Data gathering is an attractive operation for obtaining information in wireless sensor networks (WSNs). But one of important challenges is to minimize energy consumption of networks. In this paper, an integration of distributed compressive sensing (CS) and virtual multi-input multi-output (vMIMO) in WSNs is proposed to significantly decrease the data gathering cost. The scheme first constructs a distributed data compression model based on low density parity check-like (LDPC-like) codes. Then a cluster-based dynamic virtual MIMO transmission protocol is proposed. The number of clusters, number of cooperative nodes and the constellation size are determined by a new established optimization model under the restrictions of compression model. Finally, simulation results show that the scheme can reduce the data gathering cost and prolong the sensor network’s lifetime in a reliable guarantee of sensory data recovery quality.
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...IJCNCJournal
Energy efficiency is an essential issue to be reckoned in wireless sensor networks development. Since the low-powered sensor nodes deplete their energy in transmitting the collected information, several strategies have been proposed to investigate the communication power consumption, in order to reduce the amount of transmitted data without affecting the information reliability. Lossy compression is a promising solution recently adapted to overcome the challenging energy consumption, by exploiting the data correlation and discarding the redundant information. In this paper, we propose a hybrid compression approach based on two dimensions specified as horizontal (HC) and vertical compression (VC), typically implemented in cluster-based routing architecture. The proposed scheme considers two key performance metrics, energy expenditure, and data accuracy to decide the adequate compression approach based on HC-VC or VC-HC configuration according to each WSN application requirement. Simulation results exhibit the performance of both proposed approaches in terms of extending the clustering network lifetime.
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
Recent developments in processor, memory and radio technology have enabled wireless sensor networks
which are deployed to collect useful information from an area of interest. The sensed data must be
gathered and transmitted to a base station where it is further processed for end-user queries. Since the
network consists of low-cost nodes with limited battery power, power efficient methods must be employed
for data gathering and aggregation in order to achieve long network lifetimes. In an environment where in
a round of communication each of the sensor nodes has data to send to a base station, it is important to
minimize the total energy consumed by the system in a round so that the system lifetime is maximized. With
the use of data fusion and aggregation techniques, while minimizing the total energy per round, if power
consumption per node can be balanced as well, a near optimal data gathering and routing scheme can be
achieved in terms of network lifetime. Several application specific sensor network data gathering protocols
have been proposed in research literatures. However, most of the proposed algorithms have been some
attention to the related network lifetime and saving energy are two critical issues for wireless sensor
networks. In this paper we have explored general network lifetime in wireless sensor networks and made an
extensive study to categorize available data gathering techniques and analyze possible network lifetime on
them.
ENERGY-EFFICIENT DATA COLLECTION IN CLUSTERED WIRELESS SENSOR NETWORKS EMPLOY...ijwmn
In this paper, a energy-efficient data collection method is proposed in which an integration between
Discrete Cosine Transform (DCT) matrix and clustering in wireless sensor networks (WSNs) is
exploited.Based on the fact that sensory data in WSNs is often highly correlated and is suitable to be
transformed in DCT domain, we propose that each cluster from the networks only sends a small number of
large DCT transformed coefficients to the base-station (BS) for data collection in two common ways, either
directly or in multi-hop routing. All sensory data from the sensor network can be recovered based on the
large coefficients received at the BS. We further analyze and formulate the communication cost as the
power consumption for transmitting data in such networks based on stochastic problems. Some common
clustering algorithms are applied and compared to verify the analysis and simulation results. Both noise
and noiseless environments for the proposed method are considered.
Optimizing the Data Collection in Wireless Sensor NetworkIRJET Journal
This document discusses optimizing data collection in wireless sensor networks. It begins by introducing the concepts of wireless sensor networks and data collection trees. It then discusses using Breadth-First Search (BFS) for data collection and proposes a Parallel Data Collection in BFS (PDCBFS) approach. PDCBFS allows nodes to aggregate data from themselves and child nodes into a single packet to send to the parent node, reducing transfer time compared to individual packets in BFS. The document analyzes and compares the performance of BFS and PDCBFS in terms of data collected and delay required for collection.
This document proposes a joint design of data compression and MAC protocol for smart grids using compressed sensing. It aims to minimize reporting time while reliably reconstructing power injection data from multiple nodes. Specifically, it employs two-dimensional compressed sensing to compress correlated power data in space and time. It also adapts the 802.15.4 MAC protocol frame structure to enable efficient data transmission for reconstruction. An analytical model is developed to optimize MAC parameters and guarantee reliable data reconstruction with minimum reporting delay.
This document summarizes various techniques for data collection in densely populated wireless sensor networks that improve energy efficiency. It discusses plain data collection, in-network aggregation, query-based collection, multipath collection, feedback-based collection, and optimal and suboptimal aggregation techniques. The key goal of these techniques is to reduce the number of transmissions needed to collect sensor data in order to prolong the network lifetime by minimizing energy consumption during data transfer.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
Communication Cost Reduction by Data Aggregation: A SurveyIJMTST Journal
Wireless Sensor Networks have gained wide popularity in the recent years for its high-ranking applications such as remote environment monitoring, target tracking, safety-critical monitoring etc. However Wireless Sensor Networks face many constraints like low computational power, small storage, and limited energy resources. One of the important issues in wireless sensor network is to increase the network lifetime to keep the network operational as long as possible. In this survey paper, we provide a comprehensive review of the existing literature on techniques and protocols for data aggregation to reduce communication cost and increase network lifetime in wireless sensor networks.
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...IJCNCJournal
Energy efficiency is an essential issue to be reckoned in wireless sensor networks development. Since the low-powered sensor nodes deplete their energy in transmitting the collected information, several strategies have been proposed to investigate the communication power consumption, in order to reduce the amount of transmitted data without affecting the information reliability. Lossy compression is a promising solution recently adapted to overcome the challenging energy consumption, by exploiting the data correlation and discarding the redundant information. In this paper, we propose a hybrid compression approach based on two dimensions specified as horizontal (HC) and vertical compression (VC), typically implemented in cluster-based routing architecture. The proposed scheme considers two key performance metrics, energy expenditure, and data accuracy to decide the adequate compression approach based on HC-VC or VC-HC configuration according to each WSN application requirement. Simulation results exhibit the performance of both proposed approaches in terms of extending the clustering network lifetime.
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
Recent developments in processor, memory and radio technology have enabled wireless sensor networks
which are deployed to collect useful information from an area of interest. The sensed data must be
gathered and transmitted to a base station where it is further processed for end-user queries. Since the
network consists of low-cost nodes with limited battery power, power efficient methods must be employed
for data gathering and aggregation in order to achieve long network lifetimes. In an environment where in
a round of communication each of the sensor nodes has data to send to a base station, it is important to
minimize the total energy consumed by the system in a round so that the system lifetime is maximized. With
the use of data fusion and aggregation techniques, while minimizing the total energy per round, if power
consumption per node can be balanced as well, a near optimal data gathering and routing scheme can be
achieved in terms of network lifetime. Several application specific sensor network data gathering protocols
have been proposed in research literatures. However, most of the proposed algorithms have been some
attention to the related network lifetime and saving energy are two critical issues for wireless sensor
networks. In this paper we have explored general network lifetime in wireless sensor networks and made an
extensive study to categorize available data gathering techniques and analyze possible network lifetime on
them.
ENERGY-EFFICIENT DATA COLLECTION IN CLUSTERED WIRELESS SENSOR NETWORKS EMPLOY...ijwmn
In this paper, a energy-efficient data collection method is proposed in which an integration between
Discrete Cosine Transform (DCT) matrix and clustering in wireless sensor networks (WSNs) is
exploited.Based on the fact that sensory data in WSNs is often highly correlated and is suitable to be
transformed in DCT domain, we propose that each cluster from the networks only sends a small number of
large DCT transformed coefficients to the base-station (BS) for data collection in two common ways, either
directly or in multi-hop routing. All sensory data from the sensor network can be recovered based on the
large coefficients received at the BS. We further analyze and formulate the communication cost as the
power consumption for transmitting data in such networks based on stochastic problems. Some common
clustering algorithms are applied and compared to verify the analysis and simulation results. Both noise
and noiseless environments for the proposed method are considered.
Optimizing the Data Collection in Wireless Sensor NetworkIRJET Journal
This document discusses optimizing data collection in wireless sensor networks. It begins by introducing the concepts of wireless sensor networks and data collection trees. It then discusses using Breadth-First Search (BFS) for data collection and proposes a Parallel Data Collection in BFS (PDCBFS) approach. PDCBFS allows nodes to aggregate data from themselves and child nodes into a single packet to send to the parent node, reducing transfer time compared to individual packets in BFS. The document analyzes and compares the performance of BFS and PDCBFS in terms of data collected and delay required for collection.
This document proposes a joint design of data compression and MAC protocol for smart grids using compressed sensing. It aims to minimize reporting time while reliably reconstructing power injection data from multiple nodes. Specifically, it employs two-dimensional compressed sensing to compress correlated power data in space and time. It also adapts the 802.15.4 MAC protocol frame structure to enable efficient data transmission for reconstruction. An analytical model is developed to optimize MAC parameters and guarantee reliable data reconstruction with minimum reporting delay.
This document summarizes various techniques for data collection in densely populated wireless sensor networks that improve energy efficiency. It discusses plain data collection, in-network aggregation, query-based collection, multipath collection, feedback-based collection, and optimal and suboptimal aggregation techniques. The key goal of these techniques is to reduce the number of transmissions needed to collect sensor data in order to prolong the network lifetime by minimizing energy consumption during data transfer.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
Communication Cost Reduction by Data Aggregation: A SurveyIJMTST Journal
Wireless Sensor Networks have gained wide popularity in the recent years for its high-ranking applications such as remote environment monitoring, target tracking, safety-critical monitoring etc. However Wireless Sensor Networks face many constraints like low computational power, small storage, and limited energy resources. One of the important issues in wireless sensor network is to increase the network lifetime to keep the network operational as long as possible. In this survey paper, we provide a comprehensive review of the existing literature on techniques and protocols for data aggregation to reduce communication cost and increase network lifetime in wireless sensor networks.
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy
Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation
of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base
station. The main objective of LEACH is: To prolong life time of the network, reduce the energy
consumption by each node, using the data concentration to reduce bulletins in the network. However, in the
case of large network, the distance from the nodes to the base station is very different. Therefore, the
energy consumption when becoming the host node is very different but LEACH is not based on the
remaining energy to choose the host node, which is based on the number of times to become the host node
in the previous rounds. This makes the nodes far away from the base station lose power sooner.
In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating
time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of becoming
the cluster-head than the those in far and with lower energy.
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork
compression and multiple query synthesis at the base-station and modification of query syntax through introduction of Static Variables. These approaches are general approaches which can be used in any WSN irrespective of application.
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
This document discusses energy efficient data acquisition in wireless sensor networks. It proposes using mobile sinks to reduce energy consumption compared to static sinks. The network model includes sensor nodes deployed randomly to monitor an area and send data to sink nodes. Two cases are examined: one with a static sink and one with a mobile sink that moves along shortest paths to cluster heads. Simulation results show the mobile sink reduces energy consumption by 30% and improves packet delivery ratio and reduces delay compared to the static sink. The mobile sink approach enhances network lifetime by more efficiently utilizing energy in data transmission from sensors to sinks.
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
This document discusses energy efficient big data gathering in densely distributed sensor networks. It proposes a new mobile sink routing and data gathering method using network clustering based on a modified Expectation-Maximization technique. This aims to minimize energy consumption by deriving an optimal number of clusters to reduce energy used for data requests and wireless transmissions between sensor nodes. Numerical results are presented to validate that the proposed method can efficiently gather big data from sensor networks in an energy efficient manner.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
This document presents a method for joint congestion control and scheduling in wireless networks using sliding mode control. It formulates the problem using network utility maximization to maximize total utility while satisfying capacity constraints. Dual decomposition is used to separate the problem into congestion control and scheduling subproblems. A sliding mode controller is designed for congestion control based on queue length feedback. The scheduling problem depends on Lagrangian prices from the congestion control problem. Simulation results show improved packet delivery ratio, throughput, and performance under varying signal-to-noise ratios. The method jointly optimizes congestion control and scheduling using a sliding mode approach.
The document presents the outline of a research project on performance evaluation of secure data transmission in wireless sensor networks using IEEE 802.11x standards. The research aims to enhance network lifetime by designing an energy-efficient clustering approach and data aggregation technique. It involves developing a cluster head selection algorithm using genetic algorithms, designing a broadcast tree construction protocol for data transmission, and implementing hash-based authentication. The research will be conducted in phases involving literature review, methodology development, implementation, and performance evaluation. The expected outcomes include reduced data transmission time and improved quality of service through increased network lifetime.
This document summarizes approaches for conserving energy in wireless sensor networks. It discusses how energy conservation can be achieved at both the sensor and network subsystems. At the network subsystem level, the main approaches are duty cycling, data-driven techniques, and mobility. Duty cycling puts the radio in sleep mode when not in use to save energy. Data-driven techniques reduce unnecessary data transmission by exploiting the spatial and temporal correlation in sensor data. This includes in-network processing, data compression, and data prediction techniques discussed in the paper. Mobility can also help balance traffic load and reduce energy usage by enabling direct communication with mobile data collection devices.
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
High Speed Low Power Veterbi Decoder Design for TCM Decodersijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...ijsrd.com
Wireless Sensor Network (WSN) applications have increased in recent times in fields such as environmental sensing, area monitoring, air pollution monitoring, forest res detection, machine health monitoring, and landslide detection. In such applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism is the most preferred one. Hence, to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering. In most of the WSN designs based on clustering, Base Station (BS) is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. Critical applications like these cannot afford to have BS failure as it is a gateway from sensor networks to the outside world. In order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption.
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
In recent years, applications of wireless sensor networks have evolved in many areas such as target tracking, environmental monitoring, military and medical applications. Wireless sensor network continuously collect and send data through sensor nodes from a specific region to a base station. But, data redundancy due to neighbouring sensors consumes energy, compromising the network lifetime. In order to improve the network lifetime, a novel cluster based local route search method, called, Greedy Clusterbased Routing (GCR) technique in wireless sensor network. The proposed GCR method uses arbitrary timer in order to participate cluster head selection process with maximum neighbour nodes and minimum distance between the source and base station. GCR constructs dynamic routing improving the rate of network lifetime through Mass Proportion value. Also, GCR uses a greedy route finding strategy for
balancing energy consumption. Experimental results show that GCR achieves significant energy savings and prolong network lifetime.
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
The document describes a proposed sink mobility based energy efficient routing protocol for wireless sensor networks. The protocol uses both a static centralized sink and a mobile sink that follows a predetermined path with 4 sojourn locations. This is aimed to improve network lifetime by balancing energy load across nodes. Simulation results show that the proposed approach with a mobile sink performs better than the Threshold sensitive Energy Efficient sensor Network (TEEN) protocol alone in terms of number of alive nodes, number of cluster heads, and number of packets sent to the base station over multiple rounds. Using a mobile sink helps scatter the energy load in the network and extends lifetime compared to only using a static sink.
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...IJECEIAES
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on KMeans clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
This document summarizes an energy efficient clustering algorithm proposed for wireless sensor networks. It discusses the objectives, existing system, proposed system, simulation results and conclusions. The existing system uses a distributed self-organization balanced clustering algorithm (DSBCA) that has uniform cluster sizes and issues with node dropout. The proposed energy efficient clustering algorithm (EECA) forms unequal cluster sizes based on average neighbor energy and selects cluster heads through uneven competition ranges. Simulation results show the heterogeneous EECA provides longer network lifetime, higher efficiency and throughput than the homogeneous EECA.
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET Journal
This document summarizes a research paper that proposes an improved routing protocol for wireless sensor networks (WSNs) using a hybrid Tabu-PSO technique. It begins with background on WSNs and discusses the General Self-organized Tree-based Energy-balance Routing Protocol (GSTEB). It then introduces a hybrid Tabu-PSO algorithm to optimize routing and cluster head selection in GSTEB in order to overcome its limitations and improve energy efficiency. Simulation results show that the proposed technique outperforms existing methods in terms of reducing packet rate, end-to-end delay, and prolonging network lifetime.
Efficient multicast delivery for data redundancy minimizationJayakrishnan U
This document discusses efficient multicast delivery techniques to minimize data redundancy over wireless data centers. It presents a system model where servers are grouped in racks connected via top-of-rack switches and wireless access points. The problem is formulated to minimize total multicast traffic by constructing and maintaining multicast trees comprising wired and wireless links. Simulation results show the proposed algorithms reduce traffic compared to other approaches as the number of multicast groups and joining nodes increases. The algorithms provide effective solutions for multicast delivery in wireless data center networks.
Presentation: Wind Speed Prediction using Radial Basis Function Neural NetworkArzam Muzaffar Kotriwala
This document describes a project using a radial basis function neural network to predict wind speed. It discusses motivations for wind speed prediction and for using neural networks. It outlines objectives to design and test an RBF network model using historical wind data. The methodology describes collecting wind data, selecting input variables, training the RBF network with different configurations, and comparing its performance to other techniques. Results show the RBF network outperformed persistence and backpropagation models with some configurations achieving more accurate 1-hour ahead predictions. The conclusion discusses findings and recommendations for further improving wind speed prediction.
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
Underwater Wireless Acoustic Sensor Networks (UWASNs) are creating attentiveness in
researchers due to its wide area of applications. To extract the data from underwater and transmit to
watersurface, numerous clustering and data aggregation schemes are employed. The main objectives of
clustering and data aggregation schemes are to decrease the consumption of energy and prolong the
lifetime of the network. In this paper, we focus on initial clustering of sensor nodes based on their
geographical locations using fuzzy logic. The probability of degree of belongingness of a sensor node to its
cluster, along with number of clusters is analysed and discussed. Based on the energy and distance the
cluster head nodes are determined. Finally using using similarity function data aggregation is analysed and
discussed. The proposed scheme is simulated in MATLAB and compared with LEACH algorithm.
The simulation results indicate that the proposed scheme performs better in maximizing network lifetime
and minimizing energy consumption.
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
Energy Efficiency and prolonged network lifetime are few of the major concern areas. Energy consumption rated of sensor nodes can be reduced in various ways. Data aggregation, result sharing and filtration of aggregated data among sensor nodes deployed in the unattended regions have been few of the most researched areas in the field of wireless sensor networks. While data aggregation is concerned with minimizing the information transfer from source to sink to reduce network traffic and removing congestion in network, result sharing focuses on sharing of information among agents pertinent to the tasks at hand and filtration of aggregated data so as to remove redundant information. There exist various algorithms for data aggregation and filtration using different mobile agents. In this proposed work same mobile agent is used to perform both tasks data aggregation and data filtration. This approach advocates the sharing of resources and reducing the energy consumption level of sensor nodes.
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
This document summarizes a research paper that proposes an improved energy efficient LEACH (IEE-LEACH) routing protocol for mobile ad hoc networks (MANETs). The paper discusses how the LEACH protocol randomly selects cluster heads, which can lead to uneven energy distributions. The proposed IEE-LEACH protocol selects cluster heads based on remaining node energy and a cost function to balance energy usage and improve network lifetime. Simulation results show the IEE-LEACH protocol achieves higher packet delivery ratios, lower end-to-end delays, and prolongs network lifetime compared to the standard LEACH protocol.
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy
Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation
of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base
station. The main objective of LEACH is: To prolong life time of the network, reduce the energy
consumption by each node, using the data concentration to reduce bulletins in the network. However, in the
case of large network, the distance from the nodes to the base station is very different. Therefore, the
energy consumption when becoming the host node is very different but LEACH is not based on the
remaining energy to choose the host node, which is based on the number of times to become the host node
in the previous rounds. This makes the nodes far away from the base station lose power sooner.
In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating
time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of becoming
the cluster-head than the those in far and with lower energy.
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork
compression and multiple query synthesis at the base-station and modification of query syntax through introduction of Static Variables. These approaches are general approaches which can be used in any WSN irrespective of application.
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
This document discusses energy efficient data acquisition in wireless sensor networks. It proposes using mobile sinks to reduce energy consumption compared to static sinks. The network model includes sensor nodes deployed randomly to monitor an area and send data to sink nodes. Two cases are examined: one with a static sink and one with a mobile sink that moves along shortest paths to cluster heads. Simulation results show the mobile sink reduces energy consumption by 30% and improves packet delivery ratio and reduces delay compared to the static sink. The mobile sink approach enhances network lifetime by more efficiently utilizing energy in data transmission from sensors to sinks.
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
This document discusses energy efficient big data gathering in densely distributed sensor networks. It proposes a new mobile sink routing and data gathering method using network clustering based on a modified Expectation-Maximization technique. This aims to minimize energy consumption by deriving an optimal number of clusters to reduce energy used for data requests and wireless transmissions between sensor nodes. Numerical results are presented to validate that the proposed method can efficiently gather big data from sensor networks in an energy efficient manner.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
This document presents a method for joint congestion control and scheduling in wireless networks using sliding mode control. It formulates the problem using network utility maximization to maximize total utility while satisfying capacity constraints. Dual decomposition is used to separate the problem into congestion control and scheduling subproblems. A sliding mode controller is designed for congestion control based on queue length feedback. The scheduling problem depends on Lagrangian prices from the congestion control problem. Simulation results show improved packet delivery ratio, throughput, and performance under varying signal-to-noise ratios. The method jointly optimizes congestion control and scheduling using a sliding mode approach.
The document presents the outline of a research project on performance evaluation of secure data transmission in wireless sensor networks using IEEE 802.11x standards. The research aims to enhance network lifetime by designing an energy-efficient clustering approach and data aggregation technique. It involves developing a cluster head selection algorithm using genetic algorithms, designing a broadcast tree construction protocol for data transmission, and implementing hash-based authentication. The research will be conducted in phases involving literature review, methodology development, implementation, and performance evaluation. The expected outcomes include reduced data transmission time and improved quality of service through increased network lifetime.
This document summarizes approaches for conserving energy in wireless sensor networks. It discusses how energy conservation can be achieved at both the sensor and network subsystems. At the network subsystem level, the main approaches are duty cycling, data-driven techniques, and mobility. Duty cycling puts the radio in sleep mode when not in use to save energy. Data-driven techniques reduce unnecessary data transmission by exploiting the spatial and temporal correlation in sensor data. This includes in-network processing, data compression, and data prediction techniques discussed in the paper. Mobility can also help balance traffic load and reduce energy usage by enabling direct communication with mobile data collection devices.
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
High Speed Low Power Veterbi Decoder Design for TCM Decodersijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...ijsrd.com
Wireless Sensor Network (WSN) applications have increased in recent times in fields such as environmental sensing, area monitoring, air pollution monitoring, forest res detection, machine health monitoring, and landslide detection. In such applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism is the most preferred one. Hence, to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering. In most of the WSN designs based on clustering, Base Station (BS) is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. Critical applications like these cannot afford to have BS failure as it is a gateway from sensor networks to the outside world. In order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption.
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
In recent years, applications of wireless sensor networks have evolved in many areas such as target tracking, environmental monitoring, military and medical applications. Wireless sensor network continuously collect and send data through sensor nodes from a specific region to a base station. But, data redundancy due to neighbouring sensors consumes energy, compromising the network lifetime. In order to improve the network lifetime, a novel cluster based local route search method, called, Greedy Clusterbased Routing (GCR) technique in wireless sensor network. The proposed GCR method uses arbitrary timer in order to participate cluster head selection process with maximum neighbour nodes and minimum distance between the source and base station. GCR constructs dynamic routing improving the rate of network lifetime through Mass Proportion value. Also, GCR uses a greedy route finding strategy for
balancing energy consumption. Experimental results show that GCR achieves significant energy savings and prolong network lifetime.
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
The document describes a proposed sink mobility based energy efficient routing protocol for wireless sensor networks. The protocol uses both a static centralized sink and a mobile sink that follows a predetermined path with 4 sojourn locations. This is aimed to improve network lifetime by balancing energy load across nodes. Simulation results show that the proposed approach with a mobile sink performs better than the Threshold sensitive Energy Efficient sensor Network (TEEN) protocol alone in terms of number of alive nodes, number of cluster heads, and number of packets sent to the base station over multiple rounds. Using a mobile sink helps scatter the energy load in the network and extends lifetime compared to only using a static sink.
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...IJECEIAES
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on KMeans clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
This document summarizes an energy efficient clustering algorithm proposed for wireless sensor networks. It discusses the objectives, existing system, proposed system, simulation results and conclusions. The existing system uses a distributed self-organization balanced clustering algorithm (DSBCA) that has uniform cluster sizes and issues with node dropout. The proposed energy efficient clustering algorithm (EECA) forms unequal cluster sizes based on average neighbor energy and selects cluster heads through uneven competition ranges. Simulation results show the heterogeneous EECA provides longer network lifetime, higher efficiency and throughput than the homogeneous EECA.
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET Journal
This document summarizes a research paper that proposes an improved routing protocol for wireless sensor networks (WSNs) using a hybrid Tabu-PSO technique. It begins with background on WSNs and discusses the General Self-organized Tree-based Energy-balance Routing Protocol (GSTEB). It then introduces a hybrid Tabu-PSO algorithm to optimize routing and cluster head selection in GSTEB in order to overcome its limitations and improve energy efficiency. Simulation results show that the proposed technique outperforms existing methods in terms of reducing packet rate, end-to-end delay, and prolonging network lifetime.
Efficient multicast delivery for data redundancy minimizationJayakrishnan U
This document discusses efficient multicast delivery techniques to minimize data redundancy over wireless data centers. It presents a system model where servers are grouped in racks connected via top-of-rack switches and wireless access points. The problem is formulated to minimize total multicast traffic by constructing and maintaining multicast trees comprising wired and wireless links. Simulation results show the proposed algorithms reduce traffic compared to other approaches as the number of multicast groups and joining nodes increases. The algorithms provide effective solutions for multicast delivery in wireless data center networks.
Presentation: Wind Speed Prediction using Radial Basis Function Neural NetworkArzam Muzaffar Kotriwala
This document describes a project using a radial basis function neural network to predict wind speed. It discusses motivations for wind speed prediction and for using neural networks. It outlines objectives to design and test an RBF network model using historical wind data. The methodology describes collecting wind data, selecting input variables, training the RBF network with different configurations, and comparing its performance to other techniques. Results show the RBF network outperformed persistence and backpropagation models with some configurations achieving more accurate 1-hour ahead predictions. The conclusion discusses findings and recommendations for further improving wind speed prediction.
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
Underwater Wireless Acoustic Sensor Networks (UWASNs) are creating attentiveness in
researchers due to its wide area of applications. To extract the data from underwater and transmit to
watersurface, numerous clustering and data aggregation schemes are employed. The main objectives of
clustering and data aggregation schemes are to decrease the consumption of energy and prolong the
lifetime of the network. In this paper, we focus on initial clustering of sensor nodes based on their
geographical locations using fuzzy logic. The probability of degree of belongingness of a sensor node to its
cluster, along with number of clusters is analysed and discussed. Based on the energy and distance the
cluster head nodes are determined. Finally using using similarity function data aggregation is analysed and
discussed. The proposed scheme is simulated in MATLAB and compared with LEACH algorithm.
The simulation results indicate that the proposed scheme performs better in maximizing network lifetime
and minimizing energy consumption.
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
Energy Efficiency and prolonged network lifetime are few of the major concern areas. Energy consumption rated of sensor nodes can be reduced in various ways. Data aggregation, result sharing and filtration of aggregated data among sensor nodes deployed in the unattended regions have been few of the most researched areas in the field of wireless sensor networks. While data aggregation is concerned with minimizing the information transfer from source to sink to reduce network traffic and removing congestion in network, result sharing focuses on sharing of information among agents pertinent to the tasks at hand and filtration of aggregated data so as to remove redundant information. There exist various algorithms for data aggregation and filtration using different mobile agents. In this proposed work same mobile agent is used to perform both tasks data aggregation and data filtration. This approach advocates the sharing of resources and reducing the energy consumption level of sensor nodes.
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
This document summarizes a research paper that proposes an improved energy efficient LEACH (IEE-LEACH) routing protocol for mobile ad hoc networks (MANETs). The paper discusses how the LEACH protocol randomly selects cluster heads, which can lead to uneven energy distributions. The proposed IEE-LEACH protocol selects cluster heads based on remaining node energy and a cost function to balance energy usage and improve network lifetime. Simulation results show the IEE-LEACH protocol achieves higher packet delivery ratios, lower end-to-end delays, and prolongs network lifetime compared to the standard LEACH protocol.
Energy Efficient Techniques for Data aggregation and collection in WSNIJCSEA Journal
A multidisciplinary research area such as wireless sensor networks (WSN) have been invoked the monitoring of remote physical environment and are used for a wide range of applications ranging from defense personnel to many scientific research, statistical application, disaster area and War Zone. These networks are constraint with energy, memory and computing power enhance efficient techniques are needed for data aggregation, data collection, query processing, decision making and routing in sensor networks. The problem encountered in the recent past was of the more battery power consumption as activity increases, need more efficient data aggregation and collection techniques with right decision making capabilities. Therefore, this paper proposed the efficient and effective architecture and mechanism of energy efficient techniques for data aggregation and collection in WSN using principles like global weight calculation of nodes, data collection for cluster head and data aggregation techniques using data cube aggregation.
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Efficient Cluster Based Data Collection Using Mobile Data Collector for Wirel...ijceronline
Establishing an efficient data gathering scheme in wireless sensor networks is a challenging task. Lot of researches has been carried out to establish energy efficient data gathering scheme to avoid heavy traffic received by the nodes near the sink. Data gathering scheme is a significant factor in determining the network lifetime. In this paper we propose an efficient data gathering scheme by introducing clustering and mobility into the wireless sensor network. We consider data collection in wireless sensor networks by utilizing mobile data collector and cluster heads. Cluster heads are chosen and clusters are formed to collect data from the sensor nodes. The proposed scheme finds the shortest tour for the mobile data collector to collect data from the cluster heads. The shortest tour saves time and energy in data gathering.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork compression and multiple query synthesis at the base-station and modification of query syntax
through introduction of Static Variables. These approaches are general approaches which can be used in
any WSN irrespective of application.
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...IRJET Journal
This document summarizes a survey on using cluster-based data aggregation techniques in wireless sensor networks for railway track monitoring. It discusses how WSNs can be used to automatically monitor tracks and reduce human inspection needs. It reviews different data aggregation approaches that combine data to reduce redundancy and transmission costs. In particular, it examines the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, which forms clusters to perform in-network data processing and transmit aggregated data to sinks. Using this clustering approach can achieve high accuracy, reduce energy consumption, and prolong the lifetime of WSNs for railway track condition monitoring.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...IRJET Journal
This document proposes a delay-constrained network structure with in-network data fusion to reduce delays in data aggregation for wireless sensor networks. The proposed structure organizes sensor nodes into multiple single-layered clusters of different sizes to allow clusters to communicate with the fusion center interleavedly. Simulation results show the proposed structure can reduce delays and energy consumption compared to other structures when data is partially fusible. The structure selects cluster heads based on residual energy, degree, and distance to balance energy load.
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
This document proposes a chaotic encryption method combined with a clustered Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm to improve energy efficiency and security in wireless sensor networks. It discusses how LEACH clustering helps to reduce energy consumption through data aggregation at cluster heads. The proposed method uses chaotic maps for encryption to provide security. Simulation results show the combined approach increases network lifetime by reducing total energy consumption compared to traditional LEACH.
Data aggregation in wireless sensor network , 11751 d5811praveen369
The document discusses data aggregation in wireless sensor networks. It explains that sensor networks aim to gather and aggregate data in an energy efficient manner to extend network lifetime. It describes various data aggregation approaches like centralized, LEACH, and TAG. It also discusses cluster-based and tree-based aggregation where nodes aggregate and transmit data to parent nodes or cluster heads. The document outlines types of queries for sensor networks and benefits of data aggregation in reducing traffic and energy consumption while improving data accuracy.
ENERGY-EFFICIENT DATA COLLECTION IN CLUSTERED WIRELESS SENSOR NETWORKS EMPLOY...ijwmn
In this paper, a energy-efficient data collection method is proposed in which an integration between
Discrete Cosine Transform (DCT) matrix and clustering in wireless sensor networks (WSNs) is
exploited.Based on the fact that sensory data in WSNs is often highly correlated and is suitable to be
transformed in DCT domain, we propose that each cluster from the networks only sends a small number of
large DCT transformed coefficients to the base-station (BS) for data collection in two common ways, either
directly or in multi-hop routing. All sensory data from the sensor network can be recovered based on the
large coefficients received at the BS. We further analyze and formulate the communication cost as the
power consumption for transmitting data in such networks based on stochastic problems. Some common
clustering algorithms are applied and compared to verify the analysis and simulation results. Both noise
and noiseless environments for the proposed method are considered.
ENERGY-EFFICIENT DATA COLLECTION IN CLUSTERED WIRELESS SENSOR NETWORKS EMPLOY...ijwmn
In this paper, a energy-efficient data collection method is proposed in which an integration between
Discrete Cosine Transform (DCT) matrix and clustering in wireless sensor networks (WSNs) is
exploited.Based on the fact that sensory data in WSNs is often highly correlated and is suitable to be
transformed in DCT domain, we propose that each cluster from the networks only sends a small number of
large DCT transformed coefficients to the base-station (BS) for data collection in two common ways, either
directly or in multi-hop routing. All sensory data from the sensor network can be recovered based on the
large coefficients received at the BS. We further analyze and formulate the communication cost as the
power consumption for transmitting data in such networks based on stochastic problems. Some common
clustering algorithms are applied and compared to verify the analysis and simulation results. Both noise
and noiseless environments for the proposed method are considered.
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
This document presents a new energy efficient clustering algorithm for homogeneous wireless sensor networks based on the Expectation Maximization algorithm. The key points are:
1. The algorithm uses unequal clustering where clusters closer to the base station are smaller to balance the network load.
2. Cluster head selection is done using the Expectation Maximization algorithm, which is shown to improve results over LEACH, PEGASIS, and PLEACH protocols.
3. Simulation results in MATLAB demonstrate that the proposed algorithm significantly decreases the number of dead nodes and energy consumption per round compared to existing algorithms.
This document summarizes a research paper that proposes a Virtual Backbone Scheduling technique with clustering and fuzzy logic for faster data collection in wireless sensor networks. It introduces the concepts of virtual backbone scheduling, clustering, and fuzzy logic. It presents the system architecture that uses these techniques and includes three clusters with sensor nodes, cluster heads, and a common sink node. Algorithms for virtual backbone scheduling and fuzzy-based clustering are described. Implementation results show that the proposed approach improves network lifetime, reduces error rates, lowers communication costs, and decreases scheduling time compared to existing techniques like TDMA scheduling.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
Similar to Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Multi-Output (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 179 – 189
180
complex. Xu [15] proposed an optimized strategy of routing based on virtual MIMO for data
gathering without fusion. However, there were only two nodes participating in cooperative
transimission.
For CS-based data compression can be used to avoid data fusion for data gathering,
we do some resrearches combing CS and virtual MIMO organically. This paper proposes a
clustered energy-efficient data gathering method integrerting with CS and virtual MIMO for
wireless sensor networks (CS-vMIMO). We first construct a system model for data gathering
combing with CS and virtual MIMO. In this model, a sparse measurement matrix with LDPC-like
coding structure is used to simplify compression and reduce the data amount. Secondly, an
optimization model of minimal data gathering cost is proposed in sink to determine the number
of clusters, number of cooperative nodes and constellation size. To ensure the reconstruction
without distortion, the number of measurements and row weight are set to be constraints in the
optimization model. Our simulation results illustrate that the proposed CS-vMIMO scheme
effectively decreases the energy consumptions compared with the compressive data gathering
with single-antenna nodes and other non-compression schemes.
The rest of this paper is organized as follows. In Section 2, we describe the system
model and propose the energy optimization model. Section 3 presents the numerical results and
discussion. And conclusion is drawn in Section 4.
2. Detailed CS-vMIMO Scheme
2.1. System Model
We assume that N sensor nodes have been randomly deployed in monitored area. The
network is divided into cn non-overlapping clusters. Each node except sink is energy-limited and
equip with single antenna. And these nodes can share antennas of each other to generate a
virtual MIMO. The data compression adopts distributed compressive sensing, each node is
assigned a column vector of measurement matrix. The sink node has no energy constraints and
has powerful processing ability. The sink node is used to execute energy optimization, data
aggregation and reconstrucion. In order to describe conveniently, we define this scheme as CS-
vMIMO. The network model of CS-vMIMO is described in Figure 1.
Cluster head
Cooperative node
Sensor node
sink
Figure 1. The Network Model of Data Gathering with Virtual MIMO
The operation processes of CS-vMIMO scheme are described in follows:
Preliminary: Construct measurement matrix, select cluster heads, form clusters, select
appropriate cooperative nodes.
Data acquisition and measurement: Each node collects the real-time monitoring data,
and carries out encoding measurement simultaneously by preallocated a column vector of
measurement matrix.
Data trasmission: Each sensor nodes transfer its measured values to its respective
head node in term of time slot. Head nodes receive the data from member nodes and execute
3. TELKOMNIKA ISSN: 1693-6930
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input… (Fang Jiang)
181
an addition operation on data. Each cooperative node acquires data from respective head node
and transfer to sink.
Reconstruction: Sink node receives data from all cooperative nodes, decodes and
recovers the original data.
The CS-vMIMO data gathering scheme carries out by round periodically, each round
contains above four phases. Specific slot assignments are shown in Figure 2.
Head
nodes
Cluster
Cooperative
nodes
Round 2Round 1
...
Head node
transmission
vMIMO1
Inner-cluster
Communication
Cluster-Sink
Communication
Measurement
matrix
Node1 Node2 Node nm vMIMO2 ...
vMIMO
nc
Preliminary
Data acquisition
and measurement
Data
transmission
Reconstruction Preliminary
Data acquisition
and measurement
...
Figure 2. Slot Assignment of CS-vMIMO Data Gathering Scheme
In preliminary pahse, the construction of measurement matrix must be guaranteed
against accurate recovery in sink node. We will give a detailed explanation in Section 2.1. In this
paper, the selection of cluster head and cluster formation are determined by traditional LEACH
protocol. Each cluster head decides cooperative nodes in internal cluster according to every
member node’s residual energy.To minimize the energy consumption, number of head nodes
and cooperative nodes are determined by a proposed energy cost model in the sink node. The
analysis and optimization for system energy consumptiom will be described in more detail in the
subsequent sections.
In data acquisition and measurement phase, all nodes acquire and measurement data
in parallel. Measured values are temporarily saved to sensor memory.
In data transmission phase, the communications between sensor nodes and their head
nodes, head nodes and their cooperative nodes within a cluster are defined as a inner-cluster
communication. And the communication between cooperative nodes and sink node is defined
as cluster-sink communicaiton. Inner-cluster communication and cluster-sink communication
have different energy formulas because of fading and different distance.
In reconstrction phase, the recovery algorithm is crucial, it should be designed
according to the measurement matrix.
2.2. Data Acquisiton and Measurement Matrices
Sensor nodes collect the monitoring datas and multiply their datas to measurement
vectors. From the point of improving energy efficiency of data gathering, sparse measurement
matrices have been applied in an attempt to the field of data gathering to decrease cost [16].
And LDPC-like measurement matrix has a sparse coding construction and has been
suceessfully used in CS [17], number of nonzero elements is fewer and nonzero elements are
equiprobably equal to 1 or -1. So we introduce LDPC-like measurement matrix in data
gathering.
The sensory datas of N nodes in monitoring area can be considered as an N-
dimensional vector 1 2, , , NX t x t x t x t at the
th
t data gathering round. jx t is
the acquired data value of the
th
j sensor node at the
th
t round. Measurement matrix is an
M N sparse random matrix with LDPC-like coding structure. Each node saves a column
4. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 179 – 189
182
vevtor of measurenment matrix. In the
th
t data gathering round, the meaured value of the
th
j
sensor node is:
1 21,2 , , , ,
T
M j i j j j j j j Mj jy t x t i M x t x t x t (1)
Head nodes add the measured values of its member nodes together. In the
th
t round,
measured data gathered by the
th
m head node is:
1 1 1 1
1 2= , , ,
m m m m
T
i n i n i n i n
m M j j j j j Mj j
j i j i j i j i
y t y t x t x t x t
(2)
Where mn is number of nodes in the
th
m cluster. my t is an M-dimension column
vectors.
Sink node adds the measured values of different clusters together. In the
th
t round,
measured data gathered by the sink node is:
1
cn
m
m
Y t y t
1 2
1 1
, , , =
T
N N N
j j j j Mj j
j j i j
x t x t x t X t
(3)
Any
th
i row vector of measurement matrix is random vector with weight of r , 1 and -1
appear alternately. The column weight of measurement matrix is defined as l .
We will do energy consumption analysis in the nexit section based on above system
model and measurement matrix. Because sink node has no energy constrant, energy
consumption of sink node is without considering. There is no complex signal processing in front-
end nodes, and comparing with transmission cost , the energy of signal processing is ignored in
next analysis. The energy of CS-vMIMO data gathering system is divided into two parts: the
energy of the inner-cluster communication inner clusterE and the cluster-sink communication
sinto kE . Each part is consists of two main components. One is consumption for all power
amplifiers
PA
E , the other is consumption for all circuit blocks
C
E . We have the following
energy expression:
sink sink sink
PA C
inner cluster inner cluster inner cluster
PA C
to to to
E E E
E E E
(4)
2.3. Energy Consumption of the Inner-cluster Communication
The energy consumptionof different circuit components has been given by Cui, et al.,
[18, 19]. The power consumption of transmitter is expressed as:
TC
DAC mix filter sysP P P P P (5)
The power consumption of receiver is expressed as:
RC
LNA mix IFA filter sys ADCP P P P P P P (6)
Where DACP , mixP , filterP , sysP , LNAP , IFAP and ADCP are the energy consumption for the
digital-to-analog converter, the mixer, filter circuits, the frequency synthesizer, the low noise
amplifier, the intermediate frequency amplifier and the analog-to-digital converter respectively.
5. TELKOMNIKA ISSN: 1693-6930
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input… (Fang Jiang)
183
In inner-cluster communication, the wireless signal is assumed to experience a square-
law path loss, the transmission power is expressed as follow [18]:
2
2
2
4
2 1+ ln in lTPA
f b
t r
d M
P N B P
GG
(7)
Where = -1
, is the Peak-to-Average Ratio (PAR) , is the drain efficiency of the
RFpower amplifier, B is the bandwidth of modulation system,
2
is noisy power spectral
density, bP is average bit error rate, ind is the transmission distance , tG and rG are the gains
of transmitter and receiver antenna respectively, is the carrier wavelength, fN is noise
coefficients of receiver, lM is is the link margin compensating.
The energy consumption at the
th
t data gathering round is the product of the power
consumption and the average time. We denote every sensor node collects jL bit data at the
th
t
round, is compression ratio, =
M
N
, is the sparse rate of measurement matrix ,
= =
r l
N M
. Based on LDPC-like measurement, each sensor node generates N nonzero
elements in every measured vector y t . At the
th
t round , supporting the packet length of
sensory data in the the
th
j sensor node is jL bits. The time required for transmitting by the
th
j
sensor node is:
=s
j j
N
T L
B b
(8)
Where b is the constellation size.
Because of using CS, each cluster head does not need data fusion and needs to send
NL bits . The time required by the cluster head is:
=h N
T L
B b
(9)
Where =max , 1,2, ,j mL L j n . For the
th
m cluster, the total energy
consumption at the
th
t round for a fixed-rate is:
,
1
=
mn
TPA TC RC s TPA TC RC h
inner cluster m j T
j
E P P P T P P M P T
(10)
The first part of above fomula defines the energy consumption of communication from
snsor nodes to head node within a cluster, the latter part of fomula (10) defines the energy
consumption of communication from head node to cooperative nodes within a cluster. TM is
number of transmitters in vMIMO sysytem.
The transmission in iner-cluster is implemented with binary phase shift keying (BPSK),
1b . The time parameters are brought into the energy consumption formula (10), the total
energy consumption at the
th
t round for a fixed-rate can be rewritten:
6. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 179 – 189
184
,
1 1
= + +
m mn n
TPA TC RC
inner cluster m j j T
j j
N
E P P L L P L M L
B
(11)
2.4. Energy Consumption of the Cluster-Sink Communication
Because the communication from cooperarive nodes to sink node is a long distrance
transmission, the channel is -order Rayleigh Flat-fading and multilevel quadrature amplitude
modulation (MQAM) is adopted. In a long ditance transmission, the transmission power of
cooperative nodes is:
2
sin-sin
2
4
1 to kTPA k
b l f
t r
d
P E Bb M N
GG
(12)
Where bE the total energy consumption per bit, sinto kd is the ditance from cooperative
node to sink node:
1
01
+1
2 2 1
3 4
T R
T R
bM M
b
b T
M M
P
E M N
b
(13)
Where 0N is the single-sided noise power spectral density, RM is number of
transmitters in vMIMO sysytem.
At the
th
t round , the time required by the
th
i vMIMO array is:
sinto k N
T L
RBb
(14)
Where R is a correction factor for cooperative transmission. The power consumption of
transmitter is same to Section 2.3. For the
th
m cluster, the total energy consumption at the
th
t
round in the cluster-sink communication is:
-sin sin
sink,m
1
2
sin
01 2
+1
=
42 2 1
1
3 4
T R
T R
TPA k TC to k
to T
bM M
to k TCb
T l f T
t rM M
E P M P T
dP N
M N Bb M N M P L
GG RBb
b
(15)
2.5. Joint Optimization Model of the Total Cost
According to the results of above analysis, the total energy consumption of CS-vMIMO
data gathering systmen at the
th
t round is:
, sink,
1
cn
total inner cluster m to m
m
E E E
(16)
Synthesizing the formula (11), (15) and (16), the compression ratio , the sparse rate
of measurement matrix ,the constellation size b ,the number of coopertive nodes TM and
clusters cn are variables of energy consumption formula (16). The energy consumption
formula (16) is taken as the objective cost function, optimizes these parameters jointly.
7. TELKOMNIKA ISSN: 1693-6930
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input… (Fang Jiang)
185
.
.
, , argminc T
const
const
n M b totalE
(17)
Where the values of and should be set to satisfy the quality of CS
reconstructed.
.
Base on [17], can be reduced if the number of measurements is increased
accordingly. The optimization problem of formula (17) can be solved by integer programming.
In practice, the parameters , ,c Tn M b are calculated in advance, then the data gathering work
is carried out periodically. When channel fading characteristics are unchanged, above jiont
optimization is not need at each round.
3. Numerical Results and Analysis
This section presents the numerical results to demonstrate the energy efficiency of the
proposed CS-vMIMO scheme. We support there are 500 nodes ( 500N ) uniformly
distributed in 100 100m m monitor area. The data collected by sensor nodes is K-sparse
signal or has a sparse representation under a base. K is difined as a sparsity, 0
K X t .
This section shows the following numerical results: the sensory data recovery quality under
different number of measurements and the energy consumption of the CS-vMIMO data
gathering scheme.
3.1. Recovery Quality Under Different Measurement Numbers
The number of measurements is a major factor for recovery quality in CS. And
according to energy analysis in Section 2, it also influences energy consumption of data
gathering. We now evaluate the recovery quality of LDPC-like compression model under
different measurements and row weithts. We define the reconstruction error as a normalized
error
2 2
ˆ /X X X . The data collected by sensor nodes is 25-sparse signals, we compare
the recovery quality with 0.064 and 0.032 under different measurement numbers.
The reconstrution algorithm adopts the algorithm in [20].
Figure 3. The Reconstruction Error under Different Measurements
Figure 3 shows that two curves have similar properties when the number of
measurements is sufficient. When the nunmber of measurements is less, the value of can
impact the reconstruction error. The target error is set to be 0.1 to ensure quality of recovery, we
60 80 100 120 140 160 180 200 220 240 260
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
Number of Measurements
ReconstructionError
=0.064
=0.032
8. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 179 – 189
186
can get the combination of different and ( /M N ). The number of measurements
required to reach the target error: 77M and 93M corresponding to 0.064 and
0.032 respectively. The following energy optimization also should be carried out under the
constrants of , .
3.2. Energy Consumption Evaluation and Analysis
In this section, we evaluate the energy-efficient performance of our CS-vMIMO scheme.
The values of different parameters, shown in Table 1, are adopted from [18].
Table 1. Values of Simulation Parameters[18]
15DAC ADCP P mW 30.3mixP mW 2.5filterP mW
50synP mW 20LNAP mW 30IFAP mW
10fN dB 2
174 /dBm Hz 40lM dB
5t iGG dBi 0.12m
3
10bP
3 2 1 2 1b b
0.35 10B kHz
To better illustrate the influences of cooperative node numbers, constellation size and
number of clusters, the simulations are executed using above three variables respectively.
Figure 4 shows the curves of transmission dsitance and the energy consumption, with
number of cooperive nodes are 2,4 ,8 and single-input single-output (SISO), non-cooperative
transmission. We set 0.064 , 0.16 , the fading factor from cooperative nodes to
sink is 2.5, the modulation is QAM, the constellation size 5b . From the Figure 4, we can
see that an energy-efficient number of cooperative nodes is exist according to a certain
transmission distance and the parameter TM could influence the total energy.
Figure 4. The Energy Consumption under
Different Distances
Figure 5. The Energy Consumption under
Different Constellation Sizes
Figure 5 shows the curves of constellation size and the energy consumption. The
transmission distance is fixed to 30 meters. We can see from Figure 5, there is an optimum
constellation size b for every number of cooperative node. Except the constellation size, other
parameters is same to Figure 4. Figure 6 shows the curves of cluster number and the energy
consumption, with number of cooperative nodes are 2,4 and 8. The clustering protocol is
0 10 20 30 40 50 60 70 80 90 100
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
x 10
-3
Transmission Distance( m)
EnergyConsumption(J)
SISO
2x1 FixedRate
4x1 FixedRate
8x1 FixedRate
1 2 3 4 5 6 7 8 9 10
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
x 10
-3
Constellation Size
EnergyConsumption(J)
SISO
MIMO 2x1
MIMO 4x1
MIMO 8x1
9. TELKOMNIKA ISSN: 1693-6930
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input… (Fang Jiang)
187
adopted traditional LEACH. The constellation size is fixed, and the sink node lies in the
coordinate of 100,175 . From Figure 6, the number of clusters also has an effect on the
energy consumption.
Figure 6. The Energy Consumption under Different Clusters
(a) 0.064 ,
0.16 (b) 0.032 ,
0.19
Figure 7. Comparisons of Node Survival Time
As described, The number of cooperarive nodes TM , the constellation size b and
the number of clusters cn can influence the energy consumption repectively. Next we will show
the results of joint optimization. In order to demonstrate the performance of the proposed CS-
vMIMO scheme in energy efficiecy, we compare this scheme to several other kinds of data
gathering schemes. The simulation results are shown in Figure 7. CS-vMIMO is the proposed
data gathering scheme in this paper, CS-SISO is the compressive data gathering scheme with
LDPC-like matrix and SISO transmission, BDM-SISO is the compressive data gathering scheme
with BDM measurement matrix proposed in [9], and Un-CS SISO is the data gathering with non-
compression and SISO transmission. The sink node lies in (100,175) outside the monitor
area. We simulate the lifetime of nodes. The number of clusters, cooperative nodes and
constellation size are joint optimized under the constrants of and in the CS-vMIMO
scheme. In Figure 7(a) and Figure 7(b), 0.064 , 0.16 and 0.032 , 0.19
respectively. From Figure 7, comparing to other CS-based data gathering scheme, the CS-
1 2 3 4 5 6 7 8 9 10
0.09
0.1
0.11
0.12
0.13
0.14
0.15
0.16
0.17
Number of Cluster
EnergyConsumption(J)
2x1 MIMO
4x1 MIMO
8x1 MIMO
0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000
0
50
100
150
200
250
300
350
400
450
500
Time( round)
Number0fSurvivedNodes
CS-vMIMO
CS-SISO
Un-CS SISO
BDM-SISO
0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000
0
50
100
150
200
250
300
350
400
450
500
Time( round)
Number0fSurvivedNodes
CS-vMIMO
CS-SISO
Un-CS SISO
BDM-SISO
10. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 179 – 189
188
vMIMO scheme postpones the emergency of the first dead node, enhances the network energy
balance and prolongs the lifetime of neworks. We have noticed that, for different values of
, , the jiont optimization results is also different and the CS-vMIMO scheme with
0.032 , 0.19 prolongs the life cycle of networks about 300 rounds comparing to the
scheme with
0.064 ,
0.16 . This is because in Figure 7(b), the selection of the
, is better than it in Figure 7(a), less measurement of sensor nodes is still able to ensure
the quality of reconstruction. So the parameters of measurement matrix will affect the energy
consumption of data gathering.
4. Conclusion
CS and virtual MIMO both are efficient ways to decrease the energy consumption of
data gathering. We propose and analyse an energy-efficient data gathering scheme by
intergating LDPC-like compressive sensing and virtual MIMO. We construct the CS-vMIMO data
gathering system, discuss the measurement matrix , analyse the energy consumption of CS-
vMIMO, and present the joint energy consumption optimization model. Our simulations have
shown that the CS-vMIMO has high energy-efficiency. But in this paper, we only consider the
single-hop routing. Next, we will further optimize the energy consumption by combinating muti-
hop routing protocol.
Acknowledgements
This work is partially supported by the 211 Project of Anhui University.
References
[1] IF Akyildiz, W Su, Y Sankarasubramaniam, E Cayirci. Wireless Sensor Networks: A Survey. Computer
Networks. 2002; 38(4): 393-422.
[2] Achmad Widodo, Latief Rozaqi, Ismoyo Haryanto, Djoeli Satrijo. Development of Wireless Smart
Sensor for Structure and Machine Monitoring. TELKOMNIKA Telecommunication, Computing,
Electronics and Control. 2013; 11(2): 417-424.
[3] Luo C, Wu F, Sun J, et al. Efficient Measurement Generation and Pervasive Sparsity for Compressive
Data Gathering. IEEE Transactions on Wireless Communications. 2010; 9(12): 3728-3738.
[4] Lei You, Yutong Han, Sumei Li, Xin Su. Soure and Transmission Control for Wireless Visual Sensor
Networks with Compressive Sensing and Energy Harvesting. TELKOMNIKA Indonesian Journal of
Electrical Engineering. 2013; 11(5): 2468-2474.
[5] Lei Quan, Song Xiao, Xiao Xue, Cunbo Lu. Neighbor-Aided Spatial-Temporal Compressive Data
Gathering in Wireless Sensor Networks. IEEE Communications Letters. 2016; 20(3): 578-581.
[6] H Zheng, F Yang, X Tian, X Gan, X Wang, S Xiao. Data Gathering with Compressive Sensing in
Wireless Sensor Networks: A Random Walk Based Approach. IEEE Transactions on Parallel and
Distributed Systems. 2015; 26(1): 35-44.
[7] Nguyen MT, Teague KA. Compressive Sensing Based Energy-efficient Random Routing in Wireless
Sensor Networks. International Conference on Advanced Technologies for Communications. Hanoi,
Vietnam. 2014: 187-192.
[8] Nguyen MT, Teague KA. Compressive Sensing Based Data Gathering in Clustered Wireless Sensor
Networks. IEEE International Conference on Distributed Computing in Sensor Systems. Marina Del
Ray, California, USA. 2014: 187-192.
[9] Nguyen MT, Rahnavard N. Cluster-Based Energy-Efficient Data Collection in Wireless Sensor
Networks Utilizing Compressive Sensing. Military Communications Conference, Milcom 2013. San
Diego, USA. 2013: 1708-1713.
[10] Quer G, Masiero R, Munaretto D, et al. On the Interplay Between Routing and Signal Representation
for Compressive Sensing in Wireless Sensor Networks. Information Theory and Applications
Workshop. La Jolla, California. 2009: 1-17.
[11] Wang J, Tang S, Yin B, et al. Data Gathering in Wireless Sensor Networks Through Intelligent
Compressive Sensing. Proceedings - IEEE INFOCOM. Orlando. 2012; 131(5): 603-611.
[12] Siam MZ, Krunz M, Younis O. Energy-Efficient Clustering/Routing for Cooperative MIMO Operation in
Sensor Networks. Rio de Janeiro Brazil. 2009: 621-629.
11. TELKOMNIKA ISSN: 1693-6930
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input… (Fang Jiang)
189
[13] Gai Y, Zhang L, Shan X. Energy Efficiency of Cooperative MIMO with Data Aggregation in Wireless
Sensor Networks. Wireless Communications and Networking Conference, 2007. Hong Kong. 2007:
791-796.
[14] Zuo Y, Gao Q, Fei L. Energy Optimization of Wireless Sensor Networks Through Cooperative MIMO
with Data Aggregation. IEEE, International Symposium on Personal, Indoor and Mobile Radio
Communications, Istanbul, Turkey. 2010:1602-1607.
[15] Xu H, Huang L, Qiao C, et al. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks.
IEEE Transactions on Parallel & Distributed Systems. 2015; 26(4): 1034-1048.
[16] Abrardo A, Carretti CM, Mecocci A. A Compressive Sampling data gathering approach for Wireless
Sensor Networks Using A Sparse Acquisition Matrix with Abnormal Values. International Symposium
on Communications Control and Signal Processing. Roma, Italy. 2012: 1-4.
[17] Baron D, Sarvotham S, Baraniuk RG. Bayesian Compressive Sensing Via Belief Propagation. IEEE
Transactions on Signal Processing. 2009; 58(1): 269-280.
[18] Cui S, Goldsmith AJ, Bahai A. Energy-efficiency of MIMO and Cooperative MIMO Techniques in
Sensor Networks. IEEE Journal on Selected Areas in Communications. 2004; 22(6): 1089-1098.
[19] Cui S, Goldsmith AJ, Bahai A. Energy-constrained Modulation Optimization. IEEE Transactions on
Wireless Communications. 2005; 4(5): 2349-2360.
[20] Jiang F, Hu Y, She C. A Universal Sparse Signal Reconstruction Algorithm via Backtracking and
Belief Propagation. International Symposium on Computational Intelligence & Design. Hangzhou.
2015.