SlideShare a Scribd company logo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
77
Network Lifetime Enhancement by Node Deployment
in WSN
Preethi K1
SSN College of Engineering, ECE,
preethigkmoorthy@gmail.com
A.Jawahar2
SSN College of Engineering, ECE
jawahara@ssn.edu.in
Abstract— The key challenge in wireless sensor network is network lifetime so it is necessary to increase the network lifetime.
The work deals with the enhancement of the network lifetime for target coverage problem in wireless sensor network while
deploying the sensor nodes. Initially sensor nodes and targets are placed randomly, where the targets are the not sensor nodes its
external parameter. Network lifetime for this scenario is computed, where the sensing range and initial energy of the battery are
assumed. Network lifetime is based on sensor nodes that monitor the targets and lifetime of battery. The randomly placed sensor
nodes are redeployed using optimization algorithm called Artificial Bee Colony (ABC). The network lifetime for redeployed
sensor nodes are computed and compared with randomly deployed sensor nodes.
Index Terms— Artificial Bee Colony (ABC), Coverage, Deployment, Network lifetime, Wireless sensor network (WSN)
——————————  ——————————
1 INTRODUCTION
roup of sensor nodes together forms the wireless sensor
network. Wireless sensor network plays important role in
military, environmental, health applications. It is used to
monitor the physical and environmental parameters such as
temperature, pressure, humidity. The sensor nodes communicate
among themselves using their sensing range. Sensor nodes have tiny
battery, recharging or replacing the battery is difficult. Some of the
issues in designing the wireless sensor networks are deployment,
fault tolerance, infrastructure. Network lifetime plays the vital role in
wireless sensor network.
Sensor nodes are deployed in the network field [1]. Proper node
deployment can reduce the complexity of the coverage, connectivity
problems in wireless sensor networks. The deployment, sensor nodes
are placed in the field randomly like for example dropping from the
airplane. In deterministic deployment, sensor nodes are placed with
the help of some details like placing in grid.
The coverage problems in the wireless sensor network are of two
type’s target and area coverage [4]. Target coverage is that focus on
the specific area or a point. Simple coverage, k-coverage and q-
coverage are various types of target coverage. When the target is
monitored by at least one sensor node then it is called simple
coverage. k-coverage is each target should be monitored by k
number of sensor nodes, q-coverage means target vector should be
monitored by q number of sensor nodes. When the sensor node
monitors the entire area then it is called area coverage.
1.1 Related Works
The components of sensor nodes are sensing unit, processing unit,
communication unit and power unit [4]. The sensing unit has the
sensor and ADC. The sensors sense the data and send the data to the
ADC which converts the analog data that sensed to the digital form.
The processing unit has the processor and storage. The processor
may be a microcontroller which is used to program the operation that
has to be performed and the storage which the memory part to store
that data. The communication unit has the transmitter and the
receiver. The power unit which used to give power supply to the
communication and sensing unit.
Coverage problem of the wireless sensor network and analyzed
the efficiency of the regular deployment pattern for coverage [5].
The efficiency is compared by varying the number of nodes
increases the efficiency will also increase.
The network lifetime computations for different deployment
strategies in network are made to maximize the network lifetime [2].
It is concluded that if the network area increases, the maximum
achievable network lifetime will decrease and when the number of
data sink increases for the same dimension that network lifetime
increases. It also discusses about the cost model of the network.
ABC optimization algorithm is discussed about the ABC
algorithm which is motivated by the intelligent behavior of honey
bee [7]. Entire Bee colony process can be divided into three phrases:
employed bee phase, onlooker phase and scouts. The employed bee
takes a load of nectar of food source and returns the hive and unloads
the nectar of food store. After unloading the food, the employed bee
performs a special form on dance called waggle dance which contain
the information about the distance from hive and its quality rating.
Since the information about the current rich sources is available to an
onlooker on dance floor, onlooker bee probably could watch
numerous dances and choose to employ itself at most quantitative
source. There is greater probability of onlooker’s choice. Scouts bee
searches for a random feasible solution. In ABC system, artificial
bees fly around the multidimensional space in search of food source.
He split the entire bee process on the basis of its functioning. With its
experience if the search it will find the good quality food. ABC
algorithm was implemented in dynamic deployment of nodes in the
network to get better gain by increasing the coverage area. It
concludes that when the numbers of iteration increases, the gain will
also increases simultaneously.
1.2 Motivation
G
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
78
Wireless sensor network is a developing area and has a wide area
of applications. The major design constraint in wireless sensor
network is their lifetime because the wireless sensor network
operates on the battery with limited energy. Wireless sensor
networks are used in area where human monitoring is difficult.
Hence the sensor nodes has small size battery, recharging and
replacing of the battery are difficult.
1.3 Paper Organization
In section I introduction of the wireless sensor network has made
and discussed about the coverage problems and deployment methods
in the wireless sensor network. In section II network scenario which
gives some knowledge about the network field. The section III
discusses about the random deployment scenario. In Section IV
presents the proposed algorithm for redeploying the sensor nodes in
order to cover all the targets. In section V made the result analysis of
the random deployment and ABC based algorithm deployment. In
section VI is the conclusion of the work made.
2. NETWORK SCENARIO
The network consists of m sensor nodes and n targets with the
region R. Each sensor nodes has the sensing range Sr with the initial
battery power bi, where the energy consumed by the sensor node is
assumed.
2.1 Coverage Matrix
If the target is within the sensing range Sr, then the sensor node
senses the target [2]. A sensor node Si, 1<i<m is said to cover target
Tj, if the distance between the sensor node Si and the target Tj is less
than Sr, this helps in determining the coverage matrix Mij which
show that whether the target is being monitor by the sensor node or
not.
Mij=
1
0



(1)
2.2 Network Lifetime
Network lifetime is defined as the time until the first node or
group of nodes runs out of energy. Alternatively the network lifetime
[2] is defined as the time duration from the launch of the sensor
networks to the instant when some of the targets are not covered by
certain number of sensor nodes. The upper bound is the maximum
achievable network lifetime [3].
U=minj
'
ij ii
i
M *b
q
 (2)
Where i =1,2,…m and j=1, 2 ,…n.
'
i i ib b e is the lifetime of the battery,
bi is the initial power of the battery and ei is the energy consumption
rate of Si.
For k-coverage, qi=k, j=1, 2,… n.
3. RANDOM DEPLOYMENT
Required number of sensor nodes and targets are taken. The
sensor nodes have the equal sensing range. Deploy the sensor nodes
and target randomly in the network field. The upper bound of the
network lifetime is computed based on the coverage matrix. The
distance between the sensor nodes and target is calculated. If the
distance is less than sensing range of the sensor node, then the target
is being monitored by the sensor node.
Some of the targets are left unmonitored and some sensor nodes
are not being used which makes the coverage problem in the
network. In order to avoid the coverage problem any of the
optimization technique has to be used.
4. ABC ALGORITHM
Artificial Bee Colony (ABC) algorithm is used for redeploying the
sensor nodes. This algorithm is based on the intelligent behavior of
honey bee swarm. The colony of bees consists of three groups:
employed bee, onlookers and scouts. The employed bees search the
food source, carry information back to the hive and share it with the
onlookers. An onlooker helps in determining the best food path using
the information given by the employed bees. The information
consists of quality, quantity and locations of the food source. Scouts
are the unemployed bees which will go for random search of foods
[6]. Here the targets are represented as bees and the sensor nodes as
food source.
Initialization of parameters such as number of sensor nodes,
targets, maximum cycle and limits for scouts is made.
Initial solution B represented as Ba= {(x1,y1), (x2,y2),
…..(xm,ym)}where a=1, 2..nb, nb is the number of targets and m is the
number of sensor Compute the fitness function F(Di) for population
solution which is the network lifetime of the WSN [8]. Each target
has to be monitored by at least one sensor node.
F(Di) = minj
'
ij ii
i
M *b
q

(3)
Each sensor node is associated with the cluster, where the cluster
corresponds to the set of targets monitored by the sensor node. Di is
the initial location of the ith
cluster.
After getting the information from the employed bee, onlookers
will explores the region for food source at Bi with the probability
value Pi defined as
Pi =
F(D )
i
m F(D )
l i l
  (4)
The onlookers find the neighbor solution in the vicinity of Bi by
using
Di(t+1)=Di(t)+ᵟij*f (5)
f =random number in range [-1, 1]
Di(t) = initial solution of ith
cluster
ᵟij = difference between the initial position to new position
If Si monitors Tj
Otherwise
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
79
A. Pseudo Code For ABC Algorithm
1. Initialize the solution population B.
2. Calculate the fitness value
3. Cycle=1
4. Search for neighbor solution
5. If new solution is better than the old solution then
6. Register the new solution and discard the old solution
7. End if
8. Register the best solution so far
9. cycle=cycle+1
10. cycle=maximum cycle
5. RESULT ANALYSIS
Sensor nodes and targets are randomly deployed in the region of
1000*1000. Mat lab tool is used to perform the simulation. The
assumed the sensing range of the sensor node is 75m and the initial
battery power of 100 joules and energy consumed by the sensor node
when the sensor node monitors the target is 1 unit. The target is kept
constant which are 10 and numbers of sensor nodes are varied.
5.1 Random Deployment
The network scenario of 150, 300 and 500 number of sensor nodes
are used for deployment with 10 targets. The dotted line represent the
sensor node monitors the target (i. e the target is within the sensing
range of the sensor node). The network lifetime is calculated for
randomly deployed sensor nodes and targets.
Fig (1) is the random deployment of 150 sensor nodes which
monitors the 10 targets within the network field. Here 1st
and 10th
target in the network are not monitored by the sensor node. The
target has to be monitored by at least two number of sensor nodes
when k=2 in k-coverage. If the deployment is random there occurs a
coverage problem, which is all target may not be monitored by 2
number of sensor nodes.
5.2 ABC Based Deployment
The randomly deployed sensor nodes are redeployed using the
ABC algorithm. The network lifetime is computed for the
redeployed location of sensor nodes.
Fig (2) is the deployment of 150 sensor nodes to monitor the 10
target within the network field after using the ABC optimization
algorithm. Here all the targets in the network field monitored by the
sensor nodes.
For the k-coverage of 2 which means the target has to be
monitored by minimum of 2 sensor nodes. Let the initialization
parameters taken limits as 10 and the maximum cycle as 1000.
5.3 Comparison Of Network Lifetime
Fig (3) the network lifetime for the varying the sensor nodes and
Fig .1 Random deployment scenarios for 150 sensor nodes
Fig. 2 ABC algorithm scenario for 150 sensor nodes
Fig .3 Network lifetime comparisons for random
deployment and ABC algorithm
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
80
fixed number of targets 10. The numbers of sensor nodes are varied
150, 300 and 500. Coverage problem: simple coverage and k-
coverage (k-1, 2, and 3) are considered.
In random deployment for the coverage problem some of the
targets are life unmonitored. When the sensor node is 150 the
network lifetime seems to be less compared to 300 and 500 number
of sensor nodes. When the number of sensor nodes is the network
there is a chance of increasing in coverage area.
In ABC based deployment, all the targets in the network covered
by the sensor node. For k=1, 2 and 3 the network lifetime gets
increased after ABC algorithm.
A simple coverage (i. e k=1) the network lifetime is maximum
when compared to k-coverage (k=2 and 3).
6. CONCLUSION
In this paper, the sensor nodes are deployed randomly and they are
redeployed to overcome the target coverage problem, where all
targets in the network are covered. Here the simple coverage and k-
coverage are used. And the network lifetime for the scenario is
computed for the random deployment and the deployment location
after the ABC algorithm. By the simulation results it is conclude that
in random deployment when the numbers of sensor nodes increases
the network lifetime will also increases simultaneously. After the
redeploying the randomly deployed sensor nodes for the target
coverage the network lifetime seems to be increased for varying
sensor nodes. By comparing the different network scenario for
coverage problem, the network lifetime seems to decrease with
increase in the coverage.
ACKNOWLEDGMENT
I wish to thanks my Guide Dr. A. Jawahar for guiding in
completing this project and my parents and brother for their constant
support.
REFERENCES
[1] Anjali Mahajan, Pradnya Gajbhiye, “A Survey if Architecture and
Node deployment in Wireless sensor network”, IJARCSSE, Vol 3,
issue 7, 2013.
[2] Y. Gu, H. Liu and B. Zhao, “Target coverage with QoS
requirements in wireless sensor network”, in proc. Int. pervas.
Comput. Netw. , 2009.
[3] M. Chaudary and A. K. Pujari,“Q-coverage problem in wireless
sensor network”, in proc.int.conf.Distrib. comput. Netw. , 2009.
[4] Miheala cardie, T. Thai Yingshu Li, Weili Wu , “Energy Efficient
target coverage in wireless sensor network”, IEEE , 2005.
[5] Ajay Jangra, Swati, Richa, Priyanka, “Wireless sensor network
Architecture and Design issue challenges”, IJCSE, Vol. 02, No. 09.
[6] Bai. X, Kumar. S, Xuan. D, Yun. Z and Lai. T. H, “Deploying
wireless sensor network to achieve both coverage and connectivity.
[7] Gorkemli, Ozturk, Koraboga, “Artificial bee colony for dynamic
deployment for wireless sensor networks”, Turk J ElecEng &
Comp Sci, Vol. 20, No. 2.
[8] Bilal Atalas, “Chaotic Bee colony algorithms for global numerical
optimization”, ELSEVIER, 2010.

More Related Content

What's hot

High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problemijasuc
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Paper id 36201502
Paper id 36201502Paper id 36201502
Paper id 36201502IJRAT
 
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...IAEME Publication
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359Sandeep Saxena
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...IJREST
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...eSAT Journals
 
Optimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithmOptimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithmeSAT Journals
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKScsandit
 
Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...IAEME Publication
 

What's hot (15)

69 122-128
69 122-12869 122-128
69 122-128
 
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
74 136-143
74 136-14374 136-143
74 136-143
 
Paper id 36201502
Paper id 36201502Paper id 36201502
Paper id 36201502
 
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
 
I04503075078
I04503075078I04503075078
I04503075078
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...
 
Optimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithmOptimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithm
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...
 

Viewers also liked

Manu’s Employee Estimating Device
Manu’s Employee Estimating DeviceManu’s Employee Estimating Device
Manu’s Employee Estimating DeviceIJTET Journal
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...IJTET Journal
 
An Efficient VLSI Design for Extracting Local Binary Pattern
An Efficient VLSI Design for Extracting Local Binary PatternAn Efficient VLSI Design for Extracting Local Binary Pattern
An Efficient VLSI Design for Extracting Local Binary PatternIJTET Journal
 
Time Reduction and Upgrading of Balancing Machine for Impeller
Time Reduction and Upgrading of Balancing Machine for ImpellerTime Reduction and Upgrading of Balancing Machine for Impeller
Time Reduction and Upgrading of Balancing Machine for ImpellerIJTET Journal
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...Enhancing energy efficient dynamic load balanced clustering protocol using Dy...
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...IJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...IJTET Journal
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...IJTET Journal
 
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...IJTET Journal
 

Viewers also liked (17)

Manu’s Employee Estimating Device
Manu’s Employee Estimating DeviceManu’s Employee Estimating Device
Manu’s Employee Estimating Device
 
ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...
Experimental Evaluation of Electronic Port Fuel Injection System in Four Stro...
 
An Efficient VLSI Design for Extracting Local Binary Pattern
An Efficient VLSI Design for Extracting Local Binary PatternAn Efficient VLSI Design for Extracting Local Binary Pattern
An Efficient VLSI Design for Extracting Local Binary Pattern
 
Time Reduction and Upgrading of Balancing Machine for Impeller
Time Reduction and Upgrading of Balancing Machine for ImpellerTime Reduction and Upgrading of Balancing Machine for Impeller
Time Reduction and Upgrading of Balancing Machine for Impeller
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...Enhancing energy efficient dynamic load balanced clustering protocol using Dy...
Enhancing energy efficient dynamic load balanced clustering protocol using Dy...
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...
Area Delay Power Efficient and Implementation of Modified Square-Root Carry S...
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...
Efficient Design of Higher Order Variable Digital Filter for Multi Modulated ...
 
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...
Flow Control Using Variable Frequency Drive In Water Treatment Process of Dei...
 

Similar to Network Lifetime Enhancement by Node Deployment in WSN

Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNIRJET Journal
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksIJCNCJournal
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingeSAT Publishing House
 

Similar to Network Lifetime Enhancement by Node Deployment in WSN (20)

Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSN
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
F017544247
F017544247F017544247
F017544247
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
Ce35461464
Ce35461464Ce35461464
Ce35461464
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
E010412433
E010412433E010412433
E010412433
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna using
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
 
An Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSRAn Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSRIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 
An Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSRAn Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSR
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsparmarsneha2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...EugeneSaldivar
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...SachinKumar945617
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Network Lifetime Enhancement by Node Deployment in WSN

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303 77 Network Lifetime Enhancement by Node Deployment in WSN Preethi K1 SSN College of Engineering, ECE, preethigkmoorthy@gmail.com A.Jawahar2 SSN College of Engineering, ECE jawahara@ssn.edu.in Abstract— The key challenge in wireless sensor network is network lifetime so it is necessary to increase the network lifetime. The work deals with the enhancement of the network lifetime for target coverage problem in wireless sensor network while deploying the sensor nodes. Initially sensor nodes and targets are placed randomly, where the targets are the not sensor nodes its external parameter. Network lifetime for this scenario is computed, where the sensing range and initial energy of the battery are assumed. Network lifetime is based on sensor nodes that monitor the targets and lifetime of battery. The randomly placed sensor nodes are redeployed using optimization algorithm called Artificial Bee Colony (ABC). The network lifetime for redeployed sensor nodes are computed and compared with randomly deployed sensor nodes. Index Terms— Artificial Bee Colony (ABC), Coverage, Deployment, Network lifetime, Wireless sensor network (WSN) ——————————  —————————— 1 INTRODUCTION roup of sensor nodes together forms the wireless sensor network. Wireless sensor network plays important role in military, environmental, health applications. It is used to monitor the physical and environmental parameters such as temperature, pressure, humidity. The sensor nodes communicate among themselves using their sensing range. Sensor nodes have tiny battery, recharging or replacing the battery is difficult. Some of the issues in designing the wireless sensor networks are deployment, fault tolerance, infrastructure. Network lifetime plays the vital role in wireless sensor network. Sensor nodes are deployed in the network field [1]. Proper node deployment can reduce the complexity of the coverage, connectivity problems in wireless sensor networks. The deployment, sensor nodes are placed in the field randomly like for example dropping from the airplane. In deterministic deployment, sensor nodes are placed with the help of some details like placing in grid. The coverage problems in the wireless sensor network are of two type’s target and area coverage [4]. Target coverage is that focus on the specific area or a point. Simple coverage, k-coverage and q- coverage are various types of target coverage. When the target is monitored by at least one sensor node then it is called simple coverage. k-coverage is each target should be monitored by k number of sensor nodes, q-coverage means target vector should be monitored by q number of sensor nodes. When the sensor node monitors the entire area then it is called area coverage. 1.1 Related Works The components of sensor nodes are sensing unit, processing unit, communication unit and power unit [4]. The sensing unit has the sensor and ADC. The sensors sense the data and send the data to the ADC which converts the analog data that sensed to the digital form. The processing unit has the processor and storage. The processor may be a microcontroller which is used to program the operation that has to be performed and the storage which the memory part to store that data. The communication unit has the transmitter and the receiver. The power unit which used to give power supply to the communication and sensing unit. Coverage problem of the wireless sensor network and analyzed the efficiency of the regular deployment pattern for coverage [5]. The efficiency is compared by varying the number of nodes increases the efficiency will also increase. The network lifetime computations for different deployment strategies in network are made to maximize the network lifetime [2]. It is concluded that if the network area increases, the maximum achievable network lifetime will decrease and when the number of data sink increases for the same dimension that network lifetime increases. It also discusses about the cost model of the network. ABC optimization algorithm is discussed about the ABC algorithm which is motivated by the intelligent behavior of honey bee [7]. Entire Bee colony process can be divided into three phrases: employed bee phase, onlooker phase and scouts. The employed bee takes a load of nectar of food source and returns the hive and unloads the nectar of food store. After unloading the food, the employed bee performs a special form on dance called waggle dance which contain the information about the distance from hive and its quality rating. Since the information about the current rich sources is available to an onlooker on dance floor, onlooker bee probably could watch numerous dances and choose to employ itself at most quantitative source. There is greater probability of onlooker’s choice. Scouts bee searches for a random feasible solution. In ABC system, artificial bees fly around the multidimensional space in search of food source. He split the entire bee process on the basis of its functioning. With its experience if the search it will find the good quality food. ABC algorithm was implemented in dynamic deployment of nodes in the network to get better gain by increasing the coverage area. It concludes that when the numbers of iteration increases, the gain will also increases simultaneously. 1.2 Motivation G
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303 78 Wireless sensor network is a developing area and has a wide area of applications. The major design constraint in wireless sensor network is their lifetime because the wireless sensor network operates on the battery with limited energy. Wireless sensor networks are used in area where human monitoring is difficult. Hence the sensor nodes has small size battery, recharging and replacing of the battery are difficult. 1.3 Paper Organization In section I introduction of the wireless sensor network has made and discussed about the coverage problems and deployment methods in the wireless sensor network. In section II network scenario which gives some knowledge about the network field. The section III discusses about the random deployment scenario. In Section IV presents the proposed algorithm for redeploying the sensor nodes in order to cover all the targets. In section V made the result analysis of the random deployment and ABC based algorithm deployment. In section VI is the conclusion of the work made. 2. NETWORK SCENARIO The network consists of m sensor nodes and n targets with the region R. Each sensor nodes has the sensing range Sr with the initial battery power bi, where the energy consumed by the sensor node is assumed. 2.1 Coverage Matrix If the target is within the sensing range Sr, then the sensor node senses the target [2]. A sensor node Si, 1<i<m is said to cover target Tj, if the distance between the sensor node Si and the target Tj is less than Sr, this helps in determining the coverage matrix Mij which show that whether the target is being monitor by the sensor node or not. Mij= 1 0    (1) 2.2 Network Lifetime Network lifetime is defined as the time until the first node or group of nodes runs out of energy. Alternatively the network lifetime [2] is defined as the time duration from the launch of the sensor networks to the instant when some of the targets are not covered by certain number of sensor nodes. The upper bound is the maximum achievable network lifetime [3]. U=minj ' ij ii i M *b q  (2) Where i =1,2,…m and j=1, 2 ,…n. ' i i ib b e is the lifetime of the battery, bi is the initial power of the battery and ei is the energy consumption rate of Si. For k-coverage, qi=k, j=1, 2,… n. 3. RANDOM DEPLOYMENT Required number of sensor nodes and targets are taken. The sensor nodes have the equal sensing range. Deploy the sensor nodes and target randomly in the network field. The upper bound of the network lifetime is computed based on the coverage matrix. The distance between the sensor nodes and target is calculated. If the distance is less than sensing range of the sensor node, then the target is being monitored by the sensor node. Some of the targets are left unmonitored and some sensor nodes are not being used which makes the coverage problem in the network. In order to avoid the coverage problem any of the optimization technique has to be used. 4. ABC ALGORITHM Artificial Bee Colony (ABC) algorithm is used for redeploying the sensor nodes. This algorithm is based on the intelligent behavior of honey bee swarm. The colony of bees consists of three groups: employed bee, onlookers and scouts. The employed bees search the food source, carry information back to the hive and share it with the onlookers. An onlooker helps in determining the best food path using the information given by the employed bees. The information consists of quality, quantity and locations of the food source. Scouts are the unemployed bees which will go for random search of foods [6]. Here the targets are represented as bees and the sensor nodes as food source. Initialization of parameters such as number of sensor nodes, targets, maximum cycle and limits for scouts is made. Initial solution B represented as Ba= {(x1,y1), (x2,y2), …..(xm,ym)}where a=1, 2..nb, nb is the number of targets and m is the number of sensor Compute the fitness function F(Di) for population solution which is the network lifetime of the WSN [8]. Each target has to be monitored by at least one sensor node. F(Di) = minj ' ij ii i M *b q  (3) Each sensor node is associated with the cluster, where the cluster corresponds to the set of targets monitored by the sensor node. Di is the initial location of the ith cluster. After getting the information from the employed bee, onlookers will explores the region for food source at Bi with the probability value Pi defined as Pi = F(D ) i m F(D ) l i l   (4) The onlookers find the neighbor solution in the vicinity of Bi by using Di(t+1)=Di(t)+ᵟij*f (5) f =random number in range [-1, 1] Di(t) = initial solution of ith cluster ᵟij = difference between the initial position to new position If Si monitors Tj Otherwise
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303 79 A. Pseudo Code For ABC Algorithm 1. Initialize the solution population B. 2. Calculate the fitness value 3. Cycle=1 4. Search for neighbor solution 5. If new solution is better than the old solution then 6. Register the new solution and discard the old solution 7. End if 8. Register the best solution so far 9. cycle=cycle+1 10. cycle=maximum cycle 5. RESULT ANALYSIS Sensor nodes and targets are randomly deployed in the region of 1000*1000. Mat lab tool is used to perform the simulation. The assumed the sensing range of the sensor node is 75m and the initial battery power of 100 joules and energy consumed by the sensor node when the sensor node monitors the target is 1 unit. The target is kept constant which are 10 and numbers of sensor nodes are varied. 5.1 Random Deployment The network scenario of 150, 300 and 500 number of sensor nodes are used for deployment with 10 targets. The dotted line represent the sensor node monitors the target (i. e the target is within the sensing range of the sensor node). The network lifetime is calculated for randomly deployed sensor nodes and targets. Fig (1) is the random deployment of 150 sensor nodes which monitors the 10 targets within the network field. Here 1st and 10th target in the network are not monitored by the sensor node. The target has to be monitored by at least two number of sensor nodes when k=2 in k-coverage. If the deployment is random there occurs a coverage problem, which is all target may not be monitored by 2 number of sensor nodes. 5.2 ABC Based Deployment The randomly deployed sensor nodes are redeployed using the ABC algorithm. The network lifetime is computed for the redeployed location of sensor nodes. Fig (2) is the deployment of 150 sensor nodes to monitor the 10 target within the network field after using the ABC optimization algorithm. Here all the targets in the network field monitored by the sensor nodes. For the k-coverage of 2 which means the target has to be monitored by minimum of 2 sensor nodes. Let the initialization parameters taken limits as 10 and the maximum cycle as 1000. 5.3 Comparison Of Network Lifetime Fig (3) the network lifetime for the varying the sensor nodes and Fig .1 Random deployment scenarios for 150 sensor nodes Fig. 2 ABC algorithm scenario for 150 sensor nodes Fig .3 Network lifetime comparisons for random deployment and ABC algorithm
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303 80 fixed number of targets 10. The numbers of sensor nodes are varied 150, 300 and 500. Coverage problem: simple coverage and k- coverage (k-1, 2, and 3) are considered. In random deployment for the coverage problem some of the targets are life unmonitored. When the sensor node is 150 the network lifetime seems to be less compared to 300 and 500 number of sensor nodes. When the number of sensor nodes is the network there is a chance of increasing in coverage area. In ABC based deployment, all the targets in the network covered by the sensor node. For k=1, 2 and 3 the network lifetime gets increased after ABC algorithm. A simple coverage (i. e k=1) the network lifetime is maximum when compared to k-coverage (k=2 and 3). 6. CONCLUSION In this paper, the sensor nodes are deployed randomly and they are redeployed to overcome the target coverage problem, where all targets in the network are covered. Here the simple coverage and k- coverage are used. And the network lifetime for the scenario is computed for the random deployment and the deployment location after the ABC algorithm. By the simulation results it is conclude that in random deployment when the numbers of sensor nodes increases the network lifetime will also increases simultaneously. After the redeploying the randomly deployed sensor nodes for the target coverage the network lifetime seems to be increased for varying sensor nodes. By comparing the different network scenario for coverage problem, the network lifetime seems to decrease with increase in the coverage. ACKNOWLEDGMENT I wish to thanks my Guide Dr. A. Jawahar for guiding in completing this project and my parents and brother for their constant support. REFERENCES [1] Anjali Mahajan, Pradnya Gajbhiye, “A Survey if Architecture and Node deployment in Wireless sensor network”, IJARCSSE, Vol 3, issue 7, 2013. [2] Y. Gu, H. Liu and B. Zhao, “Target coverage with QoS requirements in wireless sensor network”, in proc. Int. pervas. Comput. Netw. , 2009. [3] M. Chaudary and A. K. Pujari,“Q-coverage problem in wireless sensor network”, in proc.int.conf.Distrib. comput. Netw. , 2009. [4] Miheala cardie, T. Thai Yingshu Li, Weili Wu , “Energy Efficient target coverage in wireless sensor network”, IEEE , 2005. [5] Ajay Jangra, Swati, Richa, Priyanka, “Wireless sensor network Architecture and Design issue challenges”, IJCSE, Vol. 02, No. 09. [6] Bai. X, Kumar. S, Xuan. D, Yun. Z and Lai. T. H, “Deploying wireless sensor network to achieve both coverage and connectivity. [7] Gorkemli, Ozturk, Koraboga, “Artificial bee colony for dynamic deployment for wireless sensor networks”, Turk J ElecEng & Comp Sci, Vol. 20, No. 2. [8] Bilal Atalas, “Chaotic Bee colony algorithms for global numerical optimization”, ELSEVIER, 2010.