The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
This document proposes a novel sleep scheduling method for event monitoring in wireless sensor networks to achieve low broadcasting delay. The method uses a level-by-level offset schedule where when a node detects a critical event, it transmits an alarm message along a predetermined path with offsets between nodes to avoid collisions. It then uses a colored connected dominant set to establish paths for the center node to broadcast the alarm to other nodes. The proposed system is intended for applications like military and forest fire monitoring where quick dissemination of alarm messages is important.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
This document summarizes various techniques for saving energy in wireless sensor networks. It discusses how sensor nodes consume power through transmission, reception, processing and idle listening. It then describes approaches like sleep-wake scheduling, MAC protocols like S-MAC and T-MAC, in-network processing, network coding and scheduled/contention-based communication protocols to minimize energy usage. The goal is to reduce unnecessary listening and maximize the time sensors spend in sleep mode to improve battery life for sensor network applications.
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
This document presents a technique called single sink repositioning to extend the lifetime of wireless sensor networks. Sensor nodes have limited battery power, so energy consumption must be managed carefully. In typical static sink networks, nodes farther from the sink expend more energy transmitting data and drain their batteries quicker, shortening network lifetime. The proposed approach tracks the distance of each node to the sink and calculates an optimal sink position to minimize distances. It simulates moving the sink to this position using an algorithm in NS-2. Simulation results show repositioning the sink achieves significant energy savings compared to static sinks, helping improve overall network lifetime.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
This document proposes a novel sleep scheduling method for event monitoring in wireless sensor networks to achieve low broadcasting delay. The method uses a level-by-level offset schedule where when a node detects a critical event, it transmits an alarm message along a predetermined path with offsets between nodes to avoid collisions. It then uses a colored connected dominant set to establish paths for the center node to broadcast the alarm to other nodes. The proposed system is intended for applications like military and forest fire monitoring where quick dissemination of alarm messages is important.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
This document summarizes various techniques for saving energy in wireless sensor networks. It discusses how sensor nodes consume power through transmission, reception, processing and idle listening. It then describes approaches like sleep-wake scheduling, MAC protocols like S-MAC and T-MAC, in-network processing, network coding and scheduled/contention-based communication protocols to minimize energy usage. The goal is to reduce unnecessary listening and maximize the time sensors spend in sleep mode to improve battery life for sensor network applications.
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
This document presents a technique called single sink repositioning to extend the lifetime of wireless sensor networks. Sensor nodes have limited battery power, so energy consumption must be managed carefully. In typical static sink networks, nodes farther from the sink expend more energy transmitting data and drain their batteries quicker, shortening network lifetime. The proposed approach tracks the distance of each node to the sink and calculates an optimal sink position to minimize distances. It simulates moving the sink to this position using an algorithm in NS-2. Simulation results show repositioning the sink achieves significant energy savings compared to static sinks, helping improve overall network lifetime.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
This document discusses approaches to improve reliability in wireless sensor networks. It proposes a dynamic sectoring scheme where the network area is divided into sectors with a sensor node assigned as sector head for each. When an event occurs, only that sector is activated, reducing congestion and energy use. This is expected to enhance packet delivery ratio and reduce losses. Prior work on using data fusion and opportunistic flooding algorithms to improve reliability is also reviewed. The dynamic sectoring approach aims to reliably transmit data with low congestion and energy usage.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses localization techniques in wireless sensor networks (WSNs). It begins with an introduction to WSNs and their applications that require location information. While GPS could provide location data, it is not practical for WSNs due to cost and physical constraints. The document then categorizes localization methods as range-based, which use distance or angle measurements, and range-free, which do not directly measure distance. Specific techniques like time of arrival, received signal strength, and DV-Hop localization are described. The document concludes with classifications of localization methods and topics for future work.
This document provides an outline and overview of a presentation titled "Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation". The presentation discusses using Constrained Delaunay Triangulation as a coverage strategy to provide fault tolerance, event reporting, and energy efficiency in wireless sensor networks. It outlines the proposed work, which includes deploying sensors, distributed greedy algorithm for coverage, Constrained Delaunay Triangulation algorithm, and selection of backup nodes. Simulation results are presented comparing the proposed approach to traditional approaches.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
Abstract Wireless sensor network (WSNs) are self-organized systems that depend on highly distributed and scattered low cost tiny devices. These devices have some limitations such as processing capability, memory size, communication distance coverage and energy capabilities. In order to maximize the autonomy of individual nodes and indirectly the lifetime of the network, most of the research work is done on power saving techniques. Hence, we propose energy-aware load distribution technique that can provide an excellent data transfer of packets from source to destination via hop by hop basis. Therefore, by making use of the cross-layer interactions between the physical layer and the network layer thus leads to an improvement in energy efficiency of the entire network when compared with other protocols and it also improves the response time in case of network change. Keywords:- wireless sensor network, energy-aware, load distribution, power saving, cross layer interactions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BeeSensor routing protocol for wireless sensor networkSonam Jain
This document describes a seminar submitted by Sonam Jain for their Master's degree. The seminar focuses on BeeSensor, a routing protocol for wireless sensor networks inspired by bee communication behaviors. It discusses how bees communicate through dances to share information, and how this inspired the design of BeeSensor. The document outlines the key components of BeeSensor, including the different agent roles, protocol phases, and how it evaluates performance metrics like energy efficiency and packet delivery when compared to other routing protocols like AODV.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
This document discusses approaches to improve reliability in wireless sensor networks. It proposes a dynamic sectoring scheme where the network area is divided into sectors with a sensor node assigned as sector head for each. When an event occurs, only that sector is activated, reducing congestion and energy use. This is expected to enhance packet delivery ratio and reduce losses. Prior work on using data fusion and opportunistic flooding algorithms to improve reliability is also reviewed. The dynamic sectoring approach aims to reliably transmit data with low congestion and energy usage.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses localization techniques in wireless sensor networks (WSNs). It begins with an introduction to WSNs and their applications that require location information. While GPS could provide location data, it is not practical for WSNs due to cost and physical constraints. The document then categorizes localization methods as range-based, which use distance or angle measurements, and range-free, which do not directly measure distance. Specific techniques like time of arrival, received signal strength, and DV-Hop localization are described. The document concludes with classifications of localization methods and topics for future work.
This document provides an outline and overview of a presentation titled "Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation". The presentation discusses using Constrained Delaunay Triangulation as a coverage strategy to provide fault tolerance, event reporting, and energy efficiency in wireless sensor networks. It outlines the proposed work, which includes deploying sensors, distributed greedy algorithm for coverage, Constrained Delaunay Triangulation algorithm, and selection of backup nodes. Simulation results are presented comparing the proposed approach to traditional approaches.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
Abstract Wireless sensor network (WSNs) are self-organized systems that depend on highly distributed and scattered low cost tiny devices. These devices have some limitations such as processing capability, memory size, communication distance coverage and energy capabilities. In order to maximize the autonomy of individual nodes and indirectly the lifetime of the network, most of the research work is done on power saving techniques. Hence, we propose energy-aware load distribution technique that can provide an excellent data transfer of packets from source to destination via hop by hop basis. Therefore, by making use of the cross-layer interactions between the physical layer and the network layer thus leads to an improvement in energy efficiency of the entire network when compared with other protocols and it also improves the response time in case of network change. Keywords:- wireless sensor network, energy-aware, load distribution, power saving, cross layer interactions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BeeSensor routing protocol for wireless sensor networkSonam Jain
This document describes a seminar submitted by Sonam Jain for their Master's degree. The seminar focuses on BeeSensor, a routing protocol for wireless sensor networks inspired by bee communication behaviors. It discusses how bees communicate through dances to share information, and how this inspired the design of BeeSensor. The document outlines the key components of BeeSensor, including the different agent roles, protocol phases, and how it evaluates performance metrics like energy efficiency and packet delivery when compared to other routing protocols like AODV.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
This paper proposes medium access control (MAC) layer protocol for wireless sensor networks.
Sensor nodes are battery operated so the energy efficiency is an important aspect for the wireless sensor
networks WSNs. The protocol aims for achieving energy efficiency to increases network lifetime and
scalability to increase the network capacity. Clustering, synchronization and low duty cycle are some of
the characteristics for utilizing energy efficiently in the network. The protocol is designed with having the
schedules of the clusters to be overlapped in a low duty cycle operation. We have evaluated the
performance of protocol through detailed ns- 2 simulation. The simulation results show that this protocol
outperforms when compared to SMAC. It has reduced schedule updates, power consumption and data
loss.
.
Keywords— Wireless sensor networks, duty-cycle, clustering, schedule, synchronization, energyefficiency
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
The document summarizes an algorithm proposed to reduce energy consumption in wireless sensor networks using duty cycling and multi-hop routing. The key aspects of the algorithm are:
1) Layering the network environment based on size and identifying the optimal number of cluster heads in each layer.
2) Selecting the first layer closest to the sink as the "gateway layer" and stopping energy usage in half of these sensors to extend the network lifespan.
3) Using multi-hop routing whereby cluster heads send data to heads in the above layer until the gateway layer, which then sends to the static or mobile sink.
4) Simulation results showed the proposed algorithm performs better than LEACH and ELEACH in terms of
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
In this paper, we explored the possibility of using Genetic Algorithm (GA) being used in Wireless Sensor Networks in general with
specific emphasize on Fault tolerance. In Wireless sensor networks, usually sensor and sink nodes are separated by long communication
distance and hence to optimize the energy, we are using clustering approach. Here we are employing improved K-means clustering algorithm to
form the cluster and GA to find optimal use of sensor nodes and recover from fault as quickly as possible so that target detection won’t be
disrupted. This technique is simulated using Matlab software to check energy consumption and lifetime of the network. Based on the
simulation results, we concluded that this model shows significant improvement in energy consumption rate and network lifetime than other
method such as Traditional clustering or Simulated Annealing
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...IJERA Editor
Sensor networks are considered to be a standard technology in wireless communications and they are widely
used in military, surveillance, medicine, industry and houses as well. In sensor networks batteries with limited
amount of energy provide energy for the whole system. They are not rechargeable and as soon as the batteries
die the network life time will expire too. Using computational intelligence to schedule sleep and waking of the
sensor nodes is one of the suitable methods which helps the network to have a longer life. In this paper the focus
is on a fuzzy method to schedule sleeping and waking of sensor nodes. In this method the Environmental
conditions of each sensor (the number of neighbors, the remaining energy, and the distance to the next cluster
node) are considered as inputs by the application of a fuzzy system based on which the system creates an output
and the sleeping and waking time of each sensor is dynamically determined. The simulated results show that the
proposed algorithm is more efficient than other basic methods and consume less energy as well.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
This summary provides the key details from the document in 3 sentences:
The document reviews various MAC protocols developed for wireless body area networks. It discusses the applications and requirements of WBANs, including health monitoring and military uses. The document also analyzes sources of energy wastage in WBANs and classifies common MAC protocols as contention-based, schedule-based, and low power listening protocols.
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
This document provides an overview of wireless sensor networks (WSNs) including their architecture, layers, protocols, and applications. It discusses the introduction and classifications of WSNs. It describes the typical hardware components of sensor nodes and discusses various MAC layer protocols like S-MAC and SMACS that aim to reduce energy consumption. The document also covers routing techniques and mobility support in WSNs.
This document provides an overview of wireless sensor networks (WSNs). It discusses the architecture of sensor networks, including sensor node hardware, operating systems, and network density considerations. It also describes several layers of the WSN protocol stack, including the MAC layer and common MAC protocols like S-MAC. Key topics covered include query-based communication in WSNs, classifications of WSNs based on functionality, and energy-efficient operation through low-duty cycling.
This document discusses improving the performance of mobile wireless sensor networks using a modified DBSCAN clustering algorithm. It first provides background on wireless sensor networks and discusses challenges related to mobility. It then reviews several existing works related to clustering, mobility, and extending network lifetime. The paper proposes using a modified DBSCAN algorithm that takes into account mobility, remaining energy, and distance to base station to select cluster heads. It evaluates the performance of this approach based on throughput, delay, and packet delivery ratio, finding improvements over other methods.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Mind map of terminologies used in context of Generative AI
E044033136
1. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 31 | P a g e
Energy–Efficient Sleep Scheduling For Critical Event Monitoring
To Improve Performanceof Wireless Sensor Network
Yogesh Y. Shinde, Dr. Santosh S. Sonavane
Electronics and Telecommunication Dr. D. Y. Patil S.O.E. Pune, India
Director Dr. D. Y. Patil S.O.E. Pune, India
Abstract
A sensor networked applications can be formed for critical applications where it could send the detected
information to the user or to the other sink node. This message is often called as alarm message where it is
indicating the current operational state of the system. An alarm needs to be broadcast to the other nodes as soon
as possible,when a critical event (e.g., gas leak or fire) occurs in the monitoring area and is detected by a sensor
node, then, sensor nodes can inform users nearby to take some response to the event. The life of sensor nodes
for event monitoring are expected to work for a long time without recharging their batteries, sleep scheduling
method is always preferred during the monitoring process. Sleep scheduling could cause transmission delay
because sender nodes should wait until receiver nodes are active and ready to receive the message. The delay
could be important as the network scale increases. Hence, a delay-efficient sleep scheduling method needs to be
designed to ensure low broadcasting delay from any node in the WSN.Only a small number of packets need to
be transmitted during most of the time in the critical event monitoring,. When a critical event is detected, the
alarm packet should broadcast to the entire network as soon as possible. Hence, broadcasting delay is an
important issue for the application of the critical event monitoring. It is needed to minimize the time wasted for
waiting during the broadcasting to minimize the broadcasting delay. The ideal scenario is the destination nodes
wake up immediately when the source nodes obtain the broadcasting packets. Hence, the broadcasting delay is
definitely reduced. The objective of the project is to reduce the delay of the packet transmitted from the source
to destination by a scheduling mechanism. This method is also increasing the lifetime of a node in the network.
Index Terms—Broadcasting Delay, Critical event monitoring, Lifetime of nodes, sleep scheduling, Wireless
Sensor Network (WSN),
I. INTRODUCTION
The wireless sensor network (WSN) consists
of spatially distributed Autonomous sensors to
monitor physical or environmental conditions to
cooperatively pass their data through the network to a
main location. The target area is covered by large no
of nodes. Nodes in wireless sensor network
communicate with each other for a given task. The
development of wireless sensor networks was
motivated by military applications such as battlefield
surveillance; today such networks are used in many
industrial and consumer applications, such as
machine health monitoring, industrial control and
process monitoring, etc.
A projecting feature of WSN is that its
wireless sensor nodes (devices) are powered by
batteries. Sensor nodes are expected to work for a
long time without recharging their batteries. Hence
energy saving is most fundamental important issue.
In mission –critical application, such as
battlefield reconnaissance, fire detection in forest, gas
monitoring in coal mines, wireless sensor network is
arranged in wide ranges of areas, with a large number
of sensor nodes detecting and reporting some
information of urgencies to the end users As there
maybe be no communication infrastructure, users are
usually prepared with communicating devices to
communicate with sensor nodes as soon as possible.
Then sensor nodes for event monitoring are expected
to work for a long time without recharging their
batteries.
Sleep scheduling methods are always used
for event monitoring as WSN are expected to operate
for a long time without recharging their batteries.
Sleep scheduling could cause transmission delay
because node should wait until receiver nodes are
active and ready to receive the message. The delay
goes on increases with network scale hence delay
efficient sleep scheduling methods needs to be design
to ensure low broadcasting delay from any node in
network.A sensor networks makes the best possible
use of their initial energy resources. There are some
protocols that focus on reducing energy at data
link/MAC layer
Sleep scheduling: One of the most common methods
to reduce the energy consumption of nodes is to put
them to sleep when their workload is not heavy.
Putting nodes to sleep may be done in various layers
RESEARCH ARTICLE OPEN ACCESS
2. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 32 | P a g e
and unit of the sensor nodes and have different
effects on how the network operates. Positioning the
transmitter unit can save a lot of energy but may have
longer delay or increase the data loss. Turning off the
sensing unit would also save a great deal of energy
but may cause lower coverage,higher response time,
lower accuracy. Since usually sensor networks are
supposed to work many times more than a sensor
nodes life in active mode there is no choice but to put
sensor nodes into sleep. In such cases we have to find
methods to reduce the problems that arise due to this
fact. These methods try to improve the way network
operates in different layers. Maximum energy saving
is possible through putting transmitter unit to sleep.
MAC protocol manages the operation of this unit.
Several MAC protocols have been designed
specifically for WSNs. SMAC (Synchronous MAC)
is one of well-known MAC protocols specifically
designed for WSNs. In this MAC nodes use
Sleep/Active periods to save energy. This approach
increases the data transmission delay in network and
makes it unusable for delay sensitive applications.
Several routing protocols have been proposed for
multi hop sensor networks that try to reduce the
energy consumption if the node saves the ability to
control the sensing unit’s operation separately by
scheduling its activity energy savings is achieved.
II. LITERATURE SURVEY
The S-MAC medium access protocol [1] introduces
synchronized periodic duty cycling of sensor nodes as
a mechanism to reduce the ideal listening energy cost.
In S-MAC each node follows a periodic active/sleep
schedule, synchronized with its neighboring nodes.
During sleep periods the radios are completely turn
off, and during active period, they are turn back on to
transmit and receive messages. Although the
synchronized low duty cycle operation of a sensor
network is energy efficient, it has one major
deficiency it introduces sleep latency. At a source
node, a sampling reading may occur during the sleep
period and has to be queued until the active period
Anintermediate node may have to wait until receiver
wake up before it can forward a packet received from
its previous hop this is called as sleep latency.
In Adaptive Listening energy-efficient duty
cycling may be maintained while reducing sleep
latency where nodes that lie one or more step ahesd in
the path of transmission can be kept awake for
additional length of time to the basic S-MAC. This
approach provides some reduction in sleep latency but
its energy expense becomes greater due to extended
activation and overhearing hence it is not sufficient
for long paths. [2] .this paper addresses the important
problem sleep latency each sensor has to awake for
1/k fraction of time slots on an average where each
sensor has to wake one of the k slots. This paper
derives and analyzes optimal solution for tree
topologies and ring topologies. This paper suggests
that distributed heuristics may perform poorly because
of the global nature of the constraints involved.
Algorithm of this paper offers a desirable bound of
d+o(k) on the delay for tree and greed topology and
weaker guarantee od o((d+k)log n) for arbitary
graphs. Where d is the shortest path between 2 nodes
in the underlying topology and n is the total number
of nodes. Idle listening, frame collisions, protocol
overhead, and message overhearing these are the main
sources of energy loss in WSNs
Most existing contention-based WSN MAC
protocols reduce idle listening, but they fail to avoid
the nodes from actively monitoring channel
contention periods and reservation protocol (RTS-
CTS) packets before transitioning to sleep [1][4][5].
Sensor MAC (S-MAC) [1]and Timeout MAC (T-
MAC) [6] are contention-based protocols focused on
reducing idle radio listening by concentrating the
network’s data transmissions into a smaller active
period and then transitioning to sleep for the
remainder of the cycle. SMAC establishes a fixed
active cycle (i.e. 10% active), and T-MAC allows the
traffic to adjust the duration of the active period
dynamically by transitioning nodes to sleep only after
listening to an idle channel for a timeout period
equivalent to a transmitting node’s worst-case
contention back off. Concentrating the transmissions
into a smaller active period reduces idle listening, but
it also increases the probability of collisions, thus
wasting precious bandwidth and energy. Berkeley-
MAC (B-MAC) [5] is another contention-based
protocol that saves energy by having radios
periodically wake up to sample the medium.
Transmitting nodes extend the duration of message
preambles to cover the entire range of the wakeup
period to ensure all nodes receive the preamble and
remain awake to accept the message. Time division
multiple access (TDMA) reservation based protocols
create fixed time periods for nodes to communicate to
eliminate the channel contention and idle listening
energy costs [7] [8]. G-MAC similarly gathers traffic
demands during a contention period, but saves
additional energy since only transmitting nodes wake
up to send their traffic requirements for consolidation
by a centralized gateway.
Current wakeup methods can be divided into
two main categories:
1) Scheduled wakeups: In this class, the nodes follow
deterministic (or possibly random) wakeup patterns.
Time synchronization among the nodes in the network
is generally assumed however, asynchronous wakeup
mechanisms. Which do not require synchronization
among the different nodes is also categorized in this
class. Although asynchronous methods are simpler to
implement, they are not as efficient as synchronous
3. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 33 | P a g e
schemes, and in the worst case their guaranteed delay
can be very long.
2) Wakeup on-demand (out-of-band wakeup): It is
assumed that the nodes can be signaled and
awakened at any point of time and then a message is
sent to the node. This is usually implemented by
employing two wireless interfaces. The first radio is
used for data communication and is triggered by the
second ultra-low-power (or possibly passive) radio
which is used only for paging and signaling. [9], and
passive radio triggered solutions [10] are examples of
this class of wakeup methods. Although these
methods can be optimal in terms of both delay and
energy, they are not yet practical. The cost issues,
currently limited available hardware options which
results in limited range and poor reliability, and
stringent system requirements prohibit the widespread
use and design of such wakeup techniques.
Consequently, there is a need for efficient scheduled
wakeup schemes which are reliable and cost-effective
and can also guarantee the delay and lifetime
constraints. [11] Paper proposes a new Sleep schedule
(Q-MAC) for Query based sensor networks that
provide minimum end-to-end latency with energy
efficient data transmission. The radios of the nodes
sleep more whenever there is no query using a static
schedule. The sleep schedule is changed
dynamicallywhenever a query is initiated. Based on
the destination’s location and packet transmission
time, we calculate the data arrival time and hold
theradio of a particular node, which has forwarded the
query packet, in the active state till the data packets
are forwarded.
The types of queries can be categorized as
follows based on the applications:
• Continuous queries • Aggregate queries, versus
Non-aggregate Queries • Complex queries, versus
Simple queries• Queries for unique data and Queries
for replicated data
This paper [12] refers to this technique as the CM
based on an Event- Driven Reporting (CM-EDR)
philosophy. In particular, our proposed CM-EDR
mechanism can be viewed as a particular type of EDD
applications, where an event is defined as an
important change in the supervised phenomenon
compared to the last reading sent to the sink node.
However, the main difference with typical EDD
applications is that with CM-EDR, the user would
have a continuous reading of the phenomenon of
interest, which is not the case with EDD
applications.This paperemphasizes the difference in
terms of goals and produced traffic between CM-EDR
applications and classical event detection- driven
(EDD) applications
A novel time synchronization protocol-
Physical layer integrated synchronization protocol
(PLISP). [13] This protocol accepts a method of
adding timestamp in physical layer to reduce
uncertainty of message exchange process. Results
proved that 1µs require for single hop time
synchronization but its consumption is higher than
TPSN (Timing sync protocol for sensor networks)
mechanism
A voltage and sleep effective scheduling
algorithm [14] in terms of Dynamic frequency/voltage
scaling and Dynamic energy management, namely,
DV/FS RM and DV/FS2-EDF algorithm which can
expands the lifetime of WSN. [15] Presented a new
scheduling method for WSN called VBS (Virtual
Backbone Scheduling) .VBS combine sleep
scheduling and virtual backbone. This paper defines
the MLBS (maximum lifetime backbone scheduling)
problem for WSNs to find the optimal schedule for
VBS. To solve the problem two approximation
solutions based on STG (schedule transition graph)
and VSG (virtual scheduling graph) are proposed.
Self-learning scheduling approach (SSG) [16] this
approach mixes sleep scheduling together with packet
transmission scheduling to reduce energy
consumption. It enable nodes to learn continuous
transmission parameters is achieved by Q- learning
method and the transmission parameter is used to
calculate sleep parameter.[17] In this paper proposed
protocol is compared with LEACH (low energy
adaptive clustering hierarchy) . In the node scheduling
scheme (sleep and active mode) energy efficiency is
increased near to 50 % than LEACH protocol also
lifetime increased. Boundary energy scheduling
method [18] with proper distribution of active nodes
and rapid convergence towards activating optimum
number of nodes also improves BES by Virtual
Clustering based Boundary Energy Scheduling
(VCBES)
III. WORK UNDERTAKEN
Alarm could be originated by any node
which detects a critical event in wireless sensor
network. To reduce broadcasting delay the
scheduling methods includes two phases:
UPLINK: Initially, when a node detects a critical
event, it originates an alarm message and quickly
transmits it to acenter node along a pre- determined
path with a level-by-leveloffset way.
4. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 34 | P a g e
Fig 1: Send the Alarm to center node
DOWNLINK: Then, the center node broadcasts the
alarm message to the other nodes along another path
also with a level-by- level offset way.
Fig 2: Center node broadcast the alarm to all
IV. METHODOLOGY
It is known that the alarm could be
originated by any node which detects a critical event
in the WSN to essentially reduce the broadcasting
delay.
Each node needs to wake up properly for
both of the two traffics. Therefore, the focused
scheduling scheme should contain two parts
1) Breadth First Search (BFS):
Breadth-first search (BFS) is a scheme for
searching in a graph when search is limited to
basically two operations, in the graph theory:
(a) Visit and check a node of a graph;
(b) Gain access to visit the nodes that neighbour the
currently visited node.
First of all, we choose a sensor node as the
center node c. Then, we construct the BFS tree which
divides all nodes into layers H1, H2, H3; . . .; HD,
where Hn is the node set with minimum hop n to c in
the WSN. With the BFS tree, the uplink paths for
nodes can be easily obtained.
2) Connected Dominant Set (CDS):
Construct a maximum independent set
(MIS) in G.
In graph theory an independent set or
stable set is a set of vertices in a graph, no two of
which are adjacent. A maximum independent set is a
largest independent set for a given graph G and its
size is denoted α(G). The problem of finding such a
set is called the maximum independent set problem
Select connector nodes to form a connected
dominated set (CDS)
A connected dominating set of a graph G is
a set D of vertices with two properties:
i) Any node in D can reach any other node in D by a
path that stays entirely within D. That is, D induces a
connected sub graph of G.
ii) Every vertex in G either belongs to D or is
adjacent to a vertex in D. That is, D is a dominating
set of G.
3)Energy Scheduling Method (ESM)
This method consists of some periods. In
each period, the nodes send its remained energy to
their cluster head. Each cluster head has a list of their
member nodes. Each cluster head sorts its list
descending based on the remaining energy of their
nodes. The energy of K*TH
node is called Eb. After
that, it sends this energy value as boundary energy to
their nodes. If the receive nodes energy rate is equal
to or more than this rate, they will send data at next
cycle with probability α.(that is a value near 1),
otherwise, send data with probability β. If the nodes
don’t send until next period, they will become
inactive and in the next cycle will decide according to
the same probability. The nodes which their
remaining energy is less than the boundary energy
should be sleep. Regarding to different number of
nodes (N), the relationship between N and K*
is
shown in (1).
α
β
Therefore the optimum probability βis calculated
as (2)
βα
5. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 35 | P a g e
V. EXPERIMENTAL RESULTS
Fig 3: Performance analysis of packet delivery
ratio
Fig 4: Performance analysis of energy
Fig 5: Performance analysis of end to end delay
VI. CONCLUSION AND FUTURE WORK
This work focus on Critical event monitoring
in WSNs with novel sleep scheduling scheme.
Collision free environment is achieved by specifically
determining two traffic paths .This work get very
good result as compare to SMAC. Work is going to
improve throughput, end to end delay, and energy
consumption to improve Quality of Service of WSN.
REFERENCES
[1] Wei Ye, John Heidemann, Deborah Estrin,
―An energy efficient MAC protocol for
wireless sensor network,‖ IEEE INFOCOM,
pp. 1567-1576,2002
[2] Gang Lu, NrayananSadagopan,
BhaskarKrishnamachari, AshishGoel, ―
Delay efficient sleep scheduling in wireless
sensor networks‖ IEEEpp.2470-2481,
Mar.2005
[3] J.Heidemann, Y .D. ―An energy efficient
MAC protocol for wireless sensor networks‖
INFOCOMM.2005
[4] K. Langendoen, ―energy efficient MAC:An
adaptive energy efficient MAC protocol for
wireless sensor networks.‖ ACM
SENSYS.2004
[5] J.Polstre, J. D. ―Versatile low power media
access for wireless sensor networks.‖ ACM
SENSYS 2004
[6] T. Van Dam, K. Langendoen, ―An Adaptive
Energy- Efficient MAC Protocol for
Wireless Sensor Networks," Proc. Of ACM
SenSys , Nov 2003.
[7] Wendi RabinerHeinzelman,
AnanthaChandrakasan,HariBalakrishanan
―Energy efficient communication protocol
for wireless microsensor networks,‖ IEEE
2000.
[8] Guangyu Pei, CharlrsChien, ―Low power
TDMA in large wireless sensor network,‖
IEEE pp.347-351 2001
[9] Matthew J Miller, Nitin H
Vaidya,‖Minimizing energy consumption in
sensor networks using a wake up radio‖,
IEEE communication society,pp.2335-
2340,WCNC 2004
[10] L. Gu and J. A. Stankovic, ―Radio-Triggered
Wake-Up Capability for Sensor Networks,"
10th IEEE Real-Time and
EmbededTehcnology and Application
Symposium (RTAS'04), Toronto, May 2004.
[11] N.A. Vasanthi and S.Annadurai., ―Energy
Efficient Sleep Schedule for Achieving
Minimum Latency in Query Based Sensor
Networks,‖ Proc. IEEE Int’l Conf. Sensor
Networks, Ubiquitous, and Trustworthy
Computing, pp. 214-219, June 2006
[12] N. Bouabdallah, M.E. Rivero-Angeles, and
B. Sericola, ―Continuous Monitoring Using
Event-Driven Reporting for Cluster-Based
Wireless Sensor Networks,‖ IEEE Trans.
Vehicular Technology, vol. 58, no. 7, pp.
3460-3479, Sept. 2009.
[13] Ping Song,Xiaodong Shan, Kejie Li,
Guangping Qi,‖ Multi hop based highly
6. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 36 | P a g e
precise time synchronization protocol for
ZigBeenetworks‖ IEEE 2009.
[14] Wei Wei,Xiao-ying Wang, ―Diverse-rate
based dual energy aware efficiency task
scheduling scheme in WSNs‖IEEE 2009
[15] Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu,
― VBS: maximum life time sleep scheduling
for wireless sensor networks using virtual
backbones‖ IEEE 2010
[16] JinjunNilu, ― Self- learning scheduling for
wireless sensor network‖, IEEE 2010
[17] R. Saravanakumar, S.G.Susila, J.Raja, ― An
energy efficient cluster based node
scheduling protocol for wireless sensor
networks ‖ IEEE 2010
[18] Seyed Mahdi Jamei, ArashNikdel, Hagar
Noori, ― A scheduling method based on
virtual clustering and boundary energy for
wireless sensor networks‖ IEEE 2011