Development of energy efficient Wireless Sensor Network (WSN) routing protocol is nowadays main area of interest amongst researchers. This research is an effort in designing energy efficient Wireless Sensor Network (WSN) routing protocol under certain parameters consideration. Research report discusses various existing WSN routing protocols and propose a new WSN energy efficient routing protocol. Results show a significant improvement in life cycle of the nodes and enhancement in energy efficiency of WSN. In this paper, an attempt has been made to design a wireless sensor network involving the extraction of Pascal Graph features. The standard task involves designing a suitable topology using Pascal Graph. As per the definition of interconnection network it is equivalent that a suitable graph can represent the different computer network topologies very efficiently. Different characteristics of Pascal Graph Topology has been discovered and used in network topology design. Since Pascal Graph gives
better result in terms of finding the dependable and reliable nodes in topology, it has been considered for network analysis. Moreover, we propose a methodology that involves the Pascal
Graph Topology for wireless sensor network which can analyse and represent the network and help in routing.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode for a relatively longer period of time; thereby minimizing collisions and idle listening time. On the other hand, efficient energy aware routing is achieved by finding the best path from the sensor nodes to the Base Sta-tion (BS) where energy consumption is minimal. In almost all solutions there is always a tradeoff between power consumption and delay reduction. This paper presents an improved hierarchical coordination for data gathering (HCDG) routing schema for WSNs based on multi-level chains formation with data aggregation. Also, this paper provides an analytical model for energy consumption in WSN to compare the performance of our proposed HCDG schema with the near optimal energy reduction methodology, PEGASIS. Our results demonstrate that the proposed routing schema provides relatively lower energy consumption with minimum delay for large scale WSNs.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode for a relatively longer period of time; thereby minimizing collisions and idle listening time. On the other hand, efficient energy aware routing is achieved by finding the best path from the sensor nodes to the Base Sta-tion (BS) where energy consumption is minimal. In almost all solutions there is always a tradeoff between power consumption and delay reduction. This paper presents an improved hierarchical coordination for data gathering (HCDG) routing schema for WSNs based on multi-level chains formation with data aggregation. Also, this paper provides an analytical model for energy consumption in WSN to compare the performance of our proposed HCDG schema with the near optimal energy reduction methodology, PEGASIS. Our results demonstrate that the proposed routing schema provides relatively lower energy consumption with minimum delay for large scale WSNs.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data
in a variety of environments, as the sensor operate on battery which is of limited power. To support high scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection
based on the node energy and the distance from base station to the cluster head for the efficient transmission and to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared with the LEACH algorithm in terms of energy consumption.
A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS B...csandit
With the development of new networking paradigms and wireless protocols, nodes with different capabilities are used to form a heterogeneous network. The performance of this kind of networks is seriously deteriorated because of the bottlenecks inside the network. In addition, because of the application requirements, different routing schemes are required toward one particular application. This needs a tool to design protocols to avoid the bottlenecked nodes and adaptable to application requirement. Polychromatic sets theory has the ability to do so. This paper demonstrates the applications of polychromatic sets theory in route discovery and protocols design for heterogeneous networks. From extensive simulations, it shows the nodes with high priority are selected for routing, which greatly increases the performance of the network. This demonstrates that a new type of graph theory could be applied to solve problems of complex networks.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and implementation of grid based clustering in WSN using dynamic sink ...journalBEEI
A wireless sensor networks (WSNs) play a significant application, especially in the monitored remoting environmental, which enables by the availability of sensors which are cheaper, smaller, and intelligent. The equipment of such sensors be with wireless interfaces, which a communication with other sensors occurs for creating a network, that contains many distributed nodes. The closest nodes to the sink are exploited at an enormous traffic load while the data from the whole regions are forwarded between them to reach the sink. This result in exhausting their energy quickly and partitioning the network. This is solved by changing the sink node position in Grid based clustering technique, which considers the optimal method for this purpose. A simulation with MATLAB can be applied for grid based clustering technique to evaluate the performance of WSN. The expected results deal with outperforms in throughput, reducing energy consumption and increasing residual energy, in addition to prolong the network lifetime of the sensor network.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
Abstract: With the increase in wireless communication, the necessary resources needed are getting scarcer. One of the resources is a spectrum. The electromagnetic spectrum is a natural resource that cannot be produced or destroyed. They should be used optimally. In older days, the spectrum is divided into portions and each portion is used by separate organizations. This is called static spectrum allocation. But, the organizations do not use the spectrum, fully both in case of time and in the case of bandwidth. The scarce resource spectrum is wasted. So, dynamic spectrum allocation is introduced. In this technique, the communication is done through the bandwidth which is free. So, wastage of bandwidth is reduced partially. In 2011, CWMN was introduced. In this type of network, there are two types of users. Primary licensed users, and secondary unlicensed users.
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
The main motive of this research is to study energy-efficient data-gathering mechanisms to
abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for
saving energy, as well as for management of network, because the patterns found can be used for
both decision making in applications and system performance tuning. Node distribution in WSNs is
either deterministic or self-organizing and application dependant. The sensor nodes in WSNs have
minimum energy and they use their energy for communication and sensing.
Congestion Control Clustering a Review PaperEditor IJCATR
Wireless Sensor Networks consists of sensor nodes which are scattered in the environment, gather data and transmit it to a
base station for processing. Energy conservation in the Wireless Sensor Networks (WSN) is a very important task because of their
limited battery power. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of
WSNs. In this paper, a priority based application specific congestion control clustering (PASCCC) protocol has been studied, which
often integrates the range of motion and heterogeneity of the nodes to detect congestion in a very network. Moreover a comparison of
the various clustering techniques has been done. From the survey it has been found that none of the protocol is efficient for energy
conservation. Hence the paper ends with future scope to overcome these issues.
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
This document describes the various clustering techniques used in wireless sensor networks. Wireless sensor networks are
having vast applications in all fields which utilize sensor nodes. Clustering techniques are required so that sensor networks can
communicate in most efficient way.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data
in a variety of environments, as the sensor operate on battery which is of limited power. To support high scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection
based on the node energy and the distance from base station to the cluster head for the efficient transmission and to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared with the LEACH algorithm in terms of energy consumption.
A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS B...csandit
With the development of new networking paradigms and wireless protocols, nodes with different capabilities are used to form a heterogeneous network. The performance of this kind of networks is seriously deteriorated because of the bottlenecks inside the network. In addition, because of the application requirements, different routing schemes are required toward one particular application. This needs a tool to design protocols to avoid the bottlenecked nodes and adaptable to application requirement. Polychromatic sets theory has the ability to do so. This paper demonstrates the applications of polychromatic sets theory in route discovery and protocols design for heterogeneous networks. From extensive simulations, it shows the nodes with high priority are selected for routing, which greatly increases the performance of the network. This demonstrates that a new type of graph theory could be applied to solve problems of complex networks.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and implementation of grid based clustering in WSN using dynamic sink ...journalBEEI
A wireless sensor networks (WSNs) play a significant application, especially in the monitored remoting environmental, which enables by the availability of sensors which are cheaper, smaller, and intelligent. The equipment of such sensors be with wireless interfaces, which a communication with other sensors occurs for creating a network, that contains many distributed nodes. The closest nodes to the sink are exploited at an enormous traffic load while the data from the whole regions are forwarded between them to reach the sink. This result in exhausting their energy quickly and partitioning the network. This is solved by changing the sink node position in Grid based clustering technique, which considers the optimal method for this purpose. A simulation with MATLAB can be applied for grid based clustering technique to evaluate the performance of WSN. The expected results deal with outperforms in throughput, reducing energy consumption and increasing residual energy, in addition to prolong the network lifetime of the sensor network.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
Abstract: With the increase in wireless communication, the necessary resources needed are getting scarcer. One of the resources is a spectrum. The electromagnetic spectrum is a natural resource that cannot be produced or destroyed. They should be used optimally. In older days, the spectrum is divided into portions and each portion is used by separate organizations. This is called static spectrum allocation. But, the organizations do not use the spectrum, fully both in case of time and in the case of bandwidth. The scarce resource spectrum is wasted. So, dynamic spectrum allocation is introduced. In this technique, the communication is done through the bandwidth which is free. So, wastage of bandwidth is reduced partially. In 2011, CWMN was introduced. In this type of network, there are two types of users. Primary licensed users, and secondary unlicensed users.
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
The main motive of this research is to study energy-efficient data-gathering mechanisms to
abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for
saving energy, as well as for management of network, because the patterns found can be used for
both decision making in applications and system performance tuning. Node distribution in WSNs is
either deterministic or self-organizing and application dependant. The sensor nodes in WSNs have
minimum energy and they use their energy for communication and sensing.
Congestion Control Clustering a Review PaperEditor IJCATR
Wireless Sensor Networks consists of sensor nodes which are scattered in the environment, gather data and transmit it to a
base station for processing. Energy conservation in the Wireless Sensor Networks (WSN) is a very important task because of their
limited battery power. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of
WSNs. In this paper, a priority based application specific congestion control clustering (PASCCC) protocol has been studied, which
often integrates the range of motion and heterogeneity of the nodes to detect congestion in a very network. Moreover a comparison of
the various clustering techniques has been done. From the survey it has been found that none of the protocol is efficient for energy
conservation. Hence the paper ends with future scope to overcome these issues.
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
This document describes the various clustering techniques used in wireless sensor networks. Wireless sensor networks are
having vast applications in all fields which utilize sensor nodes. Clustering techniques are required so that sensor networks can
communicate in most efficient way.
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...Editor IJMTER
In recent years there has been an increased focus on the use of sensor networks to sense and measure
the environment. This leads to a wide variety of theoretical and practical issues on appropriate protocols for data
sensing and transfer. Recent work shows sink mobility can improve the energy efficiency in wireless sensor
networks (WSNs). However, data delivery latency often increases due to the speed limit of mobile sink. Most of
them exploit mobility to address the problem of data collection in WSNs. The WSNs with MS (mobile Sink) and
provide a comprehensive taxonomy of their architectures, based on the role of the MS. An overview of the data
collection process in such a scenario, and identify the corresponding issues and challenges. A protocol named
weighted rendezvous planning (WRP) which is a heuristic method that finds a near-optimal traveling tour that
minimizes the energy consumption of sensor nodes. Focus on the path selection problem in delay-guaranteed
sensor networks with a path-constrained mobile sink. Concentrate an efficient data collection scheme, which
simultaneously improves the total amount of data and reduces the energy consumption. The optimal path is chosen
to meet the requirement on delay as well as minimize the energy consumption of entire network. Predictable sink
mobility is exploited to improve energy efficiency of sensor networks.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
This paper put forward a new strategy for selecting the most favorable cluster head in Stable
Election Protocol (SEP). The planned approach selects a node as cluster head if it has the maximum
energy among all the available nodes in that particular cluster. It considers diverse nodes and divides
nodes among normal, transitional and advance nodes. To handle the heterogeneity of the nodes, different
optimized probability density functions are selected. First node dead time explain the network stability
period and last node dead explain the overall network lifetime. The main pressure is to increase the time
when first node dies and also when last node dies. The projected strategy is designed and implemented in
the Matlab using mathematics toolbox. The projected algorithm is also compared with the some prominent
protocols like leach, E-LEACH, SEP and extended SEP
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
2. 176 Computer Science & Information Technology (CS & IT)
WSN consist of hundreds or thousands of small, cheap, battery-driven, spread-out nodes bearing
a wireless modem to accomplish a monitoring or control task jointly. Although a profusion of
routing mechanisms has been proposed for other wireless and mobile networks, the unique
characteristics of WSN suggest that WSN demand a specific solution. To have a clear and precise
focus on future research in WSN routing, the characteristics of WSN that have a strong impact on
routing must be identified. Then a set of criteria is defined against which the existing routing
protocols from ad hoc, sensor, and WSN can be evaluated and performance metrics identified.
This will serve as the basis for deriving the key design features for routing in wireless sensor
networks. An important concern is the network lifetime: as nodes run out of power, the
connectivity decreases and the network can finally be partitioned and become dysfunctional [2-3].
Routing in WSNs is a very challenging problem due to the inherent characteristics which
differentiate such networks from other wireless networks such as ad hoc networks and cellular
networks [2-4]. In recent years, many algorithms have been proposed for the routing issue in
WSNs. The minimum energy routing problem has been addressed [5-6]. The minimum total
energy routing approaches in these papers are to minimize the total consumed energy. However,
if all traffic is routed through the minimum energy path to the destination, the nodes along that
path will run out of batteries quickly rending other nodes useless due to the network partition
even if they do have available energy. Instead of trying to minimize the total consumed energy on
the path, the objective is to maintain the connected network as long as possible. If sensor nodes
consume energy more equitably, they continue to provide connectivity for longer, and the
network lifetime increases [5-10]. A number of potential solutions have been proposed, including
full end-to-end wireless access and ad-hoc networks. Industry has divergent views on some
parameters based upon their experience of designing wireless sensor network which includes
network components, properties of sensor nodes, degree of mobility, traffic pattern, energy
efficiency of sensor nodes, routing between sensor nodes. The Wireless Sensor Network has been
designed using different data structures such as graph, tree, linked list and other techniques like
neuro-fuzzy, swarm intelligence etc. A sufficient representation has been so far made to design
different computer network topologies using appropriate graph models. Graphs have huge
contributions towards the performance improvement factor of a network. Some major
contributors are de-Bruijn, Hypercube, Mesh and Pascal. As per the definition of interconnection
network it is equivalent that a suitable graph can represent the physical and logical layout very
efficiently. However, deploying these networks requires the installation of a large amount of
wireless sensor devices. The initial investment costs for deployment and the difficulty of
deployment in some environment settings have prevented the widespread realization of such
access networks. As sensor networks have specific requirements on energy saving, data-oriented
communication, and inter-connection between non-IP and IP, therefore sensor network dedicated
routing protocols may be required, for energy efficient routing scheme. In WSN there are the
routing protocols that minimize the used energy, extending subsequently the life span of the WSN
[8-9, 11-12]. Energy awareness is an essential in routing protocol design issue. Depending on the
network structure, routing in WSNs can be divided into:
a) Flat-based routing
b) Hierarchical-based routing
c) Location-based routing
Depending on the protocol operation, routing in WSNs can be divided into:
a) Multipath-based routing
b) Query-based routing
c) Negotiation-based routing
d) QoS-based routing
e) Coherent based routing
3. Computer Science & Information Technology (CS & IT) 177
Against this backdrop, the present study first attempts to make a comparative analysis of different
graph topologies on the identified features of wireless sensor network and propose an energy
efficient routing algorithm in wireless sensor network designed using Pascal graph topology. In
this paper, we revisit this main idea is to design a suitable algorithm to create topology in wireless
sensor network using Pascal Graph. The article is organized as follows. Section 2 briefly reviews
different techniques and Section 3 deals with a precise description of our methodology. Section 4
is devoted to design issues and section 5 emphasizes on discussion of the study. Finally, Section 6
concludes the paper and gives suggestions for future work.
2. LITERATURE REVIEW
Architectural design issues and their implications pertaining to the Wireless Sensor Network have
been observed by host of scholars. The issues related to network dynamics depends on three main
components in a sensor network. These are the sensor nodes, sink and monitored events. Aside
from the very few setups that utilize mobile sensors [13], most of the network architectures
assume that sensor nodes are stationary .On the other hand, supporting the mobility of sinks or
cluster-heads (gateways) is sometimes deemed necessary [14]. Routing messages from or to
moving nodes is more challenging since route stability becomes an important optimization factor,
in addition to energy, bandwidth etc. The sensed event can be either dynamic or static depending
on the application [15]. Another consideration is the topological deployment of nodes. This is
application dependent and affects the performance of the routing protocol. The deployment is
either deterministic or self-organizing. In deterministic situations, the sensors are manually placed
and data is routed through pre-determined paths. However in self-organizing systems, the sensor
nodes are scattered randomly creating an infrastructure in an ad hoc manner [16-19]. During the
creation of an infrastructure, the process of setting up the routes is greatly influenced by energy
considerations. Since the transmission power of a wireless radio is proportional to distance
squared or even higher order in the presence of obstacles, multi-hop routing will consume less
energy than direct communication. However, multi-hop routing introduces significant overhead
for topology management and medium access control. Direct routing would perform well enough
if all the nodes were very close to the sink [17]. Most of the time sensors are scattered randomly
over an area of interest and multi-hop routing becomes unavoidable. Depending on the
application of the sensor network, the data delivery model to the sink can be continuous, event-
driven, query-driven and hybrid [15]. In the continuous delivery model, each sensor sends data
periodically. In event-driven and query-driven models, the transmission of data is triggered when
an event occurs or a query is generated by the sink. Some networks apply a hybrid model using a
combination of continuous, event-driven and query-driven data delivery. The routing protocol is
highly influenced by the data delivery model, especially with regard to the minimization of
energy consumption and route stability. For instance, it has been concluded in [20] that for a
habitat monitoring application where data is continuously transmitted to the sink, a hierarchical
routing protocol is the most efficient alternative. This is due to the fact that such an application
generates significant redundant data that can be aggregated on route to the sink, thus reducing
traffic and saving energy. In a sensor network, different functionalities can be associated with the
sensor nodes. In earlier works shown in [21-23], all sensor nodes are assumed to be homogenous,
having equal capacity in terms of computation, communication and power. However, depending
on the application a node can be dedicated to a particular special function such as relaying,
sensing and aggregation since engaging the three functionalities at the same time on a node might
quickly drain the energy of that node. Some of the hierarchical protocols proposed in the
literature designate a cluster-head different from the normal sensors. While some networks have
picked cluster-heads from the deployed sensors [17-19] in other applications a cluster-head is
more powerful than the sensor nodes in terms of energy, bandwidth and memory [13, 18]. In such
cases, the burden of transmission to the sink and aggregation is handled by the cluster-head. Since
sensor nodes might generate significant redundant data, similar packets from multiple nodes can
4. 178 Computer Science & Information Technology (CS & IT)
be aggregated so that the number of transmissions would be reduced. Data aggregation is the
combination of data from different sources by using functions such as suppression (eliminating
duplicates), min, max and average [24]. Some of these functions can be performed either partially
or fully in each sensor node, by allowing sensor nodes to conduct in-network data reduction [22,
25-26]. Recognizing that computation would be less energy consuming than communication [17],
substantial energy savings can be obtained through data aggregation. This technique has been
used to achieve energy efficiency and traffic optimization in a number of routing protocols [22,
24-28]. In some network architectures, all aggregation functions are assigned to more powerful
and specialized nodes [13]. Data aggregation is also feasible through signal processing
techniques. In that case, it is referred as data fusion where a node is capable of producing a more
accurate signal by reducing the noise and using some techniques such as beam forming to
combine the signals [17]. The growing interest in wireless sensor networks and the continual
emergence of new architectural techniques inspired some previous efforts for surveying the
characteristics, applications and communication protocols for such a technical area[15,
23].Taxonomy of the different architectural attributes of sensor networks is developed using
different models [15]. Flooding and gossiping [29] are two classical mechanisms to relay data in
sensor networks without the need for any routing algorithms and topology maintenance. Although
flooding is very easy to implement, it has several drawbacks [24]. Such drawbacks include
implosion caused by duplicated messages sent to same node, overlap when two nodes sensing the
same region send similar packets to the same neighbour and resource blindness by consuming
large amount of energy without consideration for the energy constraints [29]. Gossiping avoids
the problem of implosion by just selecting a random node to send the packet rather than
broadcasting. However, this cause delays in propagation of data through the nodes. A growing
body of literature suggests fundamental problems of topological design in computer technology
[30-34]. These problems have been resolved in form of classes of Pascal graph with extreme
topological parameters that correspond to the parameters of speed of information transmission,
productivity, and security with limitations in costs [35]. In the phase of topological design, the
computer network is represented in graph [36-37] form whose vertices correspond to the nodes of
information processing, and edges correspond to the communication lines. The ontogeny of
Pascal Graph (PG) was Pascal Matrix (PM) that in turn was generated meticulously from Pascal’s
triangle [37]. Scientists have been putting a lot of efforts in ameliorating computer network
properties [38]. Wide varieties of graph model worked as resource to their brainstorming
contribution in this field [39]. Pascal Graph (PG) [37] is one of those resources and played a
significant role as soon as its exploration was initiated almost two decades back. As a
consequence, several similar graph models emerged in this area with laudable potentials to be
used as computer network topologies [37]. For reliability or security considerations, some
networks may be required to provide more than one distinct path for each node pair, there by
resulting in a minimum degree of connectivity between the nodes [39].The maximum
connectivity is desirable since it corresponds to not only the maximum fault tolerance of the
network but also the maximum number of internally disjoint paths between any two distinct
vertices. However, connectivity number can be at most equal to the degree of the network graph
[40-42]. Routing in WSNs is a very challenging problem due to the inherent characteristics which
differentiate such networks from other wireless networks such as ad hoc networks and cellular
networks [11-12]. In recent years, many algorithms have been proposed for the routing issue in
WSNs. The minimum energy routing problem has been addressed in the literature review of
several scholarly articles [11-12, 43]. The routing protocols that minimize the used energy,
extending subsequently the life span of the WSN [7]. The minimum total energy routing
approaches in these papers are to minimize the total consumed energy. However, if all traffic is
routed through the minimum energy path to the destination, the nodes along that path will run out
of batteries quickly rending other nodes useless due to the network partition even if they do have
available energy. Instead of trying to minimize the total consumed energy on the path, the
objective is to maintain the connected network as long as possible. If sensor nodes consume
5. Computer Science & Information Technology (CS & IT) 179
energy more equitably, they continue to provide connectivity for longer, and the network lifetime
increases [11-13].
3. METHODOLOGY
The proposed methodology involved in this study entails following 2 phases:
3.1. Phase I - Deep investigation
For achieving reliable results and excellent efficiency of the problem solution, further in depth
literature review has been done. The literature review is done in section 2.
3.2. Phase II - Designing & Development
In this phase, solution of the identified problem has been developed for onward analysis,
efficiency and reliability measures during modelling and simulation. The proposed solution has
been reconsidered based on the analysis of the results of simulations for further improvement of
the solution. Section 4 illustrates the design principles and discussed in section 5.
4. DESIGNING WITH PASCAL GRAPH
4.1. Pascal Graph and method for designing topology
An undirected graph of n vertices corresponding to PM (n) as an adjacency matrix is called Pascal
Graph (n), where n is the order of the Pascal graph [37]. The following graph has been drawn
from the Pascal Matrix. The following are the example of Pascal Graph PG (3) and PG (5)
derived from Pascal Matrix PM (3) and PM (5) respectively. An (n x n) symmetric binary matrix
is called the Pascal Matrix PM(n) of order n if its main diagonal entries are all 0’s and its lower
(and therefore the upper also) consists of the first (n-1) rows of Pascal Triangle modulo 2. Where
PMi,j denotes the element of ith
row and jth
column of the Pascal Matrix [37]. The topology design
depends on the properties of Pascal Graph described in the section 4.2. We carry out the usual
text data transformation that consists in extracting graphs of valued associations between
attributes from collections of separate documents. Let us formally review this process that
transforms individual data into relational data to which we can refer as network data. The Pascal
Graph Topology (PGT) can provide a reliable node and shortest path with minimum of one hop
count and maximum of two hops using the first node. The design paradigm is such that the first
node behaves as the most dependable node but the failure of such node also creates problems in
the topology.
6. 180 Computer Science & Information Technology (CS & IT)
The following example shows the Pascal Matrix of PM (3) and PM (5) and the corresponding
Pascal Graph in figure 1.
Figure 1. Pascal Graph with 3 and 5 nodes
Suppose the graph G has n vertices and m edges and the graph G = (V;E) denote the ad-hoc
network before running the topology control algorithm, with V being the set of ad-hoc nodes,
and E representing the set of communication links. The n×m incidence matrix of G, denoted by
IG has one row per vertex and one column per edge. The column corresponding to edge {i, j} of
IG is zero except for the i-th and j-th entries, which are (Eij)0.5
and − (Eij)0.5
respectively, where Eij
is the corresponding edge weight. Note that there is some ambiguity in this definition, since the
positions of the positive and negative entries seem arbitrary. However this ambiguity will not be
important to us. The graph representation offers the advantage that it allows for a much more
expressive document encoding than the more standard bag of words/phrases approach, and
consequently gives improved classification accuracy. Document sets are represented as graph sets
to which a weighted graph mining algorithm is applied to extract frequent sub-graphs, which are
then further processed to produce feature vectors (one per document) for classification. Weighted
sub-graph mining is used to ensure classification effectiveness and computational efficiency; only
the most significant sub-graphs are extracted. The approach is validated and evaluated using
several popular classification algorithms together with a real world textual data set. The results
demonstrate that the approach can outperform existing text classification algorithms on some
dataset. When the size of dataset increased, further processing on extracted frequent features is
essential. In a weighted graph G = (V;E) every edge (u; v) is attributed a weight ωuv. When
referring to a weighted graph we assume that the weights are symmetric: ωuv = ωvu. The nodes of
a Euclidean graph are assumed to be located in a Euclidean plane. Furthermore the edge weight of
an edge (u; v) is defined to be ωuv = |uv|, where |uv| is the Euclidean distance between the nodes u
and v. Note that the definition of Euclidean graphs does not contain a statement on the existence
of certain edges. There is a link (u; v) in E if and only if the two nodes u and v can communicate
directly. Running the topology control algorithm will yield a sparse sub-graph Gtc = (V;Etc) of G,
where Etc is the set of remaining links. The resulting topology Gtc should be symmetric, that is,
node u is a neighbour of node v if and only if node v is a neighbour of node u. Although a
minimum spanning tree (MST) is a sparse connected sub-graph, it is often not considered a good
topology, since close-by nodes in the original graph G might end up being far away in Gtc (G
being a ring, for instance). For any two nodes u and v, if the optimal path between u and v in G
has cost c, then the optimal path between u and v in Gtc has cost f(c). If f(c) is bounded from
above by a linear function in c, the graph Gtc is called a spanner. Researchers have studied a
selection of cost metrics, the most popular being i) Euclidean distance and ii) various energy
7. Computer Science & Information Technology (CS & IT) 181
metrics. The cost of a link in model i) is the Euclidean distance of the link, in model ii) the
distance is raised to a predefined power. The remaining graph Gtc should be sparse, that is, the
number of links should be in the order of the number of nodes. It follows that from the
similarity analysis point of view, the intersection graph GO(K,E) of H defines the co-word
graph having as many edges as there are non-null values in a similarity matrix.
4.2. Properties of Pascal Graph and generation method
There are certain pragmatic properties that make Pascal graph a better choice for a computer
network topology over many others [40]. Some of those properties are given below:
PG(n) is a sub-graph of PG(n+1) ∀ n ≥ 1 [37].
All Pascal Graph PG(i) for i ≤ 1 ≤ 7 are planner; all Pascal Graph of higher order are
non-planner [44].
Ιn the Pascal Graph, Vertex V1 is adjacent to all other vertices and Vertex Vi is adjacent
to Vi+1 for i ≥ 1 [40].
In the Pascal Graph, two even numbered vertices are never connected and adjacent to
each other.
More than one node except V1 in Pascal Graph has special properties in terms of
connectivity.
If k=2n +1, n is a positive integer and then Vk is adjacent to all Vi [44].
All Pascal Graph of order ≥ 3 are 2-connected [37].
There are at least two edge disjoint path of length ≤ 2 between any two distinct vertices
in PG(n), 3 ≤ n [44].
If Vi is adjacent to Vj, where j is even and |i-j|>1, then i is odd and Vi is adjacent to Vj-1
[44].
Let det(PM(n)) refer to the determinant of the Pascal matrix of order n. Then,
Det(PM(n)) is even, for all n ≥ 3 and det(PM(n)) = 0, for all even n ≥ 4 [44].
Ιn the Pascal Graph, V1 is considered to be most dependable and reliable node, the
properties of Vk have few similar properties of V1 for k=2n +1 where n is a positive
integer.
The following steps will generate a Pascal Graph:
Step 1: Enter p number of vertices to form a graph G = (V;E).
Step 2: Initialized LT[p,0] = 1;
Step 3: From the lower left triangle [LT(p,p)] by adding the number directly above and to the left
with the number directly above and to the right to find the new value. If either the number to the
right or left is not present, substitute a zero to its place [44].
Step 4: From the upper right triangle [UT(p,p)] using the same manner the generic Pascal Matrix
is formed.
Step 5: Convert the lower left and upper right triangle into binary values by using modulo
approach.
Step 6: From the final adjacency matrix [PM(p,p)] of with LT(p,p) and UT(p,p).
Step 7: Stop.
If we consider a Pascal graph containing n nodes i.e. PG(n) then by default vi ( i ≥ 1) is adjacent
to all other nodes [37]. The exploration does not conclude with it as the nodes have different
properties which need to be explored further. We have found and recommended other node
similar to V1 in the PG(n) and termed it as Dependable Node of Pascal Graph (DNP); the special
node, other than node V1, of Pascal graph PG(n) with same degree like v1 [44]. The node V1 is
8. 182 Computer Science & Information Technology (CS & IT)
called most dependable and reliable node in terms of routing and path optimization in the graph.
To satiate our claim and to rationalize the whole thing we have used very simplistic approach [40,
41].
The explanation with some suitable example is given below.
Case 1: m = 2(log m)
Case 2: m π 2[log m]
Case N: m = 2[log m]+1
To establish the new property, we are supposed to generate the index i of DNP.
For Case 1: i = 2(log m) − 1 +1, where i φ 1
For Case 2: i = 2[log m] +1 where i φ 1
For Case N: i = 2[log m] − 1 +1 and i = 2[log m] +1, where i φ 1
The formation of Pascal graph depends on DNP and its properties. The graph has mesh network
but minimum number of connectivity as per requirements. There are atleast two paths available
between nodes and V1 can provide connectivity with minimum hop count between any nodes. The
similar property can be found with the nodes have same functionality with V1 as per the formation
of graph.
The design of Pascal Graph from Pascal Matrix showed the existence of Dependable nodes of
Pascal Graph (DNP) along with V1 where there is a full connectivity with other nodes. The graphs
are not planner in the case of PG(n) with N>7 but the connectivity is not as complex as we have
more than two dependable nodes in some cases. The Table 1 gives the list of DNP in case of
Pascal Graph where n > 7.
Table 1. List of DNP
PG(n) i DNP Degree
8 5 V5 7
9 5, 9 V5, V9 8
10 9 V9 9
11 9 V9 10
12 9 V9 11
13 9 V9 12
14 9 V9 13
15 9 V9 14
16 9 V9 15
5. DISCUSSION
There are many other studies related to design using graph. Geibel and Wysotzki proposed a
method to derive induced sub-graphs of graph data and to use the induced sub-graphs as attributes
on decision tree approaches [45-46]. Their method can be used to find frequent induced sub-
graphs in the set of graph data. However, the upper limit number of the vertices to be included in
the sub-graph must be initially specified to avoid the exponential explosion of the computational
time, and thus the search is not complete. Liquiere and Sallantin proposed a method to completely
search homomorphically equivalent sub-graphs which are the least general over a given set of
9. Computer Science & Information Technology (CS & IT) 183
graphs and do not include any identical triplet of the labels of two vertices and the edge direction
between the vertices within each sub-graph [47].
Figure 2. Mesh-Pascal(a,b,n)-Graph
From the Figure 2, we can find that it is forming a well-connected graph compared to other
graphs. Pascal graph is best among them in terms of diameter but it is worse in terms of
maximum degree of a node and total number of edges. On the other hand, ring and mesh perform
well in terms of maximum degree of a node and total number of edges, but they both perform
poorly in terms of diameter of graph. The proposed graph gives a standard measurement in terms
of degree, diameter and total number of edges. The only graph which comes close to it is
hypercube graph. But the hypergraph fails measurably compared to the proposed graph model
when we consider total number of edges, reliability of the network and expansion-contraction of
the network. If we expand the hypercube from the dimension q to q+1, it would reconfigure 2q
number of nodes (which increases exponentially). But the proposed model improved by adding
nodes to PGN (Pascal Graph Network), so we have to reconfigure a few member of nodes to get a
better network as in Mesh-Pascal Graph(ab,n), multiple path exists between two nodes and the
network can be more reliable and fault tolerant for that reason.
The proposed model is good enough with comparison to other WSN network model since it gives
minimal degree and diameter but maximum reliability and expansion. The entire simulation tested
by using a very well-known simulator NS2 where different Pascal Graph topology has been
designed. The three topologies shown in figures 3,4,5 below; where we have tested with 2 nodes,
3 nodes and 4 nodes for the testing of Pascal Graph property. We have also tested with more
number of nodes as per the topology shown in Figure 1. The different network protocols has been
designed and implemented in NS2 simulator. NS2 includes a tool for viewing the simulation
results, called NAM; NAM is an animation tool for viewing network simulation traces and real
world packet data. The first step to use NAM is to produce trace file containing topology
information for nodes and links which generated by NS Tcl/Tk script. During the simulation, we
have designed topology configuration and layout information for Pascal Graph, tracing events
using NS and visualize with NAM. Based on the simulation various graphs has been plotted to
demonstrate the performance of Pascal Graph. We have tried to show the results of the simulated
routing and sensor node energy. Using the same topology we have compared Pascal graph
network with existing WSN network model using NS2. The graph shows the performance of
PGN and the routing is better in comparison with other WSN network since the first node is
effective for minimum cost routing in terms of different factors of energy efficient node
optimized routing mechanism. PGN always tries to find shortest path using first node which is
also called most dependable node. This is one of the major drawbacks of PGN. So the energy
10. 184 Computer Science & Information Technology (CS & IT)
consumption by the nodes which has higher connectivity is more and they are dependable nodes
as well. So we considered the energy efficiency of dependable nodes and the performance also
being demonstrated in time frame and it is one of the major issues in PGN that the energy
consumption is higher in case of DNP and this can be one of the major factors of routing as well.
The following figures illustrate the PGN and performance of the network designed in NS2
simulator.
Figure 3. Pascal Graph with two nodes
Figure 4. Pascal Graph with three nodes
11. Computer Science & Information Technology (CS & IT) 185
Figure 5. Pascal Graph with four nodes
Figure 6. The bandwidth cost for data
Figure 7. The number of route discovery
12. 186 Computer Science & Information Technology (CS & IT)
Figure 8. WSN node life and energy drain with respect to time after increasing hops
6. CONCLUSION AND FUTURE SCOPE OF STUDY
In this paper we have proposed new WSN routing algorithm by using Pascal Graph. Many new
routing and MAC layer protocols and different techniques have been proposed for WSN network
and most of them trying to resolve the resource constrained for unattended wireless sensor
environment, The majority of all the protocols mainly Concentrate on energy efficiency of sensor
nodes, however sensor application have very important role specially in critical applications like
the defence and health where the accuracy and guaranteed data transfer timely is an important
issue. In the same way with some more specific sensor applications where the data type is mainly
image and movie is supposed to be transfer, we required more accuracy and guarantee for timely
data transfer. Hence transfer of data in such cases mainly requires QoS aware routing network
management in order to ensure efficient usage of the sensor nodes. We already start working on a
proposed and approved project from Deanship of scientific research, KFU, related to the QoS of
WSN as it has a very key role for enhancing WSN efficiency and even its life, with that project
we will focus on operational and architectural challenges of handling QoS routing traffic in
sensor network and will propose a new mechanism for QoS based routing protocol to further
enhance WSN life. On other hand, as we know that wireless sensor network (WSN) becomes
more attractive area for the researchers now day, due to the wide range of its application areas
and due to the distributed and deployment nature of these networks in remote areas, these
networks are vulnerable to numerous security threats that can adversely affect their proper
functioning. This problem is more critical if the network is deployed for some mission-critical
applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-
life deployment scenarios.
ACKNOWLEDGEMENTS
Authors would like to thank their colleagues and students of Sir Padampat Singhania
University for their valuable help and support.
13. Computer Science & Information Technology (CS & IT) 187
REFERENCES
[1] Jamal N. Al-Karaki, Ahmed E Kamal, (2004), "Routing Techniques in Wireless Sensor Network: A
Survey", IEEE Wireless Communication, accessed at
http://www.ics.uci.edu/~dsm/ics280sensor/readings/networks/routing-survey.pdf on 1.1.2013.
[2] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, (2002), "A Survey on Sensor
Network", IEEE Communication Magazine, vol. 40, no.8, pp. 102 – 116.
[3] N. Bulusu, J. Heidemann, and D. Estrin, (2000), “GPS-less Low Cost Out Door Localization for Very
Small Devices,” Tech. rep. 00729, Comp. Sci. Dept., USC, Vol. 7(5), pp. 28 – 34.
[4] Q. Cao, T. Abdelzaher, T. He, and R. Kravets, (2007), "Cluster-Based Forwarding for Reliable End-
to-End Delivery in Wireless Sensor Networks", 6th IEEE International Conference on Computer
Communications. IEEE , vol., no., pp. 1928-1936.
[5] Ettus, M., (1998), "System Capacity, Latency, and power consumption in multihop-routed SSCDMA
wireless networks", Proc. of RAWCON'98, pp. 55-58.
[6] Rodoplu, V. and T. H. Meng, (1999), "Minimum energy Mobile wireless networks", IEEE JSAC,
vol.17, no.8, pp. 1333-1344.
[7] Bhardwaj, M. and A. Chandrakasan, (2002), "Bounding the lifetime of sensor networks via optimal
role, assignments", Proc. of the INFOCOM'02, pp. 1587-1596.
[8] Chang. J H., Tassiulas, L., (2000), "Energy conserving routing in wireless ad-hoc networks",
INFOCOM, Nineteenth Annual Joint Conference of the IEEE Computer and Communications
Societies Proceedings, IEEE , vol.1, no., pp.22-31.
[9] Chang, J. H. and L. Tassiulas, (2004), "Maximum lifetime routing in wireless sensor networks",
IEEE/ACM Trans. on Networking, vol.12, no.4, pp. 609-619.
[10] Zussman, G. and A. Segall, (2003), "Energy efficient routing in Ad Hoc disaster recovery networks",
Proc. of the INFOCOM'03, pp.682-691.
[11] A. K. Sadek, W. Su, and K. J. R. Liu, (2007), "Multi node cooperative communications in wireless
networks," IEEE Trans. Signal Processing, vol. 55, no. 1, pp. 341-355, 2007.
[12] A. K. Sadek, Z. Han, and K. J. Ray Liu, (2006), "A distributed relay-assignment algorithm for
cooperative communications in wireless networks," in Proc. IEEE International Conference on
Communications (ICC), vol. 4, pp. 1592-1597.
[13] Subramanian, L., Katz, R.H., (2000), "An architecture for building self-configurable systems", in:
Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, pp. 63-72.
[14] Ye,F., et al., (2002), "A two-tier data dissemination model for large scale wireless sensor networks",
in: Proceedings of the 8th annual international conference on Mobile computing and networking, pp.
148-159.
[15] Tilak, S., et al., (2002), "A taxonomy of wireless micro sensor network models, Mobile Computing
and Communications", Review 6 (2), pp. 28–36.
[16] Sohrabi, K., et al., (2000), "Protocols for self-organization of awireless sensor network", IEEE
Personal Communications 7(5), pp. 16–27.
[17] Heinzelman, W, Chandrakasan, A., Balakrishnan, H., (2000), "Energy-efficient communication
protocol for wireless sensor networks", in: Proceeding of the Hawaii International Conference System
Sciences, Hawaii, 8(8), pp. 929-942.
[18] Younis, M., Youssef, M., Arisha, K., (2002), "Energy-aware routing in cluster-based sensor
networks," Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002.
MASCOTS 2002. Proceedings. 10th IEEE International Symposium on , vol., no., pp. 129- 136.
[19] Manjeshwar A, Grawal DP. TEEN: A protocol for enhanced efficiency in wireless sensor networks.
Proceeding of the 15th Parallel and Distributed Processing Symp. San Francisco: IEEE Computer
Society, 2001, pp. 2009-2015.
[20] Heinzelman, W., (2000), "Application specific protocol architectures for wireless networks", PhD
Thesis, MIT, accessed at http://www.sigmobile.org/phd/2000/theses/heinzelman.pdf on 1.1.2013.
[21] Katz, R. H., Kahn, J. M., Pister, K. S. J., (1999), "Next century challenges: mobile networking for
“Smart Dust” ", in: Proceedings of the 5th annual ACM/IEEE international conference on Mobile
computing and networking, pp. 271-278.
[22] Intanagonwiwat, C., Govindan, R., Estrin, D., (2000), "Directed diffusion: a scalable and robust
communication paradigm for sensor networks", in: Proceedings of the 6th annual international
conference on Mobile computing and Networking, pp. 56-67.
14. 188 Computer Science & Information Technology (CS & IT)
[23] Estrin, D., et al., (1999), "Next century challenges: scalable coordination in sensor networks", in:
Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and
networking, pp. 263-270.
[24] Heinzelman, W., Kulik, J., Balakrishnan, H., (1999), "Adaptive protocols for information
dissemination in wireless sensor networks", in: Proceedings of the 5th annual ACM/IEEE
international conference on Mobile computing and networking, pp. 174-185.
[25] Lindsey, S., Raghavendra, C. S., (2002), "PEGASIS: Power-efficient gathering in sensor information
systems," Aerospace Conference Proceedings, IEEE, vol.3, no., pp. 3-1125- 3-1130.
[26] Krishnamachari, B., Estrin, D., Wicker, S., (2002), "Modeling data centric routing in wireless sensor
networks", in: Proceedings of IEEE INFOCOM, New York, pp 142.
[27] Braginsky, D., Estrin, D., (2002), "Rumor routing algorithm for sensor networks", in: Proceedings of
the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA., accessed at
www.cs.wmich.edu/wsn/doc/rumor/Rumor.pdf on 1.1.2013.
[28] Schurgers, C., Srivastava, M. B., (2001), "Energy efficient routing in wireless sensor networks,"
Military Communications Conference, 2001. MILCOM, Communications for Network-Centric
Operations: Creating the Information Force, IEEE, vol.1, no., pp. 357- 36.
[29] Akyildiz,I.F., et al., (2002), "Wireless sensor networks: a survey", Computer Networks 38 (4), 393–
422.
[30] Hedetniemi,S., Liestman,A., (1998), "A survey of gossiping and broadcasting in communication
networks", Networks 18 (4), 319–349.
[31] Shah, R.C.; Rabaey, J.M., (2002), "Energy aware routing for low energy ad hoc sensor networks,"
Wireless Communications and Networking Conference, WCNC2002, IEEE, vol.1, no., pp. 350- 355.
[32] Petrek. J., (2002), "A New Assignment Algorithm for Star Network Topology Design", In: 9th IEEE
International Conference on Electronics, Circuits and Systems ICECS 2002. Dubrovnik. Croatia, 15.-
18.9.., pp. 789-792.
[33] Latha. S. & Srivastava., S. K., (2007), "On Some Aspects of Design of Cheapest Survivable
Networks", IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.11,
pp. 210.
[34] Kamalesh., V. N, & Srivastava., S. K., (2009), "Topological Design of Minimum Cost Survivable
Computer Communication Networks: Bipartite Graph Method", International Journal of Computer
Science and Information Security, Vol. 3, No. 1, accessed at http://arxiv.org/pdf/0908.1033 on
1.1.2013.
[35] Berna. D., et al., (1995), "A Genetic Algorithm Approach to Optimal Topological Design of All
Terminal Networks, Proceedings of the Artificial Neural Networks in Engineering Conference
ANNIE`95, University of Missouri-Rolla, St. Louis, Missouri, USA, Nov.12-15, pp. 405-411.
[36] Mason., L., et al., (2006), "Topological Design and Dimensioning of Agile All Photonic Networks",
accessed at http://www.tsp.ece.mcgill.ca/Networks/projects/pdf/ mason_JournalCompComm06.pdf,
on 1.1.2013.
[37] Deo, N., and Quinn, Michael J. (1983), "Pascal Graphs and their properties", Fibonacci Quarterly,
Vol. 21, No. 3: pp 203 – 214.
[38] Mir, N. F., (2002), “Analysis of High Speed Interconnection Network”, Journal of Interconnection
Networks, vol. 3, pp. 49-65.
[39] Bhattacharya, U. and Chaki, R., (2000), “A New Scalable Topology for Multihop Optical Network”
ASIAN, pp. 263-272.
[40] Chatterjee, S., Sarma, S. S., (2004), "In Search Of A Versatile And Flexible Graph Model To
Implement Computer Network", Proceedings of International Conference on Communications,
Devices and Intelligent Systems (CODIS): pp. 635 – 638.
[41] Kamalesh, V. N and Srivatsa,S. K., (2007), "Numbering of nodes in computer communication
networks: A brief review", National Conference on Advanced Network Technologies and Security
Issues, FISAT, Cochin, Kerala, India, pp. 278-282.
[42] West, D. B, (2001), "Introduction to Graph Theory", Pearson Education, inc 2nd Edition.
[43] Xu, J., (2002), "Topological Structure and Analysis of Interconnection Networks", Kluwer Academic
Publishers.
[44] Pal, S. and Sarma, S. S., (2010), "Computer Network Topology Design in Limelight of Pascal Graph
Property", International Journal of Next-Generation Networks 2.1, pp. 30-35.
[45] Watts, D.J. (1999), "Small Worlds: The Dynamics of Networks between Order and Randomness",
Princeton, NJ: Princeton University Press, pp. 266.
15. Computer Science & Information Technology (CS & IT) 189
[46] Geibel, P and Wysotzki, F., (1996), "Learning relational concepts with decision trees", In ICML'96:
13th Int. Conf. Machine Learning, pp. 166-174.
[47] Liquiere, M. and Sallantin, J., (1998), "Structural machine learning with galois lattice and graphs", In
ICML'98: 15th Int. Conf. Machine Learning, pp. 305-313.
AUTHORS
Ms. Deepali Panwar is currently a M.Tech student in the department of Computer Science
and Engineering of Sir Padampat Singhania University. She has received B.Tech with
honours degree from Rajasthan Technical University in the year 2010. She has teaching
experience of one year from Govt. polytechnic college, kota. Her research interest lies in
Wireless Sensor Networks.
Mr. Subhrendu Guha Neogi is currently working as Assistant Professor in the depa
rtment of Computer Science and Engineering of Sir Padampat Singhania University. He
has been awarded Masters in Engineering from West Bengal University of Technology.
He has more than 10 years of experience in teaching. He served many reputed
educational Institutes in India in various positions.