SlideShare a Scribd company logo
International 
OPEN ACCESS Journal 
Of Modern Engineering Research (IJMER) 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 41| 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks Shaik Shabeena1, K Suresh Babu2 1 M. Tech (CSE), Vasireddy Venkatadri Institute of Technology, Guntur, A.P., India. 2Assoc. Professor, Dept. of Computer Science & Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, A.P., India 
I. INTRODUCTION 
A wireless Sensor Network (WSN) consists of number of nodes that is used in different applications such as military, health care, commerce, etc. Usually a sensor node is used for sensing precision to monitor environmental conditions. This will be varies in sensing precision. Every sensor node will be varying in the sensing quality. So, whatever the values i.e. raw sensor readings that are collected from sensor is of data uncertainty and energy consumption. In order to remove the data uncertainty many approaches has been used, but that gives inefficient results. A data uncertainty is removed by placing more sensor nodes and as well as by calculating the probability i.e. aggregate probability. In many application domains, top-k query is a fundamental query to search for the most important objects according to the object ranking. Being different from those studies of top- k query in the centralized databases, in this paper we focus on the top-k query optimization in resource-constrained wireless sensor networks (WSNs). Technological advances have enabled the deployment of the large-scale sensor networks consisting of thousands of inexpensive sensor nodes in an ad-hoc fashion for a variety of environmental monitoring and surveillance purposes. During this course, a large volume of sensed data are needed to be aggregated within the sensor network to respond to user queries. The WSN thus is treated as a virtual database by the database community [1]. However, query processing in sensor networks is essentially different from it in traditional databases due to the unique characteristics imposed on sensors, e.g., slow processing capability, limited storage, and energy-limited batteries, etc. [2], which can be seen from several aspects. Firstly, to prolong network lifetime, the energy consumption is an optimization objective in sensor networks, because the battery-powered sensor nodes will quickly become inoperative due to the large quantity of energy consumption, and the network lifetime is closely tied to the energy consumption rate of the sensors. Secondly, a WSN that senses the data periodically can be viewed as a distributed stream system [3]. However, this special distributed stream system is different from the general distributed stream system because it is more expensive to obtain the sensed information from the sensors far away from the base station than those nearby. Finally, for query processing in sensor networks, minimizing not only the total energy consumption but also the maximum energy consumption among the sensors is the optimization objective. Hence, how to evaluate queries effectively and efficiently in sensor networks poses great challenges. 
Abstract: Wireless Sensor Networks (WSNs) are usually defined as large-scale, ad-hoc, multi-hop and wireless unpartitioned networks of homogeneous, small, static nodes deployed in an area of interest. Applications of sensor networks include monitoring volcano activity, building structures or natural habitat monitoring. In this paper, we present the problem of processing probabilistic top-k queries in a distributed wireless sensor networks. The basic problem in top-k query processing is that, a single method cannot be used as a solution to the problem of top-k query processing because there are many types of top-k query processing. The method has to be based on the situation, the classification and the type of database and the query model. Here we develop three algorithms, namely, sufficient set-based (SSB), necessary set-based (NSB), and boundary-based (BB), for inter- cluster query processing with bounded rounds of communications. Moreover, in responding to dynamic changes of data distribution in the overall network, we develop an adaptive algorithm that dynamically switches among the three proposed algorithms to minimize the transmission cost. 
Keywords: BB, NSB, SSB, Top- k query, WSN.
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 42| 
II. RELATED WORK 
In recent years, many works have been done. Here we review representative work in the areas of 1) top-k Query processing in WSNs, and 2) top-k query processing on the uncertain data. An extensive number of research works in this area has appeared in the literature [4], [5], [6]. Due to the limited energy budget available at sensors, the primary issue is how to develop energy-efficient methods to reduce communication and energy costs in the networks. TAG [4] is one of the first studies in this research area. By exploring the semantics of aggregate operators (e.g., sum, avg, and top-k), in-network processing approach is adopted to suppress the redundant data transmissions in wireless sensor networks. Moreover, continuous top-k queries for sensor networks have been studied in [7] and [8]. In addition, a distributed threshold join algorithm has been developed for the top- k queries [5]. These studies, considering no uncertain data, have a different focus from our present study. For uncertain databases, two interesting top-k definitions (i.e., U-Topk and U-kRanks) and like methods are proposed [9]. U-Topk returns a list of k- tuples that has the highest probability to be in the top-k list over all possible worlds. U-k- Ranks returns a list of k tuples such that the ith record has the highest probability to be the ith best record in all possible worlds. In [10], PT-Topk query, which returns the set of the tuples with a probability of at least p to be in the top-k lists in the possible worlds, is studied. Inspired by the concept of dominate set in the top-k query, a method which avoids unfolding all possible worlds is given. Besides, a sampling method is developed to quickly compute an approximation with quality guarantee to the answer set by drawing a small sample of the uncertain data. In [11], the expected rank of each tuple across all possible worlds serves as the ranking function for finding the final result. In [12], U-Topk and U-kRank queries are improved by exploiting their stop conditions. In [13], all existing top-k semantics have been unified by using some generating functions. Recently, a study on processing top-k queries over a distributed uncertain database is reported in [14]. 
III. PROPOSED WORK 
1. Sufficient and Necessary sets In this section We introduce the notion of sufficient set and necessary set for distributed processing of probabilistic top-k queries in cluster-based wireless sensor networks. These two concepts have very nice properties and can facilitate localized data pruning in clusters. Given an uncertain data set Ti in the cluster Ci, if there exists a tuple tsb€Ti (called sufficient boundary) such that the tuples ranked lower than tsb are useless for the query processing at the base station, then the sufficient set of Ti, denoted as S(T), is a subset of Ti as specified below: S(Ti)={t|t=ftsbort<ftsb} where f is a given scoring function for ranking. Note that a sufficient boundary may not exist for a given data set. Given a local data set Ti in the cluster Ci, assume that Ai is the set of locally known candidate tuples for the final answer and tnb (called necessary boundary) is the lowest ranked tuple in Ai. The necessary set of Ti, denoted as N(Ti), is N(Ti)= {t|t€ Ti, t <f <tnb} Using the notion of sufficient and necessary sets as a basis, we propose 3 distributed algorithms for processing probabilistic top-k queries in wireless sensor networks, namely 1) Sufficient Set-based method; 2) Necessary Set-based method; and 3) Boundary-based method. 2. Sufficient Set-Based (SSB) Algorithm After collecting data tuples from its cluster, ci computes the S(Ti) from the locally collected tuples and sends it to the base station. If a sufficient set cannot be obtained, then all the tuples are transmitted to the base station. After receiving the transmitted data tuples from all the cluster heads, they compute final answer. Algorithm 1: SSB ALGORITHM AT CLUSTER HEAD (ci): 
1. if SB(Ti) exits
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 43| 
S(Ti) ← {x|x ≤ f SB(Ti) Λ x Є Ti } Yi ← S(Ti) Else Yi ← Ti 
2. Now, Yi is delivered to the base station. 
AT BASESTATION: 1. It receive the tuples Yi from the cluster head.(1 ≤ i ≤ N) 2.T′ ← U1≤ i≤N Yi Where, x is the tuples ci is the cluster head S(Ti) is the sufficient set Ti is the records collected from the sensor N is the number of clusters in the zone Ci is the cluster Yi is the sufficient boundary for SSB. Tʹ is the aggregation of data sets received from the clusters 3. Necessary Set-Based (NSB) Algorithm After receiving all the necessary sets, the received tuples are merged into a table in a base station and finds the necessary boundary called the global boundary (GB)). If GB is ranked higher than the highest ranked necessary boundary, all the necessary data have delivered to the base station. Otherwise, it entering the second phase, it sends the GB back to the ci, which return the supplementary data tuples ranked between its local necessary boundary and GB. Then, the base station computes the final answer. Algorithm 2: NSB ALGORITHM AT CLUSTER HEAD: 1.Compute the necessary boundary NB(Ti), N(Ti) ← {x|x ≤ f NB(Ti) Λ x Є Ti } 2. Deliver N(Ti) to the base station 3.if cluster head receive GB from the base station then N′(Ti) ←{ x|x ≤f GB Λ x Є [Ti - N(Ti)]} Now, N′(Ti) is send to the base station. end if AT BASESTATION: 1. It receives the tuples N (Ti) from the cluster head. (1 ≤ i ≤ N) T′ ← U1 ≤ i ≤ N N(Ti) 2. Now, it will calculate the global boundary. 3. if global boundary GB is less than that of NB(Ti), then It calculate the final necessary boundary else It will broadcast GB to ci and once again it collects necessary tuples T′ ← U1≤ i ≤ N N′(Ti) end if Where, x is the tuples ci is the cluster head N(Ti) is the necessary set NB(Ti) is the necessary boundary Ti is the records collected from the sensor N is the number of clusters in the zone T′ is the aggregation of data sets received from the clusters 4. Boundary-Based (BB) Algorithm The boundary-based method first delivers the local knowledge in clusters, in the form of NB and SB, to the base station in order to provide a refined global data pruning among clusters. It is done instead of directly delivering data tuples to the base station.
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 44| 
Algorithm 3: BB Algorithm AT CLUSTER HEAD: 1. Calculate the Necessary Boundary (NB) and Sufficient Boundary (SB) and send it to the base station. 2. Base station receive Global Boundary (GB) 3. Yi ← { x|x ≤f GB x Є [Ti - N(Ti)]} 4. Now, Yi is delivered to the base station. AT BASESTATION: 1. It will receive the NB and SB from cluster heads (ci), 2. Now, base station computes the (Sufficient Boundaryhigh and Necessary Boundarylow ). 3. if SBhigh < NBlow , then SBhigh →GB else NBlow → GB end if 4.Now, broadcast the global boundary to each Ci T ′ ← U1≤ i ≤ N Y(Ti) Where, x is the tuple ci is the cluster head S(Ti) is the sufficient set N(Ti) is the necessary set Ti is the records collected from the sensor N is the number of clusters in the zone Yi is the sufficient boundary for SSB T′ is the aggregation of data sets received from the clusters 5. Cost Analysis We perform a cost analysis on data transmission of the three proposed methods by using adaptive algorithm. Adaptive Algorithm: The performance of the data transmission using proposed method is affected by factors such as the skewness of data distribution among clusters which may change continuously over time. A cost-based adaptive algorithm that is used dynamically Sufficient Set Based, Necessary Set Based, and Boundary Based as the data distribution within the network changes. Algorithm 4: Adaptive Algorithm Count=0 ; ZSSB , ZNSB , ZBB =0 Where R is varied window size. Then estimate the cost of CSSB, CNSB, CBB ZSSB ← ZSSB + CSSB ZNSB ← ZNSB + CNSB ZBB ← ZBB + CBB if count ≥ R then if ZSSB = min{ ZSSB , ZNSB , ZBB} then switch to SSB end if if ZNSB = min{ ZSSB , ZNSB , ZBB} then switch to NSB end if if ZBB = min{ ZSSB , ZNSB , ZBB} then switch to SSB end if end if 
IV. CONCLUSION 
Motivated by many applications, top-k query is a fundamental operation in the modern database systems. Technological advances have enabled the deployment of several large-scale sensor networks for environmental monitoring and surveillance purposes, efficient processing of top-k query in such networks poses great challenges due to the unique characteristics of sensor nodes and a vast amount of data generated by sensor networks. This work supports in-network top-k query process over uncertain data in the distributed wireless sensor network. We develop the notion of the sufficient set and necessary set for efficient in-network
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 45| 
pruning of uncertain data in a distributed setting. This notion, along with its nice properties, provides a theoretical basis for the distributed query processing methods. Based on the notion of sufficient sets and necessary sets, we propose a suite of algorithms for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. These methods exploit individual and combined strengths of sufficient and necessary sets in query processing. We propose a cost-based adaptive algorithm that dynamically switches among the three proposed algorithms based on their estimated costs. 
REFERENCES 
[1] S. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong. TAG: a tiny aggregation service for ad hoc sensor networks. ACM SIGOPS Operating Systems Review, Vol.36, pp.131–146, 2002. [2] G. J. Pottie, W. J. Kaiser Wireless Integrated Network Sensors. Communication of ACM, Vol.43 No.5, pp.51–58, 2000. [3] B. Babcock and C. Olston. Distributed top-k monitoring. Proc. of ACM SIGMOD, ACM, pp.28–39, 2003. [4] P. Cao and Z. Wang, “Efficient Top-k Query Calculation in Distributed Networks,” Proc. 23rd Ann. ACM Symp.Principles of Distributed Computing (PODC), pp. 206-215, 2004. [5] M. Ye, X. Liu, W.-C. Lee, and D.L. Lee, “Probabilistic Top-k Query Processing in Distributed Sensor Networks,” Proc. IEEE Int’l Conf. Data Eng. (ICDE ’10), 2010. [6] D. Zeinalipour-Yazti, Z. Vagena, D. Gunopulos, V. Kalogeraki, V.Tsotras, M. Vlachos, N. Koudas, and D. Srivastava, “The Threshold Join Algorithm for Top-k Queries in Distributed Sensor Networks,” Proc. Second Int’l Workshop Data Management for SensorNetworks (DMSN ’05), pp. 61-66, 2005 [7] Q. Han, S. Mehrotra, and N. Venkatasubramanian, “Energy Efficient Data Collection in Distributed Sensor Environments,” Proc. 24th Int’lConf.Distributed Computing Systems (ICDCS’04), pp. 590-597, 2004. [8] M.Wu, J.Xu, X. Tang, and W.-C. Lee, “Top-k Monitoring in Wireless Sensor Networks,” IEEE Trans. Knowledge and Data Eng., vol. 19, no. 7, pp. 962-976, July 2007. [9] M.A. Soliman, I.F. Ilyas, and K.C. Chang, “Top-k Query Processing in Uncertain Databases,” Proc. Int’l Conf. [10] M. Hua, J. Pei, W. Zhang, and X. Lin, “Ranking Queries on Uncertain Data: A Probabilistic Threshold Approach,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’08), 2008. [11] C. Jin, K. Yi, L. Chen, J.X. Yu, and X. Lin, “Sliding-Window Top-k Queries on Uncertain Streams,” Proc. Int’l Conf. Very Large Data Bases (VLDB ’08), 2008. [12] D. Wang, J. Xu, J. Liu, and F. Wang, “Mobile Filtering for Error-Bounded Data Collection in Sensor Networks,” Proc. 28th Int’l Conf. Distributed Computing Systems (ICDCS ’08), pp. 530-537, 2008. [13] K. Yi, F. Li, G. Kollios, and D. Srivastava, “Efficient Processing of Top-k Queries in Uncertain Databases with X- Relations,” IEEE pp. 1669 1682, Dec.2008. [14] F. Li, K. Yi, and J. Jestes, “Ranking Distributed Probabilistic Data,” Proc. 35th SIGMOD Int’l Conf. Management of Data (SIGMOD ’09), 2009.

More Related Content

What's hot

Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
IJMER
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
TELKOMNIKA JOURNAL
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor Network
IOSR Journals
 
Compressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor NetworkCompressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor Network
IRJET Journal
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
IJCNCJournal
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
International Journal of Technical Research & Application
 
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
ijeei-iaes
 
Energy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNEnergy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSN
IJCSEA Journal
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
ijsrd.com
 
Ijsrp p8593
Ijsrp p8593Ijsrp p8593
Ijsrp p8593
kalyanimate
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
sarathanjabam
 
G1802044855
G1802044855G1802044855
G1802044855
IOSR Journals
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
Alexander Decker
 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
csandit
 

What's hot (20)

Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor Network
 
Compressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor NetworkCompressive Data Gathering using NACS in Wireless Sensor Network
Compressive Data Gathering using NACS in Wireless Sensor Network
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
 
Energy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNEnergy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSN
 
E035425030
E035425030E035425030
E035425030
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
Ijsrp p8593
Ijsrp p8593Ijsrp p8593
Ijsrp p8593
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
 
G1802044855
G1802044855G1802044855
G1802044855
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
 

Viewers also liked

A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document ClusteringA Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
IJMER
 
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix CompositesEvaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
IJMER
 
The creative arts –
The creative arts –The creative arts –
The creative arts –
Ylenia Vella
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
IJMER
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals Jasimuddin Rony
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Dt3211801185
Dt3211801185Dt3211801185
Dt3211801185IJMER
 
Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
Rancyna James
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040IJMER
 
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
IJMER
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
IJMER
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070IJMER
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιού
Popi Kaza
 
Eleni
EleniEleni
Eleni
Popi Kaza
 
Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16
IJMER
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
IJMER
 
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge  Text CorpusA Novel Data mining Technique to Discover Patterns from Huge  Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
IJMER
 

Viewers also liked (20)

A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document ClusteringA Novel Multi- Viewpoint based Similarity Measure for Document Clustering
A Novel Multi- Viewpoint based Similarity Measure for Document Clustering
 
Dodo abashidze
Dodo abashidzeDodo abashidze
Dodo abashidze
 
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix CompositesEvaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
 
The creative arts –
The creative arts –The creative arts –
The creative arts –
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
 
Nhom1
Nhom1Nhom1
Nhom1
 
Sience academy
Sience academySience academy
Sience academy
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Dt3211801185
Dt3211801185Dt3211801185
Dt3211801185
 
Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040
 
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιού
 
Eleni
EleniEleni
Eleni
 
Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16Design and Implementation of HDLC Controller by Using Crc-16
Design and Implementation of HDLC Controller by Using Crc-16
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
 
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge  Text CorpusA Novel Data mining Technique to Discover Patterns from Huge  Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
 

Similar to An Efficient top- k Query Processing in Distributed Wireless Sensor Networks

Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
IEEEGLOBALSOFTTECHNOLOGIES
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor Network
IRJET Journal
 
I04503075078
I04503075078I04503075078
I04503075078
ijceronline
 
C1804011117
C1804011117C1804011117
C1804011117
IOSR Journals
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
IJERA Editor
 
C018141418
C018141418C018141418
C018141418
IOSR Journals
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
IJCNCJournal
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
IISRT
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
Editor IJCATR
 
D031202018023
D031202018023D031202018023
D031202018023
ijceronline
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
Shivlal Mewada
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
69 122-128
69 122-12869 122-128
69 122-128
idescitation
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
ijceronline
 
D010332935
D010332935D010332935
D010332935
IOSR Journals
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
ijassn
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
graphhoc
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networks
Alexander Decker
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
IJMIT JOURNAL
 

Similar to An Efficient top- k Query Processing in Distributed Wireless Sensor Networks (20)

Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor Network
 
I04503075078
I04503075078I04503075078
I04503075078
 
C1804011117
C1804011117C1804011117
C1804011117
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
C018141418
C018141418C018141418
C018141418
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
 
D031202018023
D031202018023D031202018023
D031202018023
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
69 122-128
69 122-12869 122-128
69 122-128
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
D010332935
D010332935D010332935
D010332935
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networks
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

An Efficient top- k Query Processing in Distributed Wireless Sensor Networks

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 41| An Efficient top- k Query Processing in Distributed Wireless Sensor Networks Shaik Shabeena1, K Suresh Babu2 1 M. Tech (CSE), Vasireddy Venkatadri Institute of Technology, Guntur, A.P., India. 2Assoc. Professor, Dept. of Computer Science & Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, A.P., India I. INTRODUCTION A wireless Sensor Network (WSN) consists of number of nodes that is used in different applications such as military, health care, commerce, etc. Usually a sensor node is used for sensing precision to monitor environmental conditions. This will be varies in sensing precision. Every sensor node will be varying in the sensing quality. So, whatever the values i.e. raw sensor readings that are collected from sensor is of data uncertainty and energy consumption. In order to remove the data uncertainty many approaches has been used, but that gives inefficient results. A data uncertainty is removed by placing more sensor nodes and as well as by calculating the probability i.e. aggregate probability. In many application domains, top-k query is a fundamental query to search for the most important objects according to the object ranking. Being different from those studies of top- k query in the centralized databases, in this paper we focus on the top-k query optimization in resource-constrained wireless sensor networks (WSNs). Technological advances have enabled the deployment of the large-scale sensor networks consisting of thousands of inexpensive sensor nodes in an ad-hoc fashion for a variety of environmental monitoring and surveillance purposes. During this course, a large volume of sensed data are needed to be aggregated within the sensor network to respond to user queries. The WSN thus is treated as a virtual database by the database community [1]. However, query processing in sensor networks is essentially different from it in traditional databases due to the unique characteristics imposed on sensors, e.g., slow processing capability, limited storage, and energy-limited batteries, etc. [2], which can be seen from several aspects. Firstly, to prolong network lifetime, the energy consumption is an optimization objective in sensor networks, because the battery-powered sensor nodes will quickly become inoperative due to the large quantity of energy consumption, and the network lifetime is closely tied to the energy consumption rate of the sensors. Secondly, a WSN that senses the data periodically can be viewed as a distributed stream system [3]. However, this special distributed stream system is different from the general distributed stream system because it is more expensive to obtain the sensed information from the sensors far away from the base station than those nearby. Finally, for query processing in sensor networks, minimizing not only the total energy consumption but also the maximum energy consumption among the sensors is the optimization objective. Hence, how to evaluate queries effectively and efficiently in sensor networks poses great challenges. Abstract: Wireless Sensor Networks (WSNs) are usually defined as large-scale, ad-hoc, multi-hop and wireless unpartitioned networks of homogeneous, small, static nodes deployed in an area of interest. Applications of sensor networks include monitoring volcano activity, building structures or natural habitat monitoring. In this paper, we present the problem of processing probabilistic top-k queries in a distributed wireless sensor networks. The basic problem in top-k query processing is that, a single method cannot be used as a solution to the problem of top-k query processing because there are many types of top-k query processing. The method has to be based on the situation, the classification and the type of database and the query model. Here we develop three algorithms, namely, sufficient set-based (SSB), necessary set-based (NSB), and boundary-based (BB), for inter- cluster query processing with bounded rounds of communications. Moreover, in responding to dynamic changes of data distribution in the overall network, we develop an adaptive algorithm that dynamically switches among the three proposed algorithms to minimize the transmission cost. Keywords: BB, NSB, SSB, Top- k query, WSN.
  • 2. An Efficient top- k Query Processing in Distributed Wireless Sensor Networks | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 42| II. RELATED WORK In recent years, many works have been done. Here we review representative work in the areas of 1) top-k Query processing in WSNs, and 2) top-k query processing on the uncertain data. An extensive number of research works in this area has appeared in the literature [4], [5], [6]. Due to the limited energy budget available at sensors, the primary issue is how to develop energy-efficient methods to reduce communication and energy costs in the networks. TAG [4] is one of the first studies in this research area. By exploring the semantics of aggregate operators (e.g., sum, avg, and top-k), in-network processing approach is adopted to suppress the redundant data transmissions in wireless sensor networks. Moreover, continuous top-k queries for sensor networks have been studied in [7] and [8]. In addition, a distributed threshold join algorithm has been developed for the top- k queries [5]. These studies, considering no uncertain data, have a different focus from our present study. For uncertain databases, two interesting top-k definitions (i.e., U-Topk and U-kRanks) and like methods are proposed [9]. U-Topk returns a list of k- tuples that has the highest probability to be in the top-k list over all possible worlds. U-k- Ranks returns a list of k tuples such that the ith record has the highest probability to be the ith best record in all possible worlds. In [10], PT-Topk query, which returns the set of the tuples with a probability of at least p to be in the top-k lists in the possible worlds, is studied. Inspired by the concept of dominate set in the top-k query, a method which avoids unfolding all possible worlds is given. Besides, a sampling method is developed to quickly compute an approximation with quality guarantee to the answer set by drawing a small sample of the uncertain data. In [11], the expected rank of each tuple across all possible worlds serves as the ranking function for finding the final result. In [12], U-Topk and U-kRank queries are improved by exploiting their stop conditions. In [13], all existing top-k semantics have been unified by using some generating functions. Recently, a study on processing top-k queries over a distributed uncertain database is reported in [14]. III. PROPOSED WORK 1. Sufficient and Necessary sets In this section We introduce the notion of sufficient set and necessary set for distributed processing of probabilistic top-k queries in cluster-based wireless sensor networks. These two concepts have very nice properties and can facilitate localized data pruning in clusters. Given an uncertain data set Ti in the cluster Ci, if there exists a tuple tsb€Ti (called sufficient boundary) such that the tuples ranked lower than tsb are useless for the query processing at the base station, then the sufficient set of Ti, denoted as S(T), is a subset of Ti as specified below: S(Ti)={t|t=ftsbort<ftsb} where f is a given scoring function for ranking. Note that a sufficient boundary may not exist for a given data set. Given a local data set Ti in the cluster Ci, assume that Ai is the set of locally known candidate tuples for the final answer and tnb (called necessary boundary) is the lowest ranked tuple in Ai. The necessary set of Ti, denoted as N(Ti), is N(Ti)= {t|t€ Ti, t <f <tnb} Using the notion of sufficient and necessary sets as a basis, we propose 3 distributed algorithms for processing probabilistic top-k queries in wireless sensor networks, namely 1) Sufficient Set-based method; 2) Necessary Set-based method; and 3) Boundary-based method. 2. Sufficient Set-Based (SSB) Algorithm After collecting data tuples from its cluster, ci computes the S(Ti) from the locally collected tuples and sends it to the base station. If a sufficient set cannot be obtained, then all the tuples are transmitted to the base station. After receiving the transmitted data tuples from all the cluster heads, they compute final answer. Algorithm 1: SSB ALGORITHM AT CLUSTER HEAD (ci): 1. if SB(Ti) exits
  • 3. An Efficient top- k Query Processing in Distributed Wireless Sensor Networks | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 43| S(Ti) ← {x|x ≤ f SB(Ti) Λ x Є Ti } Yi ← S(Ti) Else Yi ← Ti 2. Now, Yi is delivered to the base station. AT BASESTATION: 1. It receive the tuples Yi from the cluster head.(1 ≤ i ≤ N) 2.T′ ← U1≤ i≤N Yi Where, x is the tuples ci is the cluster head S(Ti) is the sufficient set Ti is the records collected from the sensor N is the number of clusters in the zone Ci is the cluster Yi is the sufficient boundary for SSB. Tʹ is the aggregation of data sets received from the clusters 3. Necessary Set-Based (NSB) Algorithm After receiving all the necessary sets, the received tuples are merged into a table in a base station and finds the necessary boundary called the global boundary (GB)). If GB is ranked higher than the highest ranked necessary boundary, all the necessary data have delivered to the base station. Otherwise, it entering the second phase, it sends the GB back to the ci, which return the supplementary data tuples ranked between its local necessary boundary and GB. Then, the base station computes the final answer. Algorithm 2: NSB ALGORITHM AT CLUSTER HEAD: 1.Compute the necessary boundary NB(Ti), N(Ti) ← {x|x ≤ f NB(Ti) Λ x Є Ti } 2. Deliver N(Ti) to the base station 3.if cluster head receive GB from the base station then N′(Ti) ←{ x|x ≤f GB Λ x Є [Ti - N(Ti)]} Now, N′(Ti) is send to the base station. end if AT BASESTATION: 1. It receives the tuples N (Ti) from the cluster head. (1 ≤ i ≤ N) T′ ← U1 ≤ i ≤ N N(Ti) 2. Now, it will calculate the global boundary. 3. if global boundary GB is less than that of NB(Ti), then It calculate the final necessary boundary else It will broadcast GB to ci and once again it collects necessary tuples T′ ← U1≤ i ≤ N N′(Ti) end if Where, x is the tuples ci is the cluster head N(Ti) is the necessary set NB(Ti) is the necessary boundary Ti is the records collected from the sensor N is the number of clusters in the zone T′ is the aggregation of data sets received from the clusters 4. Boundary-Based (BB) Algorithm The boundary-based method first delivers the local knowledge in clusters, in the form of NB and SB, to the base station in order to provide a refined global data pruning among clusters. It is done instead of directly delivering data tuples to the base station.
  • 4. An Efficient top- k Query Processing in Distributed Wireless Sensor Networks | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 44| Algorithm 3: BB Algorithm AT CLUSTER HEAD: 1. Calculate the Necessary Boundary (NB) and Sufficient Boundary (SB) and send it to the base station. 2. Base station receive Global Boundary (GB) 3. Yi ← { x|x ≤f GB x Є [Ti - N(Ti)]} 4. Now, Yi is delivered to the base station. AT BASESTATION: 1. It will receive the NB and SB from cluster heads (ci), 2. Now, base station computes the (Sufficient Boundaryhigh and Necessary Boundarylow ). 3. if SBhigh < NBlow , then SBhigh →GB else NBlow → GB end if 4.Now, broadcast the global boundary to each Ci T ′ ← U1≤ i ≤ N Y(Ti) Where, x is the tuple ci is the cluster head S(Ti) is the sufficient set N(Ti) is the necessary set Ti is the records collected from the sensor N is the number of clusters in the zone Yi is the sufficient boundary for SSB T′ is the aggregation of data sets received from the clusters 5. Cost Analysis We perform a cost analysis on data transmission of the three proposed methods by using adaptive algorithm. Adaptive Algorithm: The performance of the data transmission using proposed method is affected by factors such as the skewness of data distribution among clusters which may change continuously over time. A cost-based adaptive algorithm that is used dynamically Sufficient Set Based, Necessary Set Based, and Boundary Based as the data distribution within the network changes. Algorithm 4: Adaptive Algorithm Count=0 ; ZSSB , ZNSB , ZBB =0 Where R is varied window size. Then estimate the cost of CSSB, CNSB, CBB ZSSB ← ZSSB + CSSB ZNSB ← ZNSB + CNSB ZBB ← ZBB + CBB if count ≥ R then if ZSSB = min{ ZSSB , ZNSB , ZBB} then switch to SSB end if if ZNSB = min{ ZSSB , ZNSB , ZBB} then switch to NSB end if if ZBB = min{ ZSSB , ZNSB , ZBB} then switch to SSB end if end if IV. CONCLUSION Motivated by many applications, top-k query is a fundamental operation in the modern database systems. Technological advances have enabled the deployment of several large-scale sensor networks for environmental monitoring and surveillance purposes, efficient processing of top-k query in such networks poses great challenges due to the unique characteristics of sensor nodes and a vast amount of data generated by sensor networks. This work supports in-network top-k query process over uncertain data in the distributed wireless sensor network. We develop the notion of the sufficient set and necessary set for efficient in-network
  • 5. An Efficient top- k Query Processing in Distributed Wireless Sensor Networks | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 45| pruning of uncertain data in a distributed setting. This notion, along with its nice properties, provides a theoretical basis for the distributed query processing methods. Based on the notion of sufficient sets and necessary sets, we propose a suite of algorithms for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. These methods exploit individual and combined strengths of sufficient and necessary sets in query processing. We propose a cost-based adaptive algorithm that dynamically switches among the three proposed algorithms based on their estimated costs. REFERENCES [1] S. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong. TAG: a tiny aggregation service for ad hoc sensor networks. ACM SIGOPS Operating Systems Review, Vol.36, pp.131–146, 2002. [2] G. J. Pottie, W. J. Kaiser Wireless Integrated Network Sensors. Communication of ACM, Vol.43 No.5, pp.51–58, 2000. [3] B. Babcock and C. Olston. Distributed top-k monitoring. Proc. of ACM SIGMOD, ACM, pp.28–39, 2003. [4] P. Cao and Z. Wang, “Efficient Top-k Query Calculation in Distributed Networks,” Proc. 23rd Ann. ACM Symp.Principles of Distributed Computing (PODC), pp. 206-215, 2004. [5] M. Ye, X. Liu, W.-C. Lee, and D.L. Lee, “Probabilistic Top-k Query Processing in Distributed Sensor Networks,” Proc. IEEE Int’l Conf. Data Eng. (ICDE ’10), 2010. [6] D. Zeinalipour-Yazti, Z. Vagena, D. Gunopulos, V. Kalogeraki, V.Tsotras, M. Vlachos, N. Koudas, and D. Srivastava, “The Threshold Join Algorithm for Top-k Queries in Distributed Sensor Networks,” Proc. Second Int’l Workshop Data Management for SensorNetworks (DMSN ’05), pp. 61-66, 2005 [7] Q. Han, S. Mehrotra, and N. Venkatasubramanian, “Energy Efficient Data Collection in Distributed Sensor Environments,” Proc. 24th Int’lConf.Distributed Computing Systems (ICDCS’04), pp. 590-597, 2004. [8] M.Wu, J.Xu, X. Tang, and W.-C. Lee, “Top-k Monitoring in Wireless Sensor Networks,” IEEE Trans. Knowledge and Data Eng., vol. 19, no. 7, pp. 962-976, July 2007. [9] M.A. Soliman, I.F. Ilyas, and K.C. Chang, “Top-k Query Processing in Uncertain Databases,” Proc. Int’l Conf. [10] M. Hua, J. Pei, W. Zhang, and X. Lin, “Ranking Queries on Uncertain Data: A Probabilistic Threshold Approach,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’08), 2008. [11] C. Jin, K. Yi, L. Chen, J.X. Yu, and X. Lin, “Sliding-Window Top-k Queries on Uncertain Streams,” Proc. Int’l Conf. Very Large Data Bases (VLDB ’08), 2008. [12] D. Wang, J. Xu, J. Liu, and F. Wang, “Mobile Filtering for Error-Bounded Data Collection in Sensor Networks,” Proc. 28th Int’l Conf. Distributed Computing Systems (ICDCS ’08), pp. 530-537, 2008. [13] K. Yi, F. Li, G. Kollios, and D. Srivastava, “Efficient Processing of Top-k Queries in Uncertain Databases with X- Relations,” IEEE pp. 1669 1682, Dec.2008. [14] F. Li, K. Yi, and J. Jestes, “Ranking Distributed Probabilistic Data,” Proc. 35th SIGMOD Int’l Conf. Management of Data (SIGMOD ’09), 2009.