This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
sensors are what we experience the most in our life. they are even working in our body in different aspects. they may be as eyes, ears, skin, tongue etc. when we combine them they make a network. it may be a human sensor network. but i have shared something interesting about wireless sensor networks.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
Similar to Data aggregation in wireless sensor networks (20)
It includes:
Introduction to Graphs
Applications
Graph representation
Graph terminology
Graph operations
Adding vertex and edge in Adjacency matrix representation using C++ program
Adjacency List implementation in C++
Homework Problems
References
Our Facebook Page url: https://www.facebook.com/programming.cplusplus
C++ language was developed by Bjarne Stroustrup. C++ is just C with classes where class is a user-defined datatype just like structure but with more advance features of object-oriented programming language.
An object is a variable of type class which is created during runtime. That's why the objects are allocated memory in heap and are called as reference types.
Static variables scope remains within the whole program. IT is not reinitialised again and again. We can declare the members of a class as static as well. Both possess same properties.
Our Facebook page:
https://www.facebook.com/programming.cplusplus/
Definition of Computer
Classification of Computer
Applications of Computer
Block Diagram and Working of Computer System
Different Peripheral Devices
Main Storage and Auxiliary Storage Devices
Computer Hardware and Software
Nowadays, Wireless Sensor Network has been greatly used
with RFID technology because of its certain advantages. RFID
is abbreviated as radio frequency identification. The frequency
identification RFID technology is similar to a Wireless Sensor
Network (WSN) as it also captures the physical environment
data, process it and provide the rapid response about location
and target tracking [3]. RFID active tags are connected with
sensors to communicate with users [4]. RFID technology uses
radio waves to communicate the data and other necessary
information. It includes RFID tags and RFID readers. The
tags are equipped on an object which we want to sense. It
can discover the information about that object even without
coming in contact with it. The data is then send to the host
system through intranet. RFID can easily discern the objects
and can trace the location even if no information about the
physical position is provided. The main difference is that RFID
provides much more and accurate information about physical
environment than a Wireless Sensor Network could provide.
There is a major drawback of this technology which is its
lowest communication range up to 12m only due to limited
battery problem. This drawback can be made insignificant by
integrating it with WSN. As a result, combination of RFID and
WSN can provide us with a bundle of environment related
information such as how the data is routed by the nodes,
which routing protocol is used, resource ID, location and ID of
communicating nodes and also the physical condition of nodes.
80 percent of the node’s energy is utilized during the process
of communication, processing, and activation [3]. Figure 1
shows the advantages that we can have by integrating these
two technologies.
If any class have multiple functions with same names but different parameters then they are said to be overloaded. Function overloading allows you to use the same name for different functions, to perform, either same or different functions in the same class.
If you have to perform one single operation but with different number or types of arguments, then you can simply overload the function.
While doing programming in any programming language, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory.
You may like to store information of various data types like character, wide character, integer, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory.
C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX
Most C++ compilers don't care what extension you give your source code, but if you don't specify otherwise, many will use .cpp by default
Most frequently used and free available compiler is GNU C/C++ compiler, otherwise you can have compilers either from HP or Solaris if you have respective Operating Systems.
With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet. For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work.
To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall.
To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter.
Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect.
An operator is a symbol that tells the compiler to perform specific mathematical or logical manipulations.
C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform certain mathematical or logical manipulations. Operators are used in program to manipulate data and variables.
A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before you can use it to store any variable address.
There are few important operations, which we will do with the help of pointers very frequently. (a) we define a pointer variable (b) assign the address of a variable to a pointer and (c) finally access the value at the address available in the pointer variable. This is done by using unary operator * that returns the value of the variable located at the address specified by its operand.
Garbage Value:
If any variable is not initialized then that variables having garbage value(unassigned value).
For example:
int i;
Variable ‘i’ is integer type but it wont assign any value.so,it take garbage value.It maybe any value.
Before allocating memory in run time system does not clear the memory before allocating the variable.So,default value of the variable is garbage value.
My Tours and Travels Project. New user can login and book their travel. description of various places with their maps is also given.
Editing the new records of customers and tourists by administrator.
2) Verifying customers(tourists) registration and complaint forms filled by visitors.
3) Creation of new admin by administrator.
4) Viewing of accounts information by customer online.
5) Creation of new records of tours, number of days and nights, bookings and customers.
6) Amending the records of existing customers and administrator.
7) Each customer or member of the ‘Country Drive’ having unique id and password.
8) Viewing all the details of his/her account, tours and bookings
9) Only administrator can grant permission for bookings, view customers, add customer and admin etc.
10) Password confirmation for customers and admin is applied.
11) Viewing of receipts and balance by tourists and customers.
12) Previous records of customers are also available to admin.
13) Full Proof and ease to use online tour booking, handling services & registration.
14) Admin can add max 2 advertisements on the home page of the website.
15) Also there is complaint form for visitors to enquire about the tours and their booking during, before or after their travel.
16) There are tour details of every tour, description of popular places and their photographs to make tourists know more about the place they are going to visit.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
1. SYNOPSIS PRESENTATION ON
PARAMETERS BASED DATA AGGREGATION FOR
STATISTICAL INFORMATION EXTRACTION IN
WIRELESS SENSOR NETWORKS
SUBMITTED BY:
JASLEEN KAUR
13MCS7007
M.E.(CN) HONS.
BATCH:2013-2015
1
2. CONTENTS
• WIRELESS SENSOR NETWORK
• OBJECTIVES
• PROBLEM DEFINITION
• DATA-AGGREGATION
• METHODOLOGY USED
• EXPERIMENTAL METHODOLOGY
• CONCLUSION
• FUTURE SCOPE
• LITERATURE SURVEY
• REFRENCES
2
3. WIRELESS SENSOR NETWORKS
• Consists of large number of nodes that are able to interact with
environment by sensing and controlling the physical
parameters.
3
4. APPLICATIONS
• Environmental/Habitat monitoring
• Acoustic detection
• Seismic Detection
• Disaster relief
• Military surveillance
• Inventory tracking
• Medical monitoring
• Smart spaces
• Process Monitoring
• Gathering sensing information in inhospitable locations
4
6. OBJECTIVES
• To capture the effects of aggregation over
different scales.
• To efficiently and accurately obtain the
sensory data from a sensor network.
• To reduce the energy consumption and thus
increase the lifetime of a network.
• Main focus is to extract the statistical
information from sensory data(which can
answer various queries) while keeping the
communication cost low
6
7. PROBLEM DEFINITION
• In Wireless Sensor Networks, accurate data extraction and
aggregation is difficult due to
▫ Significant variations in sensor readings
▫ Frequent link and node failure
7
8. DATA-AGGREGATION
• Aims to reduce power consumption inWSN.
• Aims to combine and summarize the data packets of several
nodes so that amount of data transmission is reduced.
• Data aggregation reduces the number of transmissions thereby
improving the bandwidth and energy utilization inWSN.
8
10. METHODOLOGY USED
• Literature survey of WSNs and In-network
aggregation techniques for WSNs.
• Data aggregation scheme
▫ Aggregation algorithm return probability
distribution of sensory data.
▫ Link between a pair of sensor nodes is lossy.
▫ Packets can be corrupted or dropped.
▫ Routing algorithm and Protocol.
▫ Multiple predecessors and successors.
▫ Theoretical approximation and select parameters then
we have,
10
11. ▫ Sensor nodes only need to transmit packets that contain
distribution parameters instead of individual values
• Aggregation Process
SINK
REMOTE
NODE
Aggregated Node
Intermediate Node
11
14. AGGREGATION PROCESS continues
• Packet sent by node v contain a 2-tuple (wv, Θ)
where wv is the weight of aggregate in this packet sent
by node v.
Θ is the set of all parameters of specific Gaussian
mixture model
p is packet loss rate due to node/link failure, wireless
interference.
PREDv = { u | v ε SUCCu } is the set of immediate
predecessor of v in routing graph.
14
15. • For intermediate nodes, wv includes the sum of all weights
from predecessor and its own.
• At sink s, expression Σu ε PREDs wv + 1 represents total number
of readings.
• Can also calculate the COUNT query by this value at sink.
• Provide accurate and robust approximation.
• Estimating Distribution Parameters:
▫ Problem- Input information precisely defines two values,
its own and value received from its predecessor.
▫ Precisely defined input distribution is
v’ is the neighbor of v
15
16. • αv‘ = wv’ / Σ wv’ + 1
• αo = 1 / Σ wv’ + 1
These are the normalised weights
• Estimation-Maximization (EM) Algorithm to solve the
problem for finding max likelihood estimates of parameters.
• Gaussian Estimation
16
17. • Space(message size) and Time complexity
▫ More parameters we use more accurate the result is.
• Experimental Methodology
Communication cost
Histogram that results from
our algo and q-digest
17
19. METHODOLOGY OVERVIEW
1. Situation Analysis
2. Problem Definition
3. Taking Assumptions
4. Creating Network Model
5. Aggregation Scheme
6. Theoretical assumption in aggregation process
7. Estimating distribution parameters using EM algorithm
8. GMM Estimation
9. Compared Algorithms
19
20. CONCLUSION
• Technique is scalable.
• Robust against link failures.
• The network communication cost is reduced.
• Preserves the accuracy of estimation.
• Avoid loss of valuable statistical information.
• It is the first study on using the “Mixture
Models”.
• There are several directions in future.
20
21. FUTURE SCOPE
• To design a more efficient algorithm by using prediction to
exploit the temporal correlation of sensory data.
• To use geometry algorithms to facilitate information extraction
algortithm.
21
34. LITERATURE SURVEY
• Survey of data-aggregation techniques using soft computing
▫ Types of Aggregation Techniques
Centralised Approach
In-network Aggregation
Size reduction
Without size reduction
Tree-based approach
Cluster-based approach
▫ Data aggregation using soft computing method
Fuzzy-based data aggregation
Swarm-based data aggregation
Neural-based data aggregation
GA-based data aggregation
34
35. LITERATURE SURVEY continued..
• Literature Survey on wireless sensor networks
▫ Differences between ad-hoc and sensor networks
▫ Design factors like fault tolerance, scalability, topology, hardware
constraints, transmission media etc
▫ Physical Layer
▫ Data Link Layer
SMACS and EAR
CSMA-Based Medium Access
Hybrid TDMA/FDMA CSMA-Based Medium Access
▫ Network Layer
Flooding
Gossiping
SPIN
LEACH
35
36. LITERATURE SURVEY continued..
▫ SAR
▫ Directed Diffusion
• Routing Protocols
▫ Rumor routing algorithm
▫ Energy-efficient communication protocol for wireless micro
sensors
• MAC layer
▫ Must be energy efficient
▫ Allows fair bandwidth allocation to all nodes
▫ CSMA strategy
• Energy concerns
▫ When node is in listening mode, energy expenditure is minimal
▫ Difficulty in defining when the network dies?
36
37. LITERATURE SURVEY continued..
• Security
▫ Solution- Resurrecting Duckling security policy model
▫ Talking to strangers
• Open research issues
▫ Development of a new transport protocol
▫ Development of a new routing protocol
▫ Survey on routing protocols for sensor networks
▫ Interaction with other networks as well as cooperation among
sensor networks
37
38. 38
REFERENCES
• [1] Hongbo Jiang,Member,IEEE,Shudong Jin,Member,IEEE, and
Chonggang Wang, Senior Member,IEEE,“Parameter-Based Data
Aggregation for statistical Information Extraction in Wireless
Sensor Networks” in IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 59, NO. 8,OCTOBER 2010.
• [2]http://www.academia.edu/890321/Wireless_Sensor_Networks_Is
sues_Challenges_and_Survey_of_Solutions
• [3] http://en.wikipedia.org/wiki/Secure_Data_Aggregation_in_WSN
• [4]Hevin Rajesh Dhasian, Paramasivan Balasubramanian “Survey
of data aggregation techniques using soft computing in wireless
sensor networks” in IET inf.Secur.,2013,Vol.7, Iss.4,pp.336-342
• [5]ELENA FASLO AND MICHELE ROSSI, DEI, UNIVERSITY
OF PADOVA;JORG WIDMER,DOCOMO EURO-LABS;
MICHELE ZORZI,DEI,UNIVERSITY OF PADOVA,“ In-network
aggregation techniques for wireless sensor networks:A survey” in
IEEE Wireless Communications April 2007