SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
131
Effective Pipeline Monitoring Technology in
Wireless Sensor Networks
1
Adila Nazir N
PG Student,
Department of ECE,
Dhanalakshmi Srinivasan College of Engineering,
Tamilnadu, India
anaghaaravind3@gmail.com
2
Sheela T
Assistant Professor
Department of ECE,
Dhanalakshmi Srinivasan College of Engineering,
Tamilnadu, India
sheela17tha@gmail.com
Abstract-Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery.
Keywords- Wireless sensor network, Pipelining, Static nodes, Dynamic nodes, Relay nodes, Adaptive
ondemand distance vector
1. INTRODUCTION:
Consider a WSN network consisting of a mobile in-
pipe Sn, a BS, and M Multiple surface RNs..The SN,
carried by a mechanism, is inserted into a
completely operational pipeline. Once discharged,
the Sn moves within the water flow within the
pipeline and performs information acquisition. to cut
back the number of information to be transmitted,
the Sn performs on-board processing. solely the
summarized information or the extracted helpful
data are going to be transmitted to the surface
bachelor's degree to cut back the energy price of
information transmission. The bachelor's degree is
that the sink node for the data stream from the Sn.
Besides receiving data, the bachelor's degree also
can send commands to the Sn together with the
mechanism for his or her operational management.
The RNs play the role of relaying data between the
Sn and therefore the bachelor's degree. The RNs
area unit deployed at a set of surface possible sites
preselected during a line on the pipeline. Compared
with the case while not mistreatment the RNs, the
main advantage of inserting the RNs is to cut back
the transmission distance of the signal from the Sn,
thereby decreasing the number of signal attenuation
and therefore the needed transmission power at the
Sn. in numerous environments, totally different
possible sites could impose different limits on the
heights of the RNs’ receiving antennas. as an
example, a RN may well be either placed on the soil
surface, or control by associate degree antenna
stand, or connected on tree. once the Sn transmits
the detected data to a RN, the non particulate
radiation propagates through completely different
media, as well as the in-pipe water, the plastic of the
pipe body, the soil, and therefore the air. Also,
completely different antenna heights of the RNs
result in different transmission methods and
different levels of signal attenuation.
To represent the particular transmission
methods between the Sn and every RN, however to
point the coated pipeline length by the Sn in
communication with every RN. The particular radio
transmission methods are going to be mentioned in
because the Sn moves within the pipe, the
transmission path between the Sn and therefore the
bachelor's degree varies. The Sn can go every RN
and switch its communications with completely
different RNs to send information to the bachelor's
degree.
2. Related Works:
[1]. In planned autonomous system, the mobile
metallic element is hopped-up by A battery with a
restricted supply of energy. On the opposite hand,
sensing, natural philosophy, and exploit of the
metallic element all consume the battery energy.
Moreover, not like the RNs’ multiple attainable
energy sources which can come back from batteries,
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
132
power cords, or alternative energy, the SN’s solely
energy supply is from the battery.
[2]. during this paper, centered on water distribution
observance system. Detector node was placed on
underground and relay node was placed on top of
ground. Detector node was observance the water
level and it had been forward to relay node. Here
they designed in physical layer of the detector node
to dynamical the signal propagation. If channel
strength is inflated it creates a more robust network.
[3]. The Authors planned a paper supported hookah
line observance system. It principally designed for
notice the water run on pipelines. it absolutely was
detection by vibration level and of the pipelines.
The signal rate was accumulated during this paper
for detection.
[4]. Multiuser cooperative schemes sometimes have
confidence relay choice or channel choice to avoid
deep weakening and win diversity whereas
maintaining acceptable spectral potency. In some
applications like underwater acoustic
communications, the low speed of the wave ends up
in a awfully long delay between the channel state
info (CSI) menstruation time and also the relay
assignment time, that results in a severely
superannuated CSI. To remedy this, and propose
distributed secret writing schemes that aim at
achieving sensible diversity multiplexing trade-off
(DMT) for multiuser situations wherever CSI isn't
on the market for resource allocation. take into
account a network with multiple supply nodes,
multiple relay nodes, and one destination. here
initial introduce a distributed linear block secret
writing theme, together with Reed-Solomon codes,
wherever every relay implements a column of the
generator matrix of the code, and soft call
decipherment is utilized to retrieve the knowledge at
the destination facet. and derive the end-to-end error
performance of this theme and show that the
realizable diversity equals the minimum playacting
distance of the underlying code, whereas its DMT
outperforms that of existing schemes. And extend
the projected theme to distributed convolution
codes, and show that achieving higher diversity
orders is additionally attainable.
[5]. This paper says the network choice of wireless
underwater detector network. Instead radio waves
they used magnetism waves. it had been specially
designed for tiny space wireless detector networks.
Signal strength was 300-900MHZ
There is no elaborate study regarding the way to
transmit the info between underwater sensors to sink
node.
3. MONOTORING THE CONDITION
OF UNDERGROUND PIPELINE
In this system, relay nodes can specially style as a
heterogeneous network. High power nodes most
covers a variety compared to low power relay nodes.
However every high power nodes cowl minimum 2
low power nodes therefore on. Compromise sensing
element nodes collect the info and it'll forward to
corresponding relay node.
In figure three.2 If any relay node fails within the
network, configuration can amendment
mechanically supported high and low power relay
node comparison distribution. Channel estimation
are variable betting on surface nature, just for
avoiding unnecessary packet loss in an exceedingly
network.
Figure 3.1 Underground pipeline structure
The wireless detector network has been used as a
live analysis test-bed for the event and refinement of
algorithms for leak and burst detection and
localization. Throughout its development and
enlargement over four years, Water Wise has
accumulated an outsized archive of detector
knowledge from detector nodes. This archive has
tested a useful resource on that to perform
explorative data processing to spot common patterns
and trends, and to assist determine areas of concern
within the network that warrant additional, in-depth
investigation. It’s conjointly useful for post-mortem
analysis of response to events; wherever the actions
that were taken may be matched to knowledge
streams and wont to facilitate inform future actions.
Station in controlled pipelines typical of these found
at retail service stations. The results of those early
activities recommend that acoustic measurements
combined with advanced signal process will offer a
method to discover and find little leaks over long
distances in controlled pipelines.
The methodology locates leaks virtually by the
sound that's created once the liquid escapes into the
soil. this method is cheaper, timely, and correct than
each of the opposite presently used methodologies
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
133
since pipelines may be tested in minutes instead of
days; leaks may be set while not the utilization of
pricey, invasive techniques; and correction prices
and products loss ar reduced by timely and correct
leak location. Further, the potential on-line
observation capabilities of passive acoustics ought to
leave higher management over product transfer
systems. the most important good thing about this
capability are the first detection and placement of
leaks and also the timely ending of unseaworthy
pipelines, therefore serving to forestall the discharge
of contaminants into the atmosphere.
To obtain general business acceptance of acoustic
leak location, it's necessary not solely to prove the
claimed capabilities of the technique, however
conjointly to outline its limitations. consequently,
the applied analysis program mentioned during this
paper has been undertaken to develop passive
acoustic principles for improved leak detection and
placement in pipelines of varied sizes and
configurations.
US water utilities are sweet-faced with mounting
operational and maintenance prices as a results of
aging pipeline infrastructures. Leaks and ruptures in
facility pipelines and blockages and overflow events
in sewer collectors value many bucks a year, and
observation and repairing this underground
infrastructure presents a severe challenge. during
this system discuss however wireless detector
networks (WSNs) will increase the abstraction and
temporal resolution of operational knowledge from
pipeline infrastructures and therefore address the
challenge of close to period of time observation and
eventually management.
Here concentrate on the utilization of WSNs for
observation giant diameter bulk-water transmission
pipelines. The define a system, Pipe Net, are
developing for assembling hydraulic and
acoustic/vibration knowledge at high sampling rates
still as algorithms for analyzing this knowledge to
discover and find leaks. Challenges embody
sampling at high knowledge rates, maintaining
aggressive duty cycles, and guaranteeing tightly
times synchronal knowledge assortment, all below a
strict power budget. And have allotted an in depth
field trial with Bean town Water and Sewer
Commission so as to judge a number of the essential
parts of Pipe internet.
Figure 3.2 Buried underground pipeline
In figure 3.3 beside the results of this preliminary trial,
describe the results of intensive laboratory experiments
that area unit accustomed judge our analysis and
processing solutions. model readying has semiconductor
diode to the event of a reusable, field- reprogrammable
package infrastructure for distributed high-rate signal
process in wireless device networks, that we have a
tendency to additionally describe.
The Intel atom platform is a sophisticated device node
platform consisting of AN ARM7 core, 64kB RAM,
512kB Flash and a Bluetooth radio. And designed a
device board to interface the Intel atom to varied analog
sensors utilized in Pipe web. The device board supports
up to eight analog channels. The data converter (ADC)
is connected to a fancy programmable logic device
(CPLD) that is to blame for driving the ADC clock to
attain the required rate, and bridging the SPI interface of
the ADC to the UART interface supported by the atom.
Here enforced Bluetooth scatter web formation and a
tree routing algorithms to modify self configuring, self
healing networks. additionally, the enforced a light-
weight reliable transport protocol to support
fragmentation and assembly of enormous information
packets, as Pipe web motes of times got to transfer
messages of up to one hundred K.
The 1st tier is analogous in package and hardware
design to the condition primarily based maintenance is
deployed. Describe the principal variations from this
readying within the remainder of this section. These
variations fall under 2 broad categories. First, since we
wanted to support continuous capture of a lot of
information than what would slot in RAM, were unable
to use the shop and forward networking choice
delineated in. Instead, we have a tendency to enforce a
reliable over the air streaming mechanism. Second,
required a lot of versatile configuration choices from the
backend server, storage of configuration parameters in
flash, information report and native ballot options.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
134
4. Advantages
 Highly distributed, improved packet delivery
 Channel strength is selected by nature of the
surface
 Minimum residual energy is used by relay
nodes.
5. Relay selection
Relay node will select by coverage range of the node
and movement of sensor nodes. Because here sensor
nodes will move depending upon water flow of the
pipe line.
6. RN updating model
RNs will update the status of the nodes periodically.
If any RN miss the data about nearest RN, that node
consider as failed node. Heterogeneous network is
updating the nearest RN and transmitting the data. It
do not depending up on the failed node. in
heterogeneous network the relay node is transmitting
all data.
7. Choosing different RN
 If any RN node failed in the network, sensor
node can select different RN node.
 Because here the network has heterogeneous
nature.
 So easily network will hand over to different
RN.
 Network must be creating two low power nodes
comes under one high power node.
 Based on traffic load it will vary.
8.RESULTS AND DISCUSSION
8.1. STEP- 1: MOVEMENT OF SENSOR
NODES
SN detects the leak through acoustic, pressure or
alternative effects, and transmits the perceived info
to the surface BS degree. Each the quality of the Sn
and its operating conditions cause many important
challenges on the event of a WSN for the planned
autonomous system. First, the radio wave
propagation setting between the in-pipe Sn and
therefore the surface BS is difficult as signals got to
travel through totally different media, together with
water, plastic, soil, and air, to succeed in the
bachelor's degree. In figure four.1 Heterogeneous
web work providing the high packet delivery and
high information transmission.
Figure 4.1 Movement of sensor node
8.2. STEP 2: DATA TRANSMISSION OF
MOVING SENSOR TO RELAY NODE
BS is sophisticated as signals ought to travel through
totally different media, as well as water, plastic, soil,
and air, to achieve the Bachelor of Science .sensor
node is moving entire pipe and checking the
condition of pipe line, and transmittal that
information to the relay node.
In figure4.2 Relay node is inserting on top of the
bottom. In heterogeneous network a high power
relay node is canopy minimum of 2 low power node.
that's any relay node is failing means that the
neighboring relay node is change that failing node
and transmittal information between detector node
and relay node.
Figure 4.2 data transmission between
sensor nodes and relay node
8.3. STEP 3: ACTIVATION OF BASE
STATION
Relay node is transmission all information to base
station and Base station is observation the all
practicality of the underground pipe. If any RN is
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
135
failing the neighboring RN is change the failing
node and transmission the info. In heterogeneous
network every high power covers minimum of 2 low
power node and change the condition of failing node
and re-transmitting the info.
In figure 4.3 Base station play a significant role
within the observation system, the ultimate
observation is occur within the base station.
Figure 4.3 Activation of base station
9. Conclusion:
• Specially designed a heterogeneous network
for effectively observance the underground
pipeline.
• In heterogeneous networks if there's any
failure detected within the relay node, then the
closest RN is change that failing node and
knowledge transmission is distributed by
victimization dump agent protocol.
10. Future Work:
• In the case of failure of relay nodes or
inaccessibility of relay channel the information
transmitted path is mechanically chosen.
• The condition for path choice is predicated on
the sensing element transceiver operate that adapt with
the channel.
11. REFERENCES
[1] Dimitris Chatzigeorgiou, Kamal Youcef-
Toumi, Samir Mekid, and Dalei Wu, Rached Ben-
Mansour, (2014), ‘Channel-Aware Relay Node
Placement in Wireless Sensor Networks for Pipeline
Inspection’, Vol.13.No.7,pp.49-51.
[2] Alphons Vickers A. L, (1999), ‘The future
of water conservation: Challenges ahead’, Vol.114.
No. 1, pp.32-56.
[3] Ashwa nshChoi C, Chatzigeorgiou D, Ben-
Mansour R., and Youcef-Toumi K,(1992), ‘Design
and analysis of novel friction controlling mechanism
with minimal pipeline’, Vol. 2. No. 3, pp. 12-13.
[4] Bhatzigeorgiou D. Youcef-Toumi K, A.
Khalifa, and Ben-Mansour R, (2011), ‘Analysis and
design of an in-pipe system for water leak detection,’
Vol. 8. No. 9, pp. 12-18.
[5] Chatzigeorgiou D, Khalifa A, Youcef-
Toumi K., and R. Ben-Mansour, Aprl, (2011), ‘An
in-pipe leak detection sensor: Sensing capabilities
and evaluation,’ Vol. 3.No.14, pp. 176-234.
[6] Dogena H. R, Huisman J. A, H. Meier,
Rosenbaum U, and Weuthen M. C Aug. (2009),
‘A.Hybrid wireless underground sensor networks:
Quantification of signal attenuation in soil’, Vol. 8.
No. 3, pp. 755–761.
[7] Ftoianov I, Nachman L, Madden S, and
Tokmouline (1987), ‘PIPENET: A wireless sensor
network for pipeline monitoring’, Vol. 6.No.8, pp.
264–273.
[8] Hkyildiz I. F, Sun Z,and. Vuran M. C
(1999), ‘Signal propagation techniques for wireless
underground communication networks’, Vol. 2. No.
3, pp. 167–183.
[9] Lkyildiz I. F. and Stuntebeck E. P, (2008),
‘Wireless underground sensor networks: Research
challenges’,Vol.4.No.6, pp. 621–655.
[10] Mhowalia K, Shammas N, Quraishi A,
and Al-Muttair F. F Sep, (2009), ‘Assessment of
leakage in the Riyadh water distribution
network’,Vol. 2.No.3, pp.12-13.

More Related Content

What's hot

Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network
Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network
Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network Zakaria Shuvo
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanEnergy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanaravind m t
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivitypaperpublications3
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocolsRushin Shah
 

What's hot (20)

[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G [IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
 
Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network
Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network
Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wbanEnergy efficiency optimization of IEEE 802.15.6 ir uwb wban
Energy efficiency optimization of IEEE 802.15.6 ir uwb wban
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
N010527986
N010527986N010527986
N010527986
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivity
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 

Viewers also liked

Amira foods promotes its brands in us
Amira foods promotes its brands in usAmira foods promotes its brands in us
Amira foods promotes its brands in usBusiness
 
Johnny mastrangelo capogruppo pdl
Johnny mastrangelo capogruppo pdlJohnny mastrangelo capogruppo pdl
Johnny mastrangelo capogruppo pdlredazione gioianet
 
Manifiesto contra los recortes en concertada
Manifiesto contra los recortes en concertadaManifiesto contra los recortes en concertada
Manifiesto contra los recortes en concertadasoypublica
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesIJTET Journal
 
Presentacion de museo nacional de historia natural
Presentacion de museo nacional de historia naturalPresentacion de museo nacional de historia natural
Presentacion de museo nacional de historia naturalLuis López
 
Exploradores del conocimiento (Identificación y caracterización de la orquíde...
Exploradores del conocimiento (Identificación y caracterización de la orquíde...Exploradores del conocimiento (Identificación y caracterización de la orquíde...
Exploradores del conocimiento (Identificación y caracterización de la orquíde...CTeI Putumayo
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
Estaciones viacrusis 2016
Estaciones viacrusis 2016Estaciones viacrusis 2016
Estaciones viacrusis 2016Luis López
 
The Role of Mobility in Logistics and Fleet Management Industry
The Role of Mobility in Logistics and Fleet Management IndustryThe Role of Mobility in Logistics and Fleet Management Industry
The Role of Mobility in Logistics and Fleet Management IndustrySoftweb Solutions
 
Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014Softweb Solutions
 
raytheon annual reports 2004
raytheon annual reports 2004raytheon annual reports 2004
raytheon annual reports 2004finance12
 

Viewers also liked (19)

Baseball(2)
Baseball(2)Baseball(2)
Baseball(2)
 
Ritz record 6 14-2012
Ritz record 6 14-2012Ritz record 6 14-2012
Ritz record 6 14-2012
 
Pricelist
PricelistPricelist
Pricelist
 
Amira foods promotes its brands in us
Amira foods promotes its brands in usAmira foods promotes its brands in us
Amira foods promotes its brands in us
 
Johnny mastrangelo capogruppo pdl
Johnny mastrangelo capogruppo pdlJohnny mastrangelo capogruppo pdl
Johnny mastrangelo capogruppo pdl
 
E portafolio
E  portafolioE  portafolio
E portafolio
 
Manifiesto contra los recortes en concertada
Manifiesto contra los recortes en concertadaManifiesto contra los recortes en concertada
Manifiesto contra los recortes en concertada
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
 
Rd delegados de_curso_de_seuridad_-1_70
Rd delegados de_curso_de_seuridad_-1_70Rd delegados de_curso_de_seuridad_-1_70
Rd delegados de_curso_de_seuridad_-1_70
 
Img018
Img018Img018
Img018
 
JJ Pitch
JJ PitchJJ Pitch
JJ Pitch
 
Presentacion de museo nacional de historia natural
Presentacion de museo nacional de historia naturalPresentacion de museo nacional de historia natural
Presentacion de museo nacional de historia natural
 
Exploradores del conocimiento (Identificación y caracterización de la orquíde...
Exploradores del conocimiento (Identificación y caracterización de la orquíde...Exploradores del conocimiento (Identificación y caracterización de la orquíde...
Exploradores del conocimiento (Identificación y caracterización de la orquíde...
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
Primera misa
Primera misaPrimera misa
Primera misa
 
Estaciones viacrusis 2016
Estaciones viacrusis 2016Estaciones viacrusis 2016
Estaciones viacrusis 2016
 
The Role of Mobility in Logistics and Fleet Management Industry
The Role of Mobility in Logistics and Fleet Management IndustryThe Role of Mobility in Logistics and Fleet Management Industry
The Role of Mobility in Logistics and Fleet Management Industry
 
Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014
 
raytheon annual reports 2004
raytheon annual reports 2004raytheon annual reports 2004
raytheon annual reports 2004
 

Similar to Effective Pipeline Monitoring Technology in Wireless Sensor Networks

Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientIJCNCJournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewTELKOMNIKA JOURNAL
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...IJECEIAES
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNSINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNEditor IJMTER
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...IJECEIAES
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Effective Pipeline Monitoring Technology in Wireless Sensor Networks (20)

Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A Review
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNSINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Effective Pipeline Monitoring Technology in Wireless Sensor Networks

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 131 Effective Pipeline Monitoring Technology in Wireless Sensor Networks 1 Adila Nazir N PG Student, Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India anaghaaravind3@gmail.com 2 Sheela T Assistant Professor Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India sheela17tha@gmail.com Abstract-Wireless detector nodes are a promising technology to play three-dimensional applications. Even it will sight correct lead to could on top of ground and underground. In solid underground watching system makes some challenges are there to propagating the signals. The detector node is moving entire the underground pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation can modification mechanically supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery. Keywords- Wireless sensor network, Pipelining, Static nodes, Dynamic nodes, Relay nodes, Adaptive ondemand distance vector 1. INTRODUCTION: Consider a WSN network consisting of a mobile in- pipe Sn, a BS, and M Multiple surface RNs..The SN, carried by a mechanism, is inserted into a completely operational pipeline. Once discharged, the Sn moves within the water flow within the pipeline and performs information acquisition. to cut back the number of information to be transmitted, the Sn performs on-board processing. solely the summarized information or the extracted helpful data are going to be transmitted to the surface bachelor's degree to cut back the energy price of information transmission. The bachelor's degree is that the sink node for the data stream from the Sn. Besides receiving data, the bachelor's degree also can send commands to the Sn together with the mechanism for his or her operational management. The RNs play the role of relaying data between the Sn and therefore the bachelor's degree. The RNs area unit deployed at a set of surface possible sites preselected during a line on the pipeline. Compared with the case while not mistreatment the RNs, the main advantage of inserting the RNs is to cut back the transmission distance of the signal from the Sn, thereby decreasing the number of signal attenuation and therefore the needed transmission power at the Sn. in numerous environments, totally different possible sites could impose different limits on the heights of the RNs’ receiving antennas. as an example, a RN may well be either placed on the soil surface, or control by associate degree antenna stand, or connected on tree. once the Sn transmits the detected data to a RN, the non particulate radiation propagates through completely different media, as well as the in-pipe water, the plastic of the pipe body, the soil, and therefore the air. Also, completely different antenna heights of the RNs result in different transmission methods and different levels of signal attenuation. To represent the particular transmission methods between the Sn and every RN, however to point the coated pipeline length by the Sn in communication with every RN. The particular radio transmission methods are going to be mentioned in because the Sn moves within the pipe, the transmission path between the Sn and therefore the bachelor's degree varies. The Sn can go every RN and switch its communications with completely different RNs to send information to the bachelor's degree. 2. Related Works: [1]. In planned autonomous system, the mobile metallic element is hopped-up by A battery with a restricted supply of energy. On the opposite hand, sensing, natural philosophy, and exploit of the metallic element all consume the battery energy. Moreover, not like the RNs’ multiple attainable energy sources which can come back from batteries,
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 132 power cords, or alternative energy, the SN’s solely energy supply is from the battery. [2]. during this paper, centered on water distribution observance system. Detector node was placed on underground and relay node was placed on top of ground. Detector node was observance the water level and it had been forward to relay node. Here they designed in physical layer of the detector node to dynamical the signal propagation. If channel strength is inflated it creates a more robust network. [3]. The Authors planned a paper supported hookah line observance system. It principally designed for notice the water run on pipelines. it absolutely was detection by vibration level and of the pipelines. The signal rate was accumulated during this paper for detection. [4]. Multiuser cooperative schemes sometimes have confidence relay choice or channel choice to avoid deep weakening and win diversity whereas maintaining acceptable spectral potency. In some applications like underwater acoustic communications, the low speed of the wave ends up in a awfully long delay between the channel state info (CSI) menstruation time and also the relay assignment time, that results in a severely superannuated CSI. To remedy this, and propose distributed secret writing schemes that aim at achieving sensible diversity multiplexing trade-off (DMT) for multiuser situations wherever CSI isn't on the market for resource allocation. take into account a network with multiple supply nodes, multiple relay nodes, and one destination. here initial introduce a distributed linear block secret writing theme, together with Reed-Solomon codes, wherever every relay implements a column of the generator matrix of the code, and soft call decipherment is utilized to retrieve the knowledge at the destination facet. and derive the end-to-end error performance of this theme and show that the realizable diversity equals the minimum playacting distance of the underlying code, whereas its DMT outperforms that of existing schemes. And extend the projected theme to distributed convolution codes, and show that achieving higher diversity orders is additionally attainable. [5]. This paper says the network choice of wireless underwater detector network. Instead radio waves they used magnetism waves. it had been specially designed for tiny space wireless detector networks. Signal strength was 300-900MHZ There is no elaborate study regarding the way to transmit the info between underwater sensors to sink node. 3. MONOTORING THE CONDITION OF UNDERGROUND PIPELINE In this system, relay nodes can specially style as a heterogeneous network. High power nodes most covers a variety compared to low power relay nodes. However every high power nodes cowl minimum 2 low power nodes therefore on. Compromise sensing element nodes collect the info and it'll forward to corresponding relay node. In figure three.2 If any relay node fails within the network, configuration can amendment mechanically supported high and low power relay node comparison distribution. Channel estimation are variable betting on surface nature, just for avoiding unnecessary packet loss in an exceedingly network. Figure 3.1 Underground pipeline structure The wireless detector network has been used as a live analysis test-bed for the event and refinement of algorithms for leak and burst detection and localization. Throughout its development and enlargement over four years, Water Wise has accumulated an outsized archive of detector knowledge from detector nodes. This archive has tested a useful resource on that to perform explorative data processing to spot common patterns and trends, and to assist determine areas of concern within the network that warrant additional, in-depth investigation. It’s conjointly useful for post-mortem analysis of response to events; wherever the actions that were taken may be matched to knowledge streams and wont to facilitate inform future actions. Station in controlled pipelines typical of these found at retail service stations. The results of those early activities recommend that acoustic measurements combined with advanced signal process will offer a method to discover and find little leaks over long distances in controlled pipelines. The methodology locates leaks virtually by the sound that's created once the liquid escapes into the soil. this method is cheaper, timely, and correct than each of the opposite presently used methodologies
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 133 since pipelines may be tested in minutes instead of days; leaks may be set while not the utilization of pricey, invasive techniques; and correction prices and products loss ar reduced by timely and correct leak location. Further, the potential on-line observation capabilities of passive acoustics ought to leave higher management over product transfer systems. the most important good thing about this capability are the first detection and placement of leaks and also the timely ending of unseaworthy pipelines, therefore serving to forestall the discharge of contaminants into the atmosphere. To obtain general business acceptance of acoustic leak location, it's necessary not solely to prove the claimed capabilities of the technique, however conjointly to outline its limitations. consequently, the applied analysis program mentioned during this paper has been undertaken to develop passive acoustic principles for improved leak detection and placement in pipelines of varied sizes and configurations. US water utilities are sweet-faced with mounting operational and maintenance prices as a results of aging pipeline infrastructures. Leaks and ruptures in facility pipelines and blockages and overflow events in sewer collectors value many bucks a year, and observation and repairing this underground infrastructure presents a severe challenge. during this system discuss however wireless detector networks (WSNs) will increase the abstraction and temporal resolution of operational knowledge from pipeline infrastructures and therefore address the challenge of close to period of time observation and eventually management. Here concentrate on the utilization of WSNs for observation giant diameter bulk-water transmission pipelines. The define a system, Pipe Net, are developing for assembling hydraulic and acoustic/vibration knowledge at high sampling rates still as algorithms for analyzing this knowledge to discover and find leaks. Challenges embody sampling at high knowledge rates, maintaining aggressive duty cycles, and guaranteeing tightly times synchronal knowledge assortment, all below a strict power budget. And have allotted an in depth field trial with Bean town Water and Sewer Commission so as to judge a number of the essential parts of Pipe internet. Figure 3.2 Buried underground pipeline In figure 3.3 beside the results of this preliminary trial, describe the results of intensive laboratory experiments that area unit accustomed judge our analysis and processing solutions. model readying has semiconductor diode to the event of a reusable, field- reprogrammable package infrastructure for distributed high-rate signal process in wireless device networks, that we have a tendency to additionally describe. The Intel atom platform is a sophisticated device node platform consisting of AN ARM7 core, 64kB RAM, 512kB Flash and a Bluetooth radio. And designed a device board to interface the Intel atom to varied analog sensors utilized in Pipe web. The device board supports up to eight analog channels. The data converter (ADC) is connected to a fancy programmable logic device (CPLD) that is to blame for driving the ADC clock to attain the required rate, and bridging the SPI interface of the ADC to the UART interface supported by the atom. Here enforced Bluetooth scatter web formation and a tree routing algorithms to modify self configuring, self healing networks. additionally, the enforced a light- weight reliable transport protocol to support fragmentation and assembly of enormous information packets, as Pipe web motes of times got to transfer messages of up to one hundred K. The 1st tier is analogous in package and hardware design to the condition primarily based maintenance is deployed. Describe the principal variations from this readying within the remainder of this section. These variations fall under 2 broad categories. First, since we wanted to support continuous capture of a lot of information than what would slot in RAM, were unable to use the shop and forward networking choice delineated in. Instead, we have a tendency to enforce a reliable over the air streaming mechanism. Second, required a lot of versatile configuration choices from the backend server, storage of configuration parameters in flash, information report and native ballot options.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 134 4. Advantages  Highly distributed, improved packet delivery  Channel strength is selected by nature of the surface  Minimum residual energy is used by relay nodes. 5. Relay selection Relay node will select by coverage range of the node and movement of sensor nodes. Because here sensor nodes will move depending upon water flow of the pipe line. 6. RN updating model RNs will update the status of the nodes periodically. If any RN miss the data about nearest RN, that node consider as failed node. Heterogeneous network is updating the nearest RN and transmitting the data. It do not depending up on the failed node. in heterogeneous network the relay node is transmitting all data. 7. Choosing different RN  If any RN node failed in the network, sensor node can select different RN node.  Because here the network has heterogeneous nature.  So easily network will hand over to different RN.  Network must be creating two low power nodes comes under one high power node.  Based on traffic load it will vary. 8.RESULTS AND DISCUSSION 8.1. STEP- 1: MOVEMENT OF SENSOR NODES SN detects the leak through acoustic, pressure or alternative effects, and transmits the perceived info to the surface BS degree. Each the quality of the Sn and its operating conditions cause many important challenges on the event of a WSN for the planned autonomous system. First, the radio wave propagation setting between the in-pipe Sn and therefore the surface BS is difficult as signals got to travel through totally different media, together with water, plastic, soil, and air, to succeed in the bachelor's degree. In figure four.1 Heterogeneous web work providing the high packet delivery and high information transmission. Figure 4.1 Movement of sensor node 8.2. STEP 2: DATA TRANSMISSION OF MOVING SENSOR TO RELAY NODE BS is sophisticated as signals ought to travel through totally different media, as well as water, plastic, soil, and air, to achieve the Bachelor of Science .sensor node is moving entire pipe and checking the condition of pipe line, and transmittal that information to the relay node. In figure4.2 Relay node is inserting on top of the bottom. In heterogeneous network a high power relay node is canopy minimum of 2 low power node. that's any relay node is failing means that the neighboring relay node is change that failing node and transmittal information between detector node and relay node. Figure 4.2 data transmission between sensor nodes and relay node 8.3. STEP 3: ACTIVATION OF BASE STATION Relay node is transmission all information to base station and Base station is observation the all practicality of the underground pipe. If any RN is
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 135 failing the neighboring RN is change the failing node and transmission the info. In heterogeneous network every high power covers minimum of 2 low power node and change the condition of failing node and re-transmitting the info. In figure 4.3 Base station play a significant role within the observation system, the ultimate observation is occur within the base station. Figure 4.3 Activation of base station 9. Conclusion: • Specially designed a heterogeneous network for effectively observance the underground pipeline. • In heterogeneous networks if there's any failure detected within the relay node, then the closest RN is change that failing node and knowledge transmission is distributed by victimization dump agent protocol. 10. Future Work: • In the case of failure of relay nodes or inaccessibility of relay channel the information transmitted path is mechanically chosen. • The condition for path choice is predicated on the sensing element transceiver operate that adapt with the channel. 11. REFERENCES [1] Dimitris Chatzigeorgiou, Kamal Youcef- Toumi, Samir Mekid, and Dalei Wu, Rached Ben- Mansour, (2014), ‘Channel-Aware Relay Node Placement in Wireless Sensor Networks for Pipeline Inspection’, Vol.13.No.7,pp.49-51. [2] Alphons Vickers A. L, (1999), ‘The future of water conservation: Challenges ahead’, Vol.114. No. 1, pp.32-56. [3] Ashwa nshChoi C, Chatzigeorgiou D, Ben- Mansour R., and Youcef-Toumi K,(1992), ‘Design and analysis of novel friction controlling mechanism with minimal pipeline’, Vol. 2. No. 3, pp. 12-13. [4] Bhatzigeorgiou D. Youcef-Toumi K, A. Khalifa, and Ben-Mansour R, (2011), ‘Analysis and design of an in-pipe system for water leak detection,’ Vol. 8. No. 9, pp. 12-18. [5] Chatzigeorgiou D, Khalifa A, Youcef- Toumi K., and R. Ben-Mansour, Aprl, (2011), ‘An in-pipe leak detection sensor: Sensing capabilities and evaluation,’ Vol. 3.No.14, pp. 176-234. [6] Dogena H. R, Huisman J. A, H. Meier, Rosenbaum U, and Weuthen M. C Aug. (2009), ‘A.Hybrid wireless underground sensor networks: Quantification of signal attenuation in soil’, Vol. 8. No. 3, pp. 755–761. [7] Ftoianov I, Nachman L, Madden S, and Tokmouline (1987), ‘PIPENET: A wireless sensor network for pipeline monitoring’, Vol. 6.No.8, pp. 264–273. [8] Hkyildiz I. F, Sun Z,and. Vuran M. C (1999), ‘Signal propagation techniques for wireless underground communication networks’, Vol. 2. No. 3, pp. 167–183. [9] Lkyildiz I. F. and Stuntebeck E. P, (2008), ‘Wireless underground sensor networks: Research challenges’,Vol.4.No.6, pp. 621–655. [10] Mhowalia K, Shammas N, Quraishi A, and Al-Muttair F. F Sep, (2009), ‘Assessment of leakage in the Riyadh water distribution network’,Vol. 2.No.3, pp.12-13.