkar Gaurav3 | Thorawat Prafull4 1Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 2Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 3Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. 4Department of Computer Engineering, JSPM’s JSCOE,Hadapsar, Pune, Maharashtra,India. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. KEYWORDS: CUT DETECTION,NETWORK SEPERATION,SENSOR NETWORK,ITERATIVE COMPUTATION. Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. However, the small size and low cost of the nodes that makes them attractive for wide spread deployment also causes the disadvantage of low-operational reliability. A node may fail due to various factors such as mechanical/electrical problems, environmental degradation, battery depletion, or hostile tampering. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes—that have not failed—to become disconnected from the rest, resulting in a ―cut.‖ Two nodes are said to be disconnected if there is no path between them[1]. In this paper, we propose a distributed algorithm to detect cuts , named the Distributed Cut Detection (DCD)algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network[2].The DOS detection part of the algorithm is applicable to arbitrary networks; a node only needs to communicate a scalar variable to its neighbors. The CCOS detection part of the algorithm is limited to networks that are deployed in 2D euclidean spaces, and nodes need to know their own positions. The position information need not be highly accurate. The proposed algorithm is an extension of partially examined the DOS detection problem [3]. II. DISTRIBUTION CUT DETECTION The algorithm we propose is asynchronous and distributed: it involves communication between ABSTRACT
  • 2. 81 International Journal for Modern Trends in Science and Technology Cut Detection in Wireless Sensor Network neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes from sensor network compute their electrical potentials.[2] A. Cut Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them.[1] B. Source node We consider the problem of detecting cuts by the nodes of a wireless sensor network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users. Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node [1] C. CCOS and DOS When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean (i) detection by each node of a DOS event when it occurs, and (ii) detection of CCOS events by the nodes close to a cut, and the approximate location of the cut.[1] III. DCD ALGORITHM Comes with provable characterization on the DOS detection accuracy CCOS events detection can be identified DCD algorithm enables base station and also every node to detect if it is disconnected from the base station. A. DOS DETECTION As the name of algorithm says its Disconnected from source. To send packets we use Shortest path algorithm, it is based on energy that means at the time of sending packets from source sensors node to destination sensor node, due to throughput or any energy related issue packets are not reaching to destination. And that disturbance is from near to source sensor node [3]. To resolve this problem we use the alternative shortest path. After repairing the cut, packets are transferred from earlier path. Diagram 1(a) shows cut occurred near to the source sensor node. Due to this it find some another alternative path to transferred a packets to destination sensor node. Diagram 1(b) shows alternative shortest path [2]. 1(a) 1(b) B. CCOS Detection As the name of algorithm says it’s Connected but Cut Occurred From Source. At the time of sanding packets cut is occurred somewhere middle in the path. To resolve this problem it uses alternative shortest path. Cut occurred in respective node, i.e. node not having sufficient energy to pass the packets forward. diagram 2(a) shows cut occurred in between the path[1]. To resolve this , it does the same thing as done in DOS. 2(a)
  • 3. 82 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST 2(b) IV. RESULTS Status of Different Communicating Nodes: Cut Detection Network Monitor:
  • 4. 83 International Journal for Modern Trends in Science and Technology Cut Detection in Wireless Sensor Network V. CONCLUSION We conclude that, The DCD algorithm we propose here enables every node of a wireless sensor network to detect disconnected from source event if they occur. Second, it enables the subset of nodes that experiences CCOS event to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at theboundary of the cut/hole. A key strength of the DCD algorithm is that the convergence rate of the underlying iterative scheme is quite fast and independent of the size and structure of the network, which makes detection using this algorithm quite fast[5]. REFERENCES [1] G. Dini, M. Pelagatti, and I.M. Savino, ―An Algorithm for Reconnecting Wireless Sensor Network Partitions,‖ Proc. European Conf. Wireless Sensor Networks, pp. 253-267, 2008. [2] N. Shrivastava, S. Suri, and C.D. To´ th, ―Detecting Cuts in Sensor Networks,‖ ACM Trans. Sensor Networks, vol. 4, no. 2, pp. 1-25, 2008. [3] H. Ritter, R. Winter, and J. Schiller, ―A Partition Detection System for Mobile Ad-hoc Networks,‖ Proc. First Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. And Networks (IEEE SECON ’04), pp. 489-497, Oct. 2004. [4] M. Hauspie, J. Carle, and D. Simplot, ―Partition Detection in Mobile Ad-Hoc Networks,‖ Proc. Second Mediterranean Workshop Ad-Hoc Networks, pp. 25-27, 2003.
  • 5. 84 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST [5] P. Barooah, ―Distributed Cut Detection in Sensor Networks,‖ Proc. 47th IEEE Conf. Decision and Control, pp. 1097-1102, Dec.2008. [6] A.D. Wood, J.A. Stankovic, and S.H. Son, ―Jam: A Jammed-Area Mapping Service for Sensor Networks,‖ Proc. IEEE Real Time Systems Symp., 2003.