Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data
in a variety of environments, as the sensor operate on battery which is of limited power. To support high scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection
based on the node energy and the distance from base station to the cluster head for the efficient transmission and to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared with the LEACH algorithm in terms of energy consumption.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data
in a variety of environments, as the sensor operate on battery which is of limited power. To support high scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection
based on the node energy and the distance from base station to the cluster head for the efficient transmission and to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared with the LEACH algorithm in terms of energy consumption.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
Wireless Sensor Networks (WSN) is widely deployed in different fields of applications of smart grid to provide reliable monitoring and controlling of the electric power grid. The objective of this paper is simulate and analyze impact of various smart grid environments on performance of four different WSN
routing protocols namely the Low Energy Adaptive Clustering Hierarchy (LEACH) and Centralized LEACH (LEACT-C) as well as other two conventional protocols namely Minimum Transmission Energy (MTE) and Static Clustering. This analysis would be beneficial in making the correct choice of WSN
routing protocols for various smart grid applications. The performance of the four protocols is simulated using NS-2 network simulation on Ubuntu. The results are analyzed and compared using number of data signals received at base station, energy consumption, and network lifetime as performance metrics. The results show that the performance of various protocols in the smart grid environments have deteriorated due log normal channel characteristics and consequently network lifetime have decreased significantly.
The results also indicate that clustering based routing protocols have more advantageous over conventional protocols; MTE and static clustering. Also, centralized clustering approach is more effective as it distributes energy dissipation evenly throughout the sensor nodes which reduce energy consumption
and prolong the networks’ lifetime. This approach is more effective in delivering data to base station because it has global knowledge of the location and energy of all the nodes in the network.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
Clustering is considered as one of the most prominent solutions to preserve theenergy in the wireless sensor networks. However, for optimal clustering, anenergy efficient cluster head selection is quite important. Improper selectionofcluster heads(CHs) consumes high energy compared to other sensor nodesdue to the transmission of data packets between the cluster members and thesink node. Thereby, it reduces the network lifetime and performance of thenetwork. In order to overcome the issues, we propose a novelcluster headselection approach usinggrey wolf optimization algorithm(GWO) namelyGWO-CH which considers the residual energy, intra-cluster and sink distance.In addition to that, we formulated an objective function and weight parametersfor anefficient cluster head selection and cluster formation. The proposedalgorithm is tested in different wireless sensor network scenarios by varyingthe number of sensor nodes and cluster heads. The observed results conveythat the proposed algorithm outperforms in terms of achieving better networkperformance compare to other algorithms.
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s
lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And
from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
More Related Content
Similar to Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
Wireless Sensor Networks (WSN) is widely deployed in different fields of applications of smart grid to provide reliable monitoring and controlling of the electric power grid. The objective of this paper is simulate and analyze impact of various smart grid environments on performance of four different WSN
routing protocols namely the Low Energy Adaptive Clustering Hierarchy (LEACH) and Centralized LEACH (LEACT-C) as well as other two conventional protocols namely Minimum Transmission Energy (MTE) and Static Clustering. This analysis would be beneficial in making the correct choice of WSN
routing protocols for various smart grid applications. The performance of the four protocols is simulated using NS-2 network simulation on Ubuntu. The results are analyzed and compared using number of data signals received at base station, energy consumption, and network lifetime as performance metrics. The results show that the performance of various protocols in the smart grid environments have deteriorated due log normal channel characteristics and consequently network lifetime have decreased significantly.
The results also indicate that clustering based routing protocols have more advantageous over conventional protocols; MTE and static clustering. Also, centralized clustering approach is more effective as it distributes energy dissipation evenly throughout the sensor nodes which reduce energy consumption
and prolong the networks’ lifetime. This approach is more effective in delivering data to base station because it has global knowledge of the location and energy of all the nodes in the network.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
Clustering is considered as one of the most prominent solutions to preserve theenergy in the wireless sensor networks. However, for optimal clustering, anenergy efficient cluster head selection is quite important. Improper selectionofcluster heads(CHs) consumes high energy compared to other sensor nodesdue to the transmission of data packets between the cluster members and thesink node. Thereby, it reduces the network lifetime and performance of thenetwork. In order to overcome the issues, we propose a novelcluster headselection approach usinggrey wolf optimization algorithm(GWO) namelyGWO-CH which considers the residual energy, intra-cluster and sink distance.In addition to that, we formulated an objective function and weight parametersfor anefficient cluster head selection and cluster formation. The proposedalgorithm is tested in different wireless sensor network scenarios by varyingthe number of sensor nodes and cluster heads. The observed results conveythat the proposed algorithm outperforms in terms of achieving better networkperformance compare to other algorithms.
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s
lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And
from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Editor IJCATR
The objective of our paper is to predict the risk of heart disease in diabetic patients. In this research paper we are applying Naive Bayes data mining classification technique which is a probabilistic classifier based on Bayes theorem with strong (naive) independence assumptions between the features. Data mining techniques have been widely used in health care systems for prediction of various diseases with accuracy. Health care industry contains large amount of data and hidden information. Effective decisions are made with this hidden information by applying data mining techniques. These techniques are used to discover hidden patterns and relationships from the datasets. The major challenge facing the healthcare industry is the provision for quality services at affordable costs. A quality service implies diagnosing patients correctly and treating them effectively. In this proposed system certain attributes are consider in diabetic patients to predict the risk of heart disease
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
1. International Journal of Computer Applications Technology and Research
Volume 7–Issue 08, 301-305, 2018, ISSN:-2319–8656
www.ijcat.com 301
Energy-Aware Routing in Wireless Sensor Network
Using Modified Bi-Directional A*
Nurlaily Vendyansyah
Departement of Electrical
Engineering
University of Brawijaya
Malang, East Java, Indonesia
Sholeh Hadi Pramono
Departement of Electrical
Engineering
University of Brawijaya
Malang, East Java, Indonesia
Muladi
Departement of Electrical
Engineering
State University of Malang
Malang, East Java, Indonesia
Abstract: Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its
function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2].
A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular
clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to
determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other
clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be
implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional
A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station
at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed
routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA *
is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always
changing in every data transmission process. This will result in the use of energy, because they always doing any computation to
determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Kata Kunci: Energy; Routing; Wirelss; Sensor, Network; Betweenness Centrality; Searching; Modified Bi-directional A*.
1. INTRODUCTION
Internet of Thing (IoT) is a concept whereby an object
has the ability to transfer data over a network without
requiring human-to-human or human-to-computer interaction.
IoT has evolved from the convergence of wireless
technologies, micro-electromechanical systems (MEMS), and
the Internet[4]. Based on a survey of IoT analysis, 10 popular
IoT applications are Smart Home (100%), Wearable (63%),
Smart City (34%), Smart Grid (28%), Industrial Internet
(25%), Connected Car 19%), Connected Health (6%), Smart
Retail (2%), Smart Supply Chain (2%), and Smart Farming
(1%). This application works automatically by utilizing
Wireless Sensor Network (WSN) technology.
Although there are many WSN applications, this network
has some limitations that should be considered when deciding
what protocol to use. Some of these limitations are first, WSN
is limited energy supply, WSN has limited energy supply,
thus required energy-saving communication protocol. Second,
Limited Computation, node sensors have limited computing
capabilities so that WSN can not run sophisticated network
protocols. Third Communication, limited bandwidth, so that
often inhibit intersensor communication[4].
In contrast to traditional wireless networks such as
cellular networks, prioritizing quality of service and
bandwidth efficiency, energy consumption and network
lifetime are important in wireless sensor networks (WSN). In
this research, we apply clustering based routing protocol for
WSN. Various protocol clustering has been widely
developed[8],[9],[10],[11],[12],[13],[14],[15],[16], such as
LEACH[5] and its various modifications, PEGASIS, TEEN
and so on. The clustering process will generate nodes
designated as cluster head (CH). CH is tasked to forward
packet data to Base Station. This method will make CH
overloaded, affecting energy usage. If one node or CH die, it
will disrupt the work function of the network.
Low Energy Adaptive Clustering Hierarchy (LEACH) is
one of the most popular WSN routing protocols. CH is
selected periodically each time it sends data (per round), while
the energy supply consumed by each large node is fixed[5].
2. THEORY
This chapter describes the supporting theories of this
research, which will be described in detail in subsequent
chapters.
2.1 Wireless Sensor Network
Wireless Sensor Network (WSN) is a collection of
hundreds or thousands of wirelessly connected sensors. The
sensor device contains a complex set of electronics capable of
performing sensing functions, performing simple computing
processes and having the ability to communicate with other
peers (other sensor nodes) or directly communicate with the
base station (BS). Deployment of sensor node can be either
randomly or manually planted (static). Components of sensor
node are generally shown Figure 1, and Figure 2 show the
wireless sensor network architecture.
2. International Journal of Computer Applications Technology and Research
Volume 7–Issue 08, 301-305, 2018, ISSN:-2319–8656
www.ijcat.com 302
Figure 1. Components of sensor node
Figure 2. Architecture of Wireless Sensor Network[5]
In Figure 1 it can be explained that components of node
sensor generally consist of four main parts, namely sensing
unit, processing unit, communication unit, and power unit.
Sensing unit consists of sensor and ADC (Analog Digital
Converter). The function of the ADC is to change the data
output from the sensor that is analog data into digital data
which will be entered into a digital component that is
microcontroller. Sensor classification and sensor samples are
shown in Table 1.
Table 1. Classification and sample of sensors[1]
Type Example
Temperature Thermistors, thermocouples
Pressure Pressure gauges, barometers, ionization gauges
Optical Photodiodes, phototransistors, infrared sensors,
CCD sensors
Acoustic Piezoelectric resonators, microphones
Mechanical Strain gauges, tactile sensors, capacitive
diaphragms, piezoresistive cells
Motion, vibration Accelerometers, gyroscopes, photo sensors
Flow Anemometers, mass air flow sensors
Position GPS, ultrasound-based sensors, infrared-based
sensors, inclinometers
Electromagnetic Hall-effect sensors, magnetometers
Chemical pH sensors, electrochemical sensors, infrared gas
sensors
Humidity Capacitive and resistive sensors, hygrometers,
MEMS-based humidity sensors
Radiation Ionization detectors, Geiger–Mueller counters.
The Communication protocol for low power devices can be
shown in Table 2.
Table 2. Communication protocol for low power devices
GPRS/GSM
1xRTT/CDMA
IEEE
802.11b/g
IEEE
802.15.1
IEEE
802.15.4
Market name
for standard
2.5G/3G Wi-Fi Bluetooth ZigBee
Network
target
WAN/MAN
WLAN and
hotspot
PAN and
DAN (Desk
Area
Network)
WSN
Application Wide area Enterprice Cable Monitoring
focus voice and data applications
(data and
VoIP)
replacement and
control
Bandwidth
(Mbps)
0.0064 –
0.128+
11 – 54 0.7
0.020 –
0.25
Transmission
range (ft)
3000+ 1 – 300+ 1 – 30+ 1 – 300+
Design
factors
Reach and
Transmission
Quality
Enterprise
support,
scalability,
and cost
Cost, ease
of use
Reliability,
power, and
cost
2.2 Routing Protocol in WSN
In sensor networks, energy conservation, directly related
to network lifetime, is relatively more important than network
performance in terms of quality of data that can be transmitted
(QoS). As the energy will be exhausted, the network may be
needed to reduce the quality of the results in reducing
dissipation energy at the node and thus can extend the
network lifetime. Therefore, energy conservation is
considered more important than network performance. In
general, the division routing protocols in WSN can be shown
Figure 3.
Routing Protocols in WSN
Negotiation
Based
Routing
Flat
Network
Routing
Query
Based
Routing
Hierarchical
Network
Routing
Multipath
Based
Routing
Adaptive
Based
Routing
Sequential Assigment Routing (SAR)
Directed Diffusion
Minimum Cost Forwarding Algorithm (MCFA)
Coherent and Noncoherent Processing
Low Energy Adaptive Clustering Hierarchy (LEACH)
Power Efficient Gathering in Sensor Information System (PEGASIS)
Threshold Sensitive Energy Efficinet Protocols (TEEN and APTEEN)
Small Minimum Energy Communication Network (SMECN)
Fixed Size Cluster Routing
Virtual Grid Architecture Routing
Hierarchical Power Aware Routing
Figure 3. Routing Protocols in WSN[4]
2.3 Modified Bi-Directional A*
The Modified Bi-Directional A * is algorithm uses
heuristic functions with slight modifications. The heuristic
function for n vertices in the forward search of Source (S) to
Destination (G) is shown in equation (1)[6].
(1)
While the heuristic function for n vertices in the search
return (from Destination (G) to Source (S)) is shown equation
(2)
(2)
S : origin node or initial state
G : destination node or goal state
g (S, n) : the actual cost of S to n
g (G, n) : the actual cost from G to n
h_s (n) : approximate cost from n to G
h_g (n) : approximate cost from n to S
2.4 Heuristic Search
In the methods included in the heuristic search, heuristic
functions play a decisive role. A function may be accepted as
a heuristic function if the estimated cost generated does not
exceed the actual cost. When a heuristic function gives an
estimated cost that exceeds the actual cost (overestimate), the
search process can get lost and make the heuristic search to be
3. International Journal of Computer Applications Technology and Research
Volume 7–Issue 08, 301-305, 2018, ISSN:-2319–8656
www.ijcat.com 303
not optimal. The heuristic function is said to be good if it can
provide approximate costs that are close to the actual cost.
The closer the actual cost, the heuristic function more better.
The heuristic function that can be used for the problem of
finding the shortest route is a straight line distance on
Cartesian coordinates which can be calculated using equation
(3)[6].
(3)
With dab is the distance between node a and node b. xa
and ya are the coordinate values of node a on the x and y axes
respectively. xb and yb are the coordinate values of node b on
the x and y axes respectively.
2.5 Betweeness Centrality
In graph theory and network analysis, the centrality
indicator is used to identify the most important nodes in the
graph. Usually used to identify the most influential people in
social networks, the key key infrastructure on the Internet or
urban networks, and the major disease spreaders.
Betweeness Centrality is an indicator of the centrality of
the nodes on a computer network. BC or Betweeness
Centrality works by counting the number of paths that pass
through that node. Betweeness Centrality of the node (v) is
formulated by equation (4)[7].
(4)
3. Routing Protocol
In this chapter, we will explain in detail the designed
routing protocol, which can be described in the step of process
with a flowchart in Figure 4.
Start
var :
n, xm, ym, sink.x,
sink.y, ETX,
ERX,Eo,EDA,Efs,E
mp,rmax
Set random node :
S(i).xd=rand(1,1)*xm;
S(i).yd=rand(1,1)*ym;
Set Base Station :
sink.x=50;
sink.y=50;
Initial
Phase
:
Generate
Node
Deployment
A
Calculate Distance between nodes :
distance=sqrt((S(i).xd-(S(n+1).xd^2 –
((S(i).yd)-(S(i).yd)-(S(n+1).yd)^2))
Set Centrality of node :
Calculate Actual Cost :
Set Shortest Path :
End
Setup
Phase
:
Cluster
Head
Selection
Steady-State
Phase
:
Embedding
Routing
Protocol
A
Figure 4. Flowchart BC-MBDA*
The variables used in this research are shown in Table 2.
Table 2. Identification of Operational Variables
No Name of
variable
Kind of
Variable
Function
1. n Input Number of node.
2. xm Input Coordinat max value x axis of field
dimension.
3. ym Input Coordinat max value y axis of field
dimension.
4. sink.x Input Coordinat value x axis of Base
Station.
5. sink.y Input Coordinat value y axis of Base
Station.
6. ETX Input Energi for Transmit packet data.
7. ERX Input Energy for Receive packet data.
8. Eelec Input Energy of sensor node for
computation process.
9. Eo Input Initial energi for each node.
10. EDA Input Data aggregation energy.
11. Efs Input Energy free space loss (direct).
12. Emp Input Energi multipath (deflective).
13. rmax Input Rounds max.
14. xd Output Coordinat value x axis of node.
15. yd Output Coordinat value y axis of node.
16. do Output Distance of Base Station to Cluster
Head.
17. C Output Node to become Cluster head.
18. E Output Energy of Cluster Head.
19. first_dead Output Number dead node.
4. International Journal of Computer Applications Technology and Research
Volume 7–Issue 08, 301-305, 2018, ISSN:-2319–8656
www.ijcat.com 304
20. distance Output Distance intersensor node.
21. X Output Coordinat value x axis of cluster
head.
22. Y Output Coordinat value y axis of cluster
head.
23. min_dis Output Distance intercluster head.
24. id Output Node id.
25. Message Input Message size.
3.1 Initial Phase
This phase is the stage process of the node deployment,
WSN is modeled in two-dimensional graphics by placing 100
nodes scattered randomly in a 100x100 (m) area. The base
station is located at the coordinates (50,50). The placement of
node and base station is static. The initial energy Eo = 0.5
Joule per node, we assuming all nodes are homogeneous and
4000bit message size.
3.2 Setup Phase
This phase is the stage process of the node deployment,
WSN is modeled in two-dimensional graphics by placing 100
nodes scattered randomly in a 100x100 (m) area. The base
station is located at the coordinates (50,50). The placement of
node and base station is static. The initial energy Eo = 0.5
Joule per node, assuming all nodes are homogeneous and
4000bit message size.
3.3 Steady-State Phase
In this process the system determines the centrality of the
node function as a cluster head in charge of forwarding the
ndata packet to the Base Station. In this process the author
uses Social Network Analysis (SNA) theory approach that is
Betweeness Centrality (BC), which is calculated by using
equation (4). The distance between nodes will be determined
using the heuristic function, according to equation (3). The
output of this process is the node designated as the cluster
head.
4. EXPERIMENTAL RESULT
In this chapter, we will discuss the results of the research
from the scheme designed in the previous chapter. Discussion
of test results includes the results of each process from the
process of generating node deployment, embedding routing
protocol, and routing protocol performance analysis.
Parameters used to determine the performance of routing
protocol in this research are network lifetime, throughput, and
residual energy. The experimental results will be compared
with LEACH.
4.1 Network Model
In Figure 5 it can be seen the network model of the
experiment. In this experiment obtained the results of 21
nodes designated as cluster head.
Figure 5. Node Deployment
4.2 Performance Analysis
4.2.1 Network Lifetime
Figure 6 shows a graph of the simulation results of
routing protocol performance for network lifetime. In this
experiment the node will die after consuming the energy of
0.5 Joule. BC-MBDA * ability to show Network lifetime
better 3.22473% than LEACH. This is influenced by the way
LEACH always uses dynamic clustering in every round,
which will certainly result in the use of energy in CH.
Different with LEACH, BC-MBDA * uses a semi dynamic
clustering strategy. CH is determined in the setup phase, and
is static after being determined as CH. This will reduce the
computation process, so energy usage can be saved.
Figure 6. Network Lifetime analysis result
4.2.2 Throughput
To evaluate throughput performance, the amount of
packet data received in BS is compared to the number of
packets sent by the nodes on each round. The BC-MBDA*
throughput performance can be shown with the graph in
Figure 7. The graph shows that BC-MBDA * throughput
performance is 1.692883% better than LEACH. This is
influenced by the ability of CH in delivering packets to BS.
When CH is overloaded, it causes CH to die because the
energy availability has been exhausted. When CH is off then
the node will not be able to forward packets to BS. This
resulted in disruption of the performance of the WSN system.
5. International Journal of Computer Applications Technology and Research
Volume 7–Issue 08, 301-305, 2018, ISSN:-2319–8656
www.ijcat.com 305
Figure 7. Throughput analysis result
4.2.3 Residual Energy
Figure 8 shows the results of the analysis of the number
of dead nodes in the experiment. The experiment was carried
out as much as 5000 rounds, with an initial energy of 0.5
Joule / node. So the total energy of 100 nodes is 50 Joules.
The graph shows that BC-MBDA * is better 0.879459% than
LEACH.
Figure 8. Residual Energy analysis results
5. CONCLUSION
Performance metrics analyzed in this research are
network lifetime, throughput, and residual energy. The test
results show that the performance of the designed routing
protocol is better than LEACH. 1.692883% for Network
Lifetime, 1.692883% for Throughput and 0.879459% for
Residual Energy.
In the next study, we will develop a combination of K-
NN method with MBDA*. In setup phase we will use K-
Nearest Neighbors algorithm for cluster head selection, and
for Steady-State Phase used MBDA*.
6. REFERENCES
[1] C, Shanti, and Sharmila D. "A self-organized
location aware energy efficient protocol for wireless
sensor networks." Computers and Electrical
Engineering 41, 2015: 265-274.
[2] Dargie, Waltenegus, and Christian Poellabauer.
Fundamentals of Wireless Sensor Networks :
Theory and Practice. United Kingdom: A John
Willey and Sons,Ltd, 2010.
[3] Abassi, Ameer Ahmed, and Mohamed Younis. "A
survey on Clustering algorithms of wireless sensor
networks." Computer Communication 30, 2007:
2826-2841.
[4] Mohammad Ilyas, Imad Mahgoub, Handbook of
Sensor Networks : Compact Wireless and Wired
Sensing Systems.
[5] A. Nayebi and H. Sarbazi-Azad, "Performance
modeling of the LEACH protocol for mobile
wireless sensor networks," Journal of Pararel and
Distributed Computing, vol. 71, pp. 812-821, 2011.
[6] Suyanto, Artificial Intelligence Searching -
Reasoning - Planning - Learning Edisi Revisi,
Bandung: Informatika, 2011.
[7] Social Network Analysis : Theory and Application.
[8] Yu, Hu, and Wang Xiaohui. "PSO-based Energy-
balanced Double Cluster-heads Clutering Routing
for wireless sensor networks." Procedia
Engineering 15, 2011: 3073-3077.
[9] Z. Yong and Q. Pei, "A Energy-Efficient Clustering
Routing Algorithm Based on Distance and Residual
Energy for Wireless Sensor Networks,"
International Workshop on Information and
Electronics Engineering (IWIEE), pp. 1882-1888,
2012.
[10] T. Amgoth and P. , "Energy-aware routing
algorithm for wireless sensor networks," Computer
and Electrical Engineering 41, pp. 357-367, 2015.
[11] Hui Li, Xia, and Zhi Hong Guan. "Energy-Aware
Routing in Wireless Sensor Networks Using Local
Betweenness Centrality." International Journal of
Distributed Sensor Networks, Hindawi Publishing
Corporation, 2013.
[12] Khalil, Enan A, and Bara'a A Attea. "Energy-aware
evolutionary routing protocol for dynamic
clustering of wireless sensor networks." Swarm and
Evolutionary Computation 1, 2011: 195-203.
[13] Mahajan, Shilpa, Jyoteesh Malhotra, and Sandep
Sharma. "An energy balanced QoS based cluster
head selection strategy for WSN." Egyptian
Informatics Journal 15, 2014: 189-199.
[14] Nadeem, Q, N Javaid, S. N Mohammad, M. Y
Khan, S Sarfraz, and M Gull. "SIMPLE: Stable
Increased-throughput Multihop Protocol for Link
Efficiency in Wireless Body Area Network."
Broadband and Wireless Computing,
Communication and Applications (BWCCA), 2013:
221 - 226.
[15] Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-
based path configuration method for LEAP in
sensor networks." Ad Hoc Networks 31, 2015: 63-
79.
[16] Nazir, Babar, and Halabi Hasbullah. "Energy
efficient and QoS aware routing protocol for
Clustered Wireless Sensor Network." Computers
and Electrical Engineering 39, 2013: 2425-2441.