In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
The document summarizes a student's M. Tech thesis project on improving routing protocols in wireless sensor networks. It begins with an objective to develop a hybrid routing protocol combining features of PEGASIS and LEACH to increase network lifetime. It then reviews related work on routing protocols and energy efficiency. The proposed methodology describes a hybrid protocol that selects cluster heads probabilistically like LEACH while forming chains to route data like PEGASIS. Simulation results show the hybrid protocol increases network lifetime to over 2000 rounds compared to 2000 rounds for previous work. The conclusion is that lower cluster head election probabilities in the hybrid protocol extend network lifetime. Future work could analyze different network parameters.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
This document discusses clustering techniques to analyze communication overhead in wireless sensor networks. It describes how clustering can help reduce energy consumption and traffic load by limiting redundant data transmission. The document compares the K-means and fuzzy clustering algorithms. The K-means algorithm partitions nodes into K clusters based on distance from cluster centers, while fuzzy clustering allows nodes to belong to multiple clusters. A simulation found that fuzzy clustering results in lower communication overhead than K-means as node velocity increases, helping to increase network lifetime.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document outlines various clustering protocols for heterogeneous wireless sensor networks (HWSN). It begins by defining keywords related to HWSN and challenges in these networks, such as limited energy and heterogeneous hardware. The goals of clustering protocols are then discussed, including load balancing, fault tolerance and energy efficiency. Various clustering methods, attributes and models are classified. Examples of heterogeneous resources, impacts and performance measures are provided. The document also lists relevant conferences, simulators and laboratories, and provides author details.
The document summarizes a student's M. Tech thesis project on improving routing protocols in wireless sensor networks. It begins with an objective to develop a hybrid routing protocol combining features of PEGASIS and LEACH to increase network lifetime. It then reviews related work on routing protocols and energy efficiency. The proposed methodology describes a hybrid protocol that selects cluster heads probabilistically like LEACH while forming chains to route data like PEGASIS. Simulation results show the hybrid protocol increases network lifetime to over 2000 rounds compared to 2000 rounds for previous work. The conclusion is that lower cluster head election probabilities in the hybrid protocol extend network lifetime. Future work could analyze different network parameters.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
This document discusses clustering techniques to analyze communication overhead in wireless sensor networks. It describes how clustering can help reduce energy consumption and traffic load by limiting redundant data transmission. The document compares the K-means and fuzzy clustering algorithms. The K-means algorithm partitions nodes into K clusters based on distance from cluster centers, while fuzzy clustering allows nodes to belong to multiple clusters. A simulation found that fuzzy clustering results in lower communication overhead than K-means as node velocity increases, helping to increase network lifetime.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document outlines various clustering protocols for heterogeneous wireless sensor networks (HWSN). It begins by defining keywords related to HWSN and challenges in these networks, such as limited energy and heterogeneous hardware. The goals of clustering protocols are then discussed, including load balancing, fault tolerance and energy efficiency. Various clustering methods, attributes and models are classified. Examples of heterogeneous resources, impacts and performance measures are provided. The document also lists relevant conferences, simulators and laboratories, and provides author details.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
A seminar report on data aggregation in wireless sensor networkspraveen369
This document summarizes a seminar report on data aggregation in wireless sensor networks. It discusses the goals of improving energy efficiency and network lifetime through data aggregation. It provides an overview of different data aggregation approaches, including in-network aggregation, tree-based approaches, and cluster-based approaches. It also discusses query processing and security challenges in wireless sensor networks.
This document summarizes a survey on wireless sensor network lifetime constraints. It discusses how sensor node energy consumption affects network lifetime and the role of routing protocols in extending lifespan. Generic energy consumption includes reception, transmission, and sensing. Deployment strategies like deterministic grids can balance energy usage to prolong network lifetime. Routing protocols aim to minimize transmissions and optimize paths to reduce energy costs.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network.
Each node consists of processing capability, may contain multiple types of memory, have a RF
transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion.
Routing protocols for wireless sensor networks are responsible for maintaining the routes in the
network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to
the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed
for Wireless Sensor Network.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Routing protocol on wireless sensor networkshashankcsnits
The document summarizes routing protocols for wireless sensor networks. It first defines wireless sensor networks and describes their key characteristics. It then surveys traditional routing techniques like flooding and gossiping, as well as current techniques including flat routing protocols like SPIN and directed diffusion, hierarchical routing protocols like LEACH and PEGASIS, and location-based routing protocols like GEAR. For each protocol, it provides a brief overview of how it works and compares their advantages and disadvantages. In conclusion, it states that hierarchical routing protocols generally outperform flat routing protocols, and references several papers on sensor network routing.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
Design & optimization of LNG-CNG cylinder for optimum weightijsrd.com
In current automobile sector, the weight of the vehicle is too important to increase the efficiency of the vehicle. There are too many component or subassemblies are in the automobile vehicle. In this paper the weight of the HYDROGEN fuel tank is optimized by applying the composite material concept with the existing material of the fuel tank. Initially the dimensional calculation for the existing pressure vessel and compare with the existing cylinder and then the FEA ( Finite Element Analysis) applied on the cylinder and material optimize up to the stress reaching equivalent to the stress of the existing cylinder. After that the dimension of the cylinder are finalize. The analysis yields a weight reduction of fuel tank.
Fault Injection Approach for Network on Chipijsrd.com
Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity in NoC architectures, there is the need of accurate test solution which allows evaluating the fault tolerance capability of NoCs. Presents an innovative test architecture based on a dual-processor system which is able to extensively test mesh based NoCs. The proposed solution improves previously developed methods since it is based on a NoC physical implementation which allows investigating the effects induced by several kind of faults thanks to the execution of on-line fault injection within all the network interface and router resources during NoC run-time operations. The solution has been physically implemented on an FPGA platform using a NoC emulation model adopting standard communication protocols. The obtained results demonstrated the effectiveness of the developed solution in term of testability and diagnostic capabilities and make our solutions suitable for testing large scale.
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databasesijsrd.com
This document discusses semantic conflicts that can occur when integrating fuzzy relational databases and proposes a methodology for resolving these conflicts. It identifies five new types of conflicts specific to fuzzy databases: membership degree conflicts, inconsistent attribute values, missing attributes, missing fuzzy attribute values, and attribute domain conflicts. The methodology resolves these conflicts in a specific order to minimize the time needed for integration. It aims to resolve fuzzy database conflicts within the context of resolving other general integration conflicts.
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...ijsrd.com
Wireless Sensor Network (WSN) applications have increased in recent times in fields such as environmental sensing, area monitoring, air pollution monitoring, forest res detection, machine health monitoring, and landslide detection. In such applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism is the most preferred one. Hence, to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering. In most of the WSN designs based on clustering, Base Station (BS) is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. Critical applications like these cannot afford to have BS failure as it is a gateway from sensor networks to the outside world. In order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
A seminar report on data aggregation in wireless sensor networkspraveen369
This document summarizes a seminar report on data aggregation in wireless sensor networks. It discusses the goals of improving energy efficiency and network lifetime through data aggregation. It provides an overview of different data aggregation approaches, including in-network aggregation, tree-based approaches, and cluster-based approaches. It also discusses query processing and security challenges in wireless sensor networks.
This document summarizes a survey on wireless sensor network lifetime constraints. It discusses how sensor node energy consumption affects network lifetime and the role of routing protocols in extending lifespan. Generic energy consumption includes reception, transmission, and sensing. Deployment strategies like deterministic grids can balance energy usage to prolong network lifetime. Routing protocols aim to minimize transmissions and optimize paths to reduce energy costs.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network.
Each node consists of processing capability, may contain multiple types of memory, have a RF
transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion.
Routing protocols for wireless sensor networks are responsible for maintaining the routes in the
network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to
the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed
for Wireless Sensor Network.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Routing protocol on wireless sensor networkshashankcsnits
The document summarizes routing protocols for wireless sensor networks. It first defines wireless sensor networks and describes their key characteristics. It then surveys traditional routing techniques like flooding and gossiping, as well as current techniques including flat routing protocols like SPIN and directed diffusion, hierarchical routing protocols like LEACH and PEGASIS, and location-based routing protocols like GEAR. For each protocol, it provides a brief overview of how it works and compares their advantages and disadvantages. In conclusion, it states that hierarchical routing protocols generally outperform flat routing protocols, and references several papers on sensor network routing.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
Design & optimization of LNG-CNG cylinder for optimum weightijsrd.com
In current automobile sector, the weight of the vehicle is too important to increase the efficiency of the vehicle. There are too many component or subassemblies are in the automobile vehicle. In this paper the weight of the HYDROGEN fuel tank is optimized by applying the composite material concept with the existing material of the fuel tank. Initially the dimensional calculation for the existing pressure vessel and compare with the existing cylinder and then the FEA ( Finite Element Analysis) applied on the cylinder and material optimize up to the stress reaching equivalent to the stress of the existing cylinder. After that the dimension of the cylinder are finalize. The analysis yields a weight reduction of fuel tank.
Fault Injection Approach for Network on Chipijsrd.com
Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity in NoC architectures, there is the need of accurate test solution which allows evaluating the fault tolerance capability of NoCs. Presents an innovative test architecture based on a dual-processor system which is able to extensively test mesh based NoCs. The proposed solution improves previously developed methods since it is based on a NoC physical implementation which allows investigating the effects induced by several kind of faults thanks to the execution of on-line fault injection within all the network interface and router resources during NoC run-time operations. The solution has been physically implemented on an FPGA platform using a NoC emulation model adopting standard communication protocols. The obtained results demonstrated the effectiveness of the developed solution in term of testability and diagnostic capabilities and make our solutions suitable for testing large scale.
Semantic Conflicts and Solutions in Integration of Fuzzy Relational Databasesijsrd.com
This document discusses semantic conflicts that can occur when integrating fuzzy relational databases and proposes a methodology for resolving these conflicts. It identifies five new types of conflicts specific to fuzzy databases: membership degree conflicts, inconsistent attribute values, missing attributes, missing fuzzy attribute values, and attribute domain conflicts. The methodology resolves these conflicts in a specific order to minimize the time needed for integration. It aims to resolve fuzzy database conflicts within the context of resolving other general integration conflicts.
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...ijsrd.com
Wireless Sensor Network (WSN) applications have increased in recent times in fields such as environmental sensing, area monitoring, air pollution monitoring, forest res detection, machine health monitoring, and landslide detection. In such applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism is the most preferred one. Hence, to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering. In most of the WSN designs based on clustering, Base Station (BS) is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. Critical applications like these cannot afford to have BS failure as it is a gateway from sensor networks to the outside world. In order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
SQL injection attack is the most common and difficult to handle attacks now days. SQL injection attack is of five types. In these paper details of SQL injection is mentioned.
Study on Flexural Behaviour of Activated Fly Ash Concreteijsrd.com
Cement concrete is the most widely used construction material in many infrastructure projects. The development and use of mineral admixture for cement replacement is growing in construction industry mainly due to the consideration of cost saving, energy saving, environmental production and conservation of resources. Present study is aimed at replacing cement in concrete with activated fly ash. The paper highlights the chemical activation of low calcium fly ash. Today activation of fly ash is playing an important role for enhancing the effectiveness of fly ash and accelerating the pozzolanic properties of fly ash. Activated fly ash certainly improves the early age strength and durability of concrete and corrosion tolerance. Many methods such as mechanical (physical), thermal and chemical activation are in use to activate the fly ash. The chemical activation is one of the easiest methods where fly ash can be activated by alkaline activators (i.e. alkaline solutions of high alkaline concentration chemicals like gypsum, sodium silicate and calcium oxide, KOH, etc.), which enhances the effectiveness of fly ash by disintegrating the glassy layer of fly ash molecules in cement concrete, thereby increasing its corrosion resistance. In the present dissertation, quality of fly ash is improved by chemical treatment by using chemical activators. The mechanical properties like compressive strength, split tensile strength, flexural strength of activated fly ash concrete and flexural strength of activated fly ash reinforced concrete beams are studied. For this project work, the chemicals like sodium silicate, calcium oxide are used to activate the fly ash in the ratio 1:8.
A Report on Prevalence, Abundance and Intensity of Fish Parasites in Cat Fish...ijsrd.com
The present investigation was on occurrence on different Parasite founds in 38 different cat fishes of River Siang. The present study on helminth parasite of cat fisheswith respect to length and weight revealed that Cestode infection was the highest in all fish sample of the fish species. The high worm burden was located in the gut mainly the intestine of the fish. Also some eggs were detected in the liver of two host fishes. In this study 38 specimen fishes were examined which contained both male and female specimens. Wallagoattuspecimen shows highest prevalence of about 100% than the other cat fishes specimens.
Power Transient Response of EDFA as a function of Wavelength in the scenario ...ijsrd.com
In this paper power transient is investigated as function of add/drop wavelength and surviving channel wavelength. We have reported that power excursions varies with different wavelength allocations of the add/drop channels. Transient response is reduced by 73.39% in case when add/drop channels are taken in L band instead of C band. Also power transient response is calculated as a function of wavelengths of surviving channel. It has been observed that at higher wavelengths power excursions are less than at shorter wavelengths of C band.
A Review on optimization of Dry Electro Discharge Machining Process Parametersijsrd.com
This document reviews optimization of dry electric discharge machining (EDM) process parameters. It discusses how dry EDM replaces liquid dielectric with gas, improving environmental friendliness. The literature review examines studies on how factors like voltage, current, and gas pressure affect material removal rate, surface roughness, and tool wear rate. Response surface methodology and algorithms like NSGA-II and genetic algorithms have been used to develop models and optimize the conflicting objectives of maximizing material removal rate while minimizing surface roughness. Overall, the document provides an overview of dry EDM optimization research aimed at improving process performance and efficiency.
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...ijsrd.com
The Aim of this paper to define need to improve C.B.R value of subgrade in saline condition in black cotton soil. Expansive soil have tremendous strength but it become very soft when it getting wet, It expands/swell due to its mineralogical composition during its wet condition, It creates cracks or consolidated when it is dry. The stability and performance of the pavements are greatly influenced by the sub grade and embankment as they serve as foundations for pavements. Expansive soils can be found on almost all the continents on the Earth. Destructive results caused by this type of soils have been reported in many countries. The Saline soils have excessive concentration of natural soluble salts, mainly of chlorides, sulphates and carbonates of calcium, magnesium and sodium. The magnesium in magnesium chloride may react with the cement paste in concrete, weakening the pavement structure. Rutting or Pot holing in granular Pavement & Differential shape resulting in rough pavement. Both Expansion and Salinity influences pavement failure due to failure in sub grade so it is required to detail study on stabilization of black cotton soil. Flexible Pavement design is based on C.B.R value and m.s.a value. If value of C.B.R is low than thickness of material is going to increase hence for economical thickness need to improve C.B.R value where it is low.
A Review on Laser marking by Nd-Yag Laser and Fiber Laserijsrd.com
Laser marking provides a unique combination of speed, permanence and versatility. Laser engraving is a manufacturing method for those applications where previously Electrical Discharge Machining (EDM) was the only choice. Laser engraving technology removes material layer-by-layer and the thickness of layers is usually in the range of few microns. Also there is many types of laser machines are available in recent time. Therefore for Optimum Use of Laser energy it is necessary to optimum use of process parameters to get best marking speed, Quality. This review paper presents various important works on Laser marking and its parameters i.e. Width, Depth, Contrast of Marking.
Analysis of Heat Transfer in Spiral Plate Heat Exchanger Using Experimental a...ijsrd.com
Heat transfer is the key to several processes in industrial application. In a present days maximum efficient heat transfer equipment are in demand due to increasing energy cost. For achieving maximum heat transfer, the engineers are continuously upgrading their knowledge and skills by their past experience. Present work is a skip in the direction of demonstrating the use of the computational technique as a tool to substitute experimental techniques. For this purpose an experimental set up has been designed and developed. Analysis of heat transfer in spiral plate heat exchanger is performed and same Analysis of heat transfer in spiral plate heat exchanger can be done by commercially procurable computational fluid dynamic (CFD) using ANSYS CFX and validated based on this forecasting. Analysis has been carried out in parallel and counter flow with inward and outward direction for achieving maximum possible heat transfer. In this problem of heat transfer involved the condition where Reynolds number again and again varies as the fluid traverses inside the section of flow from inlet to exit, mass flow rate of working fluid is been modified with time. By more and more analysis and experimentation and systematic data degradation leads to the conclusion that the maximum heat transfer rates is obtained in case of the inward parallel flow configuration compared to all other counterparts, which observed to vary with small difference in each section. Furthermore, for the increase heat transfer rate in spiral plate heat exchanger is obtain by cascading system.
Implementation of Full Adder Cell Using High Performance CMOS Technologyijsrd.com
This document presents the design and implementation of a full adder cell using a high-performance CMOS technology to improve speed and reduce power consumption. It begins with an introduction to CMOS technology and enhancements. It then discusses the design and architecture of a traditional full adder before proposing a new design using CMOS transistors. Simulation results show the proposed design has lower power consumption of around 100 microwatts, a 35% reduction compared to the existing design. The document concludes that reducing supply voltage is an effective way to lower power dissipation for low-performance applications like sensor networks.
Lateral Load Analysis of Shear Wall and Concrete Braced Multi-Storeyed R.C Fr...ijsrd.com
Generally RC framed structures are designed without regards to structural action of masonry infill walls present. Masonry infill walls are widely used as partitions. These buildings are generally designed as framed structures without regard to structural action of masonry infill walls. They are considered as non- structural elements. RC frame building with open first storey is known as soft storey, which performs poorly during strong earthquake shaking. Past earthquakes are evident that collapses due to soft storeys are most often in RC buildings. In the soft storey, columns are severely stressed and unable to provide adequate shear resistance during the earthquake. . In this study, 3D analytical model of twelve storeyed buildings have been generated for different buildings Models and analyzed using structural analysis tool 'ETABS'. To study the effect of infill, ground soft, bare frame and models with ground soft having concrete core wall and shear walls and concrete bracings at different positions during earthquake; seismic analysis using both linear static, linear dynamic (response spectrum method) has been performed. The analytical model of the building includes all important components that influence the mass, strength, stiffness and deformability of the structure.
Synthesis & FPGA Implementation of UART IP Soft Coreijsrd.com
this paper presents synthesis and hardware implementation of fully functional Universal Asynchronous Receiver Transmitter Intellectual Property core using XILINX SPARTAN-3 XC3S400 series FPGA. The UART soft core module consists of a transmitter along with baud rate generator and a receiver module with false start bit detection features. This has been implemented using VERILOG hardware description language and synthesized using XILINX ISE development tools. All behavioral simulation of UART module performed using MODELSIM simulator. After successful FPGA implementation transmitter and receiver module was tested by connecting FPGA board with Hyper Terminal software via RS232 interface at a data speed of 9.6 kbps.
Mathematical Modeling 15kW Standard Induction Motor using MATLAB/SIMULINKijsrd.com
Electric motors and motor systems in industrial and infrastructure applications with pumps, fans and compressors in buildings are responsible for 45% of the world's total electricity consumption. New and existing technologies offer the potential to reduce the energy demand of motor systems across the global economy by 20% to 30% with short payback period. This paper addresses the impact of load modeling in particular induction motor. The objective of paper is to analyze the performance of 15kw standard induction motor and extraction of parameter such as stator resistance, rotor resistance, stator and rotor inductance, torque, speed.
Wear Behaviour of Mg Alloy Reinforced with Aluminium Oxide and Silicon Carbid...ijsrd.com
Light weight metals like magnesium and its alloys are in more use these days in automotive & aerospace industries. Magnesium based hybrid structures which are combinations of magnesium and another material like Aluminium can offer optimal technical performance due to the favorable strength-weight ratio. Materials with improved tribological properties have become the pre-requisite of advanced engineering design. Metal matrix composites (MMCs) exhibit a unified combination of good tribological properties and high toughness of the interior bulk metal when compared with monolithic materials. Stir processing, a microstructure modification technique, has emerged as one of the processes used for fabrication of MMCs. Commercial cast or wrought type Mg-Al-Zn AZ-series alloys, such as AZ91 9 wt.% Al and 1 wt.% Zn, have been widely used in automobiles or electronic appliances. Tribological performance of the fabricated composite will be investigated using pin-on-disc wear & friction monitor. In this paper, a novel approach of making hybrid preforms with two types of reinforcements, i.e., lowcost and different sized particles, for magnesium-based composites is planned. This paper investigates the wear behavior of magnesium alloy (similar to commercially available AZ91) based metal-matrix composites (MMCs) reinforced with Silicon Carbide (SiC) & Aluminium oxide (Al2O3) particulates during dry/wet sliding.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
This document summarizes a research paper that proposes a new routing protocol called U-LEACH for wireless sensor networks. U-LEACH aims to prolong the lifetime of sensor networks by uniformly distributing cluster head selection throughout the network, unlike the original LEACH protocol. It describes how LEACH works and its limitations in ensuring uniform cluster head distribution. The proposed U-LEACH protocol incorporates a Uniform Distribution Technique to select cluster heads in a way that ensures each sensor node is within transmission range of a cluster head, extending the overall network lifetime.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
This document summarizes a research paper that proposes an enhancement to the Improved Balanced LEACH (IB-LEACH) routing protocol for heterogeneous wireless sensor networks. The proposed enhancement stores residual energy from each routing round in an "energy bank" to increase network lifetime. It also enhances the ACTIVE_ROUTE_TIMEOUT parameter in the underlying AODV routing protocol. Simulation results using MATLAB show the proposed approach improves network lifetime compared to previous methods. The document provides background on wireless sensor networks, routing protocols, LEACH clustering, and IB-LEACH before detailing the proposed enhancement and simulation results.
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
The use of Wireless Sensor Networks (WSNs) is anticipated to bring lot of changes in data gathering, processing and dissemination for different environments and applications. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Prolonging the network lifetime depends on efficient management of sensing node energy resource. Energy consumption is therefore one of the most crucial design issues in WSN. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical routing protocols greatly minimize energy consumed in collecting and disseminating data. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. In this paper, we have discussed various energy efficient data aggregation protocols for sensor networks.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
- The document discusses the performance evaluation of an Ant Colony Optimization (ACO) based algorithm for wireless sensor networks with mobile sinks.
- It proposes using ACO along with rendezvous points and mobile sinks in a clustering protocol called Rendezvous LEACH (RZ LEACH) to optimize energy efficiency and network lifetime.
- Simulation results show that the ACO based RZ LEACH outperforms the original RZ LEACH protocol by prolonging the number of operational nodes and increasing average remaining energy in the network over time.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
The document summarizes an algorithm proposed to reduce energy consumption in wireless sensor networks using duty cycling and multi-hop routing. The key aspects of the algorithm are:
1) Layering the network environment based on size and identifying the optimal number of cluster heads in each layer.
2) Selecting the first layer closest to the sink as the "gateway layer" and stopping energy usage in half of these sensors to extend the network lifespan.
3) Using multi-hop routing whereby cluster heads send data to heads in the above layer until the gateway layer, which then sends to the static or mobile sink.
4) Simulation results showed the proposed algorithm performs better than LEACH and ELEACH in terms of
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
This document summarizes clustering techniques for wireless sensor networks. It discusses how clustering helps improve energy efficiency and network lifetime by organizing nodes into clusters with cluster heads. The document surveys several clustering algorithms, including LEACH, DEEC, SEP, HEED, LCA, LCA2, Max-Min D-Cluster algorithm, and weighted clustering algorithms like WCA. It describes how these algorithms elect cluster heads and organize nodes into clusters using different metrics and probabilities based on remaining energy levels or node connectivity. The document concludes that clustering is a key technique for extending network lifetime in wireless sensor networks.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
The document proposes a new method to increase the lifetime of wireless sensor networks. It divides the sensor network environment into two virtual layers based on distance from the base station. It then uses residual energy, distance from base station, and position in the layers as factors in selecting cluster heads. Simulations show the proposed method outperforms LEACH and ELEACH algorithms in both homogeneous and heterogeneous sensor energy environments.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which
makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
The document discusses energy efficient routing protocols for clustered wireless sensor networks. It provides an overview of wireless sensor networks and discusses how clustering is commonly used to improve energy efficiency and scalability. The document reviews several existing clustering-based routing protocols and analyzes their approaches for prolonging network lifetime by minimizing energy consumption in wireless sensor networks.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Clustering provides an effective method for
extending the lifetime of a wireless sensor network. Current
clustering methods selecting cluster heads with more residual
energy, and rotating cluster heads periodically to distribute the
energy consumption among nodes in each cluster. However,
they rarely consider the hot spot problem in multi hop sensor
networks. When cluster heads forward their data to the base
station, the cluster heads closer to the base station are heavily
burdened with traffic and tend to die much faster. To mitigate
the hot spot problem, we propose a Novel Energy Efficient
Unequal Clustering Routing (NEEUC) protocol. It uses residual
energy and groupsthe nodesinto clusters of unequal layers
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
1) The document discusses a proposed design for an intelligent refrigerator that leverages sensor technology and wireless communication to identify food items and order more through an internet connection when supplies are low.
2) Key aspects of the proposal include using RFID to uniquely identify each food item, storing item and usage data in an XML database, monitoring usage patterns to determine reordering needs, and executing orders through an online retailer using stored payment details.
3) Security and privacy concerns with such an internet-connected refrigerator are discussed, such as potential hacking of personal information or unauthorized device control. The proposal aims to minimize human interaction for household management.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
This document summarizes a review paper on performance and emission testing of a 4-stroke diesel engine using ethanol-diesel blends at different pressures. The paper reviews several previous studies that tested blends of 5-30% ethanol mixed with diesel fuel. The studies found that a 10-20% ethanol blend can improve brake thermal efficiency compared to pure diesel, while also reducing emissions like NOx and smoke. Higher ethanol blends required advancing the injection timing to allow the engine to run. Ethanol-diesel blends were found to have lower density, viscosity, pour point and higher flash point compared to pure diesel. Overall, ethanol shows potential as a renewable fuel to improve engine performance and reduce emissions when blended with diesel
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1955
I. INTRODUCTION
A. Wireless sensor networks
Efficient design, performance and implementation of
wireless sensor networks have become a hot area of research
in recent years, due to the vast potential of sensor networks
to enable applications that connect the physical world to the
virtual world. By networking large numbers of tiny sensor
nodes, it is possible to obtain data about physical
phenomena that was difficult or impossible to obtain in
more conventional ways. In the coming years, as advances
in micro-fabrication technology allow the cost of
manufacturing sensor nodes to continue to drop, increasing
deployments of wireless sensor networks are expected, with
the networks eventually growing to large numbers of nodes.
Potential applications for such large-scale wireless sensor
networks exist in a variety of fields, including medical
monitoring, environmental monitoring, surveillance, home
security, military operations, and industrial machine
monitoring.
Fig. 1 Sensor nodes scattered in a sensor field And the
Components of a single sensor node
(Source [1]).
B. Network model
1) The single hierarchy network model identical with
the one of LEACH with assumptions as follow
[21]:
2) All nodes are the same, static, and have enough
computing capacity to support different MAC
protocols and data processing.
3) The radio signal has identical energy attenuation in
all directions, and the wireless channel is
symmetric.
4) All nodes can communicate with each other and the
sink in single hop mode.
5) All nodes can be aware of their own residual
energy and adapt transmission power according to
communication distances.
6) Sinks are static, and with enough power supply.
7) Each node transmits data at given time slot. The
data sensed by adjacent nodes are correlative, so
the cluster head can fuse the collective data.
Fig. 2: Network Model
C. Energy model
Heinzelman et al. [1] used the first order radio model. To
transmit a k-bit data to a distance d, the radio hardware
energy consumption is:
Where Eelec is the factor of electronics energy consumption.
εfs and εmp are identical to the ones in receiver.
d0 is the reference distance between transmitter and
receiver, which is given by
To receive a k-bit data, the radio expends:
It is assumed that the sensed information is correlated,
thus cluster-head can always aggregate the data gathered
from its members into a single length-fixed packet. Cluster-
head aggregates k-bit data from n members to expend:
Where EDA is the factor of data aggregation
Based on Heterogeneity and Electing Probability of Nodes
Improvement in LEACH
Zaki Anwer1
Amandeep Kaur Brar2
1, 2
Punjabi University, Patiala
2. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1956
Fig. 3: First order radio model [1]
D. ROUTING PROTOCOLS IN WSNs
1) Flooding
Flooding [23] is an old routing mechanism that may also be
used in sensor networks. In flooding, a node sends out the
received data or the management packets to its neighbors by
broadcasting, unless a maximum number of hops for that
packet are reached or the destination of the packets is
arrived.
2) GOSSIPING
Gossiping protocol is an alternative to flooding mechanism.
In Gossiping [24], nodes can forward the incoming
data/packets to randomly selected neighbor node. Once a
gossiping node receives the messages, it can forward the
data back to that neighbor or to another one randomly
selected neighbor node. This technique assists in energy
conservation by randomization.
3) SPIN
SPIN (Sensor Protocols for Information via Negotiation)
[25] is a family of adaptive protocols for WSNs. Their
design goal is to avoid the drawbacks of flooding protocols
mentioned above by utilizing data negotiation and resource
adaptive algorithms.
4) Directed Diffusion
Directed diffusion [26] is another data dissemination and
aggregation protocol. It is a data-centric and application
aware routing protocol for WSNs. It aims at naming all data
generated by sensor nodes by attribute-value pairs. Directed
diffusion consists of several elements; first of all, naming;
where task descriptors, sent out by the sink, are named by
assigning attribute-value pairs.
5) PEGASIS
PEGASIS (Power-Efficient Gathering in Sensor Information
Systems) is a greedy chain-based power efficient algorithm
[29]. Also, PEGASIS is based on LEACH (the scenario and
the radio model in PEGASIS are the same as in LEACH).
6) GEAR
GEAR (Geographical and Energy Aware Routing) [30] is a
recursive data dissemination protocol WSNs. It uses energy
aware and geographically informed neighbor selection
heuristics to rout a packet to the targeted region. Within that
region, it uses a recursive a geographic informed mechanism
to disseminate the packet.
7) LEACH PROTOCOL
LEACH (Low Energy Adaptive Clustering Hierarchy) [27]
is a self-organizing, adaptive clustering-based protocol that
uses randomized rotation of cluster-heads to evenly
distribute the energy load among the sensor nodes in the
network.
LEACH based on two basic assumptions:
(a) base station is fixed and located far away from the
sensors, and
(b) all nodes in the network are homogeneous and energy
constrained.
The idea behind LEACH is to form clusters of the sensor
nodes depending on the received signal strength and use
local cluster heads as routers to route data to the base
station.
The key features of LEACH are:
1) Localized coordination and control for cluster set-
up and operation.
2) Randomized rotation of the cluster ”base stations”
or ”cluster-heads” and the corresponding clusters.
3) Local compression to reduce global
communication.
In LEACH, the operation is separated into fixed-length
rounds, where each round starts with a setup phase followed
by a steady-state phase. The duration of a round is
determined priori. LEACH algorithm works as follows:
1) Advertisement phase:
In this phase, nodes elect themselves to be a cluster-
heads for the current round (r) through a cluster-head
advertisement message. For this cluster-head
advertisement, the cluster heads use CSMA MAC
protocol. After the completion of this phase, and
depending on the received advertisement signal
strength; the non cluster-head nodes (their receivers
must be kept on during this phase to hear the
advertisements of all cluster-heads) determine the
cluster to which they will belong to for this current
round (r). At each round, a node n selects a random
number k that is between 0 and 1. If k is less than a
threshold T(n), then the node becomes a cluster-head
for the current round (r).
Where P is the desired percentage of cluster-heads, r
is the current round, and G is the set of nodes that
have not been cluster heads in the last 1/P rounds.
Since k is randomly selected, then the number of
cluster heads may not be fixed.
2) Cluster set-up phase: After each non-cluster-head
node will has decided to which cluster it belongs, it
informs the cluster-head node that it will be a
member of the cluster. So, each node transmits this
information back to the cluster head using CSMA
MAC protocol.
3) Schedule Creation phase: The cluster-head node
receives all the messages for nodes that would like to
be included in the cluster. Based on the number of
nodes in the cluster, the cluster-head node creates a
TDMA schedule telling each node when it can
transmit. This schedule is broadcast back to the nodes
in the cluster.
4) Data Transmission phase: After the creation of both
the clusters and the TDMA schedule
3. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1957
(TDMA is fixed), nodes in the cluster start
transmitting the data they already have during their
allocated transmission time to the cluster-head
(cluster-head node keeps its receiver on all the time to
receive the sent data). Once all the data (sent by
nodes in the cluster) have been received by the
cluster-head node, it will perform signal processing
function to compress the data into a single signal (the
steady-state operation of LEACH networks).
E. Heterogeneous Model for WSN
Nowadays, WSNs attracted lots of researchers because of its
potential wide applications and special challenges. For past
few years, wireless sensor networks mainly focused on
technologies based on the homogeneous wireless sensor
network in which all nodes have same system resource but
recently heterogeneous wireless sensor network is becoming
more and more popular and the results of researches show
that heterogeneous nodes can prolong network lifetime and
improve network reliability without significantly increasing
the cost.
1) Types of Heterogeneous Resources
The heterogeneous resources are basically divided into three
categories: computational heterogeneity, link heterogeneity,
and energy heterogeneity . Computational heterogeneity
means that the heterogeneous node has a more powerful
microprocessor or microcontroller and more storage
memory than the normal node. The sensor nodes with more
powerful computational resources can provide complex data
processing and long-term storage. Link heterogeneity means
that the heterogeneous node has high-bandwidth and long-
haul network transceiver (Ethernet or 802.11 networks) than
the normal node. Link heterogeneity can provide more
reliable data transmission. Therefore, the reliability of the
data transmission will increase by link heterogeneity.
Energy heterogeneity means that the heterogeneous node is
line powered, or its battery is replaceable.
Among above three categories of resource heterogeneity, the
energy heterogeneity is most important because both
computational heterogeneity and link heterogeneity will
consume more battery energy resource. If there is no energy
heterogeneity, computational heterogeneity and link
heterogeneity will bring negative impact to the sensor
network.
2) Impact of Heterogeneous Resources on WSNs
i) Response time: Computational heterogeneity can
decrease the processing latency and link
heterogeneity can decrease the waiting time, hence
response time is decreased.
ii) Lifetime: The average energy consumption will be
less in heterogeneous sensor networks for forwarding
a packet from the normal nodes to the sink, hence life
time is increased. Further, it is also known that if in a
network, heterogeneity is used properly then the
response of the network is tripled and the network’s
lifetime can be increased by 5fold (Yarvis 2005).
II. PROBLEM FORMULATION
A. PROBLEM WITH EXISTING PROTCOLS
There are so many existing protocols but LEACH (Low-
energy Adaptive Cluster Hierarchy) is considered in this
dissertation. The limitations of existing LEACH are found
and formulated in section 6.1.1.
B. PROBLEMS WITH LEACH
1) The time duration of the setup phase is non-
deterministic [3] and the collisions will cause the
time duration too long and hence the sensing
services are interrupted. Due to that Leach may be
unstable during the setup phase that depends on the
density of sensors.
2) Leach [4] is not applicable to networks that are
deployed in large region as it uses single hop
routing where each node can transmit directly to
the cluster head and the sink
3) The cluster heads [3] – [4] used in the LEACH will
consume a large amount of energy if they are
located farther away from the sink.
4) Leach [3] – [4] does not guarantee good cluster
head distribution and it involves the assumption of
uniform energy consumption for the cluster heads.
5) Leach uses dynamic clustering [5] which results in
extra overhead such as the head changes
,advertisement that reduces the energy
consumption gain
C. PROBLEMS WITH ENERGY LEACH
1) Energy leach is not applicable to the network
deployed in large region. Which clearly shows that
Energy leach is not scalable in nature and puts too
many area limitations on the sensor nodes?
2) Energy leach is based on dynamic clustering which
comes up with too many overheads.
3) The protocol assumes [7] that all the nodes brings
same amount of energy capacity in each election
round assuming that being a CH consumes
approximately the same amount of energy for each
node.
III. 7. PROBLEM STATEMENT
In heterogeneous sensor networks, certain nodes become
cluster heads which aggregate the data of their cluster nodes
and transfer it to the sink. An Improved Energy leach
protocol for cluster head selection in a hierarchically
clustered heterogeneous network to reorganize the network
topology efficiently is proposed in this research work. The
proposed algorithm will use thresholding to improve the
cluster head selection. The presented algorithm considers
the sensor nodes in wireless network and randomly
distributed in the heterogeneous network. The coordinates of
the sink and the dimensions of the sensor field are known in
prior.
This research work has proposed a new improved
Energy leach clustering heterogeneous network where the
advanced nodes elect themselves as cluster heads for the
increasing number of rounds based on their higher initial
energy relative to other nodes. However in existing work we
have found that the advance nodes has almost same
probability so which make the selection non-deterministic,
so to remove this problem we have modified the probability
function of the existing Energy leach to give more priorities
4. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1958
to advance nodes than normal nodes. The overall objective
is to extend the time when all the nodes are available (i.e.
Stability time of sensor networks).
Comparison of proposed algorithm is also drawn with
existing methods to evaluate the performance of proposed
algorithm.
IV. PERFORMANCE PARAMETERS
1) Stability Period: is the time interval from the start of
network operation until the death of the first sensor
node. We also refer to this period as “stable region.”
2) Instability Period: is the time interval from the death of
the first node until the death of the last sensor node.
We also refer to this period as “unstable region.”
3) Network lifetime: is the time interval from the start of
operation (of the sensor network) until the death of the
last alive node.
4) Number of alive (total, advanced and normal) nodes
per round: This instantaneous measure reflects the total
number of nodes and that of each type that has not yet
expended all of their energy.
5) Throughput: We measure the total rate of data sent
over the network, the rate of data sent from cluster
heads to the sink as well as the rate of data sent from
the nodes to their cluster heads.
V. RESEARCH METHODOLOGY
To attain the objective, step-by-step methodology is used in
this dissertation. To attain the objectives of this dissertation
a suitable algorithm will be proposed and design in
MATLAB. Different type of tests will be implemented using
improved algorithm to test various aspects of the Wireless
Sensor Network. Visualization of the experimental results
will be done and based upon the simulated results suitable
performance results will be drawn.
VI. RESULTS
The simulation has been done in MATLAB. Let us assume a
heterogeneous sensor network with 100 number of sensor
nodes are distributed randomly in the 100 x100 m2
area, as
shown in Figure 3, we denote a normal node with ‘o’, an
advanced node with ‘+’. The base station with ‘x’ is located
at point (50, 50). The values used in the first order radio
model are described in Table 1.
Parameters Values
Sensor Deployment area 100m*100m
Base Station Location 50m*50m
Number of nodes 100
Data packet size 4000 bits
Control packet size 100 bits
Initial energy of sensor 0.5 J
Electronics energy 50 nJ/bit
Free space factor ϵfs 10 pJ/bit/m2
Multipath factor ϵmp 0.0013 pJ/bit/m4
Table 1: Parameter values
The horizontal and vertical coordinates of each sensor are
randomly selected between 0 and maximum value of the
dimension. The size of the message that nodes send to their
cluster heads as well as the size of the (aggregate) message
that a cluster head sends to the base station is set to 50 bytes.
Fig. 4: Node Distribution in EX-LEACH
Lifetime is the criterion for evaluating the performance of
routing protocols in sensor networks. In this work, we
measure the lifetime in terms of the round when the first
node last node dies. We have simulated LEACH in the
presence of homogeneous parameters. Our proposed
protocol is simulated in the presence of different
heterogeneity parameters in the network. The results of
proposed and LEACH simulations are shown in Figure.5
Fig. 5: Dead nodes in LEACH AND EXLEACH
and normal nodes in LEACH and EX-LEACH
A detailed view of the behavior of LEACH and proposed
protocol is illustrated in fig. 5 for different distributions of
heterogeneity. Figure 5 shows that the first node die earlier
in case of LEACH after 803 rounds whereas last node
remain alive for 1388 rounds in LEACH to base station, and
in Proposed scheme the first node died after 867 rounds and
last nodes remain alive for 4106 rounds, which is more than
LEACH . This extended the lifetime and stability of network
system. On the other hand, Figure 6 shows the number of
messages received by the BS. Since in the proposed protocol
more number of alive nodes exists, therefore the packets
received by the proposed protocol is more over more
number of rounds.
Fig. 6: messages received by BS in case of LEACH and
messages received by BS case of EX-LEACH
Figure 6 shows the number of messages received by the BS.
Since in the Proposed protocol more number of alive nodes
exists, therefore the packets received by the Proposed
5. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1959
protocol is more over more number of rounds but in case of
existing LEACH protocol the lifetime of the network is less
than the proposed protocol and number of nodes alive is less
than the proposed protocol so the packets sent to BS is less.
VII. CONCLUSION
Wireless sensor network is a combination of wireless
communication and sensor nodes. The network should be
energy efficient with stability and longer lifetime. In this
paper, we have presented clustered heterogeneous wireless
sensor networks where more powerful sensor nodes act as
cluster heads for more number of rounds. The energy drain
rate of battery source is less in advance and super nodes as
compared to normal nodes in the system. Based upon the
simulation results, the proposed protocol has confirmed that
it provides a longer network lifetime as existing LEACH
protocol.
REFERENCES
[1] Heinzelman, Wendi Rabiner, Anantha Chandrakasan,
and Hari Balakrishnan. "Energy-efficient
communication protocol for wireless micro sensor
networks." In System Sciences, 2000. Proceedings of
the 33rd Annual Hawaii International Conference on,
pp. 10-pp. IEEE, 2000.
[2] Chang, Ruay-Shiung, and Chia-Jou Kuo. "An energy
efficient routing mechanism for wireless sensor
networks." In Advanced Information Networking and
Applications, 2006. AINA 2006. 20th International
Conference on, vol. 2, pp. 5-pp. IEEE, 2006.
[3] Xiangning, Fan, and Song Yulin. "Improvement on
LEACH protocol of wireless sensor network."
In Sensor Technologies and Applications, 2007. Sensor
Comm 2007. International Conference on, pp. 260-
264. IEEE, 2007.
[4] Liu, Yuhua, Yongfeng Zhao, and Jingju Gao. "A new
clustering mechanism based on LEACH protocol."
In Artificial Intelligence, 2009. JCAI'09. International
Joint Conference on, pp. 715-718. IEEE, 2009.
[5] Yang, Zhiming, Junyi Liu, and Xuhui Chen. "An
optimal mechanism of LEACH protocol for wireless
sensor networks." In Computing, Communication,
Control, and Management, 2009. CCCM 2009. ISECS
International Colloquium on, vol. 4, pp. 254-257.
IEEE, 2009.
[6] Gengsheng, Zheng, and Hu Zhengbing. "A Clustering
Protocol Based on the Probability Fading Strategy in
WSNs." In Information Engineering and Computer
Science, 2009. ICIECS 2009. International Conference
on, pp. 1-4. IEEE, 2009.
[7] Han, Li. "LEACH-HPR: An energy efficient routing
algorithm for Heterogeneous WSN." In Intelligent
Computing and Intelligent Systems (ICIS), 2010 IEEE
International Conference on, vol. 2, pp. 507-511.
IEEE, 2010.
[8] Guo, Yinghui, Yun Liu, Zhenjiang Zhang, and Fei
Ding. "Study on the energy efficiency based on
improved LEACH in wireless sensor networks." In
Informatics in Control, Automation and Robotics
(CAR), 2010 2nd International Asia Conference on,
vol. 3, pp. 388-390. IEEE, 2010.
[9] Huang, Ying, and Cong Huang. "Cluster algorithm for
electing cluster heads based on threshold energy."
In Electrical and Control Engineering (ICECE), 2010
International Conference on, pp. 2692-2695. IEEE,
2010.
[10] Melese, Desalegn Getachew, Huagang Xiong, and
Qiang Gao. "Consumed energy as a factor for cluster
head selection in wireless sensor networks." In
Wireless Communications Networking and Mobile
Computing (WiCOM), 2010 6th International
Conference on, pp. 1-4. IEEE, 2010.
[11] Wang, Linlin, Jie Liu, and Wei Wang. "An
improvement and simulation of leach protocol for
wireless sensor network." In Pervasive Computing
Signal Processing and Applications (PCSPA), 2010
First International Conference on, pp. 444-447. IEEE,
2010.
[12] Tao, Lu, Zhu Qing-Xin, and Zhang Luqiao. "An
improvement for LEACH algorithm in wireless sensor
network." In Industrial Electronics and Applications
(ICIEA), 2010 the 5th IEEE Conference on, pp. 1811-
1814. IEEE, 2010.
[13] Dahnil, Dahlila P., Yaswant P. Singh, and Chin Kuan
Ho. "Energy-efficient cluster formation in
heterogeneous Wireless Sensor Networks: A
comparative study." In Advanced Communication
Technology (ICACT), 2011 13th International
Conference on, pp. 746-751. IEEE, 2011.
[14] Katiyar, Vivek, Narottam Chand, Gopal Chand
Gautam, and Anil Kumar. "Improvement in LEACH
protocol for large-scale wireless sensor networks." In
Emerging Trends in Electrical and Computer
Technology (ICETECT), 2011 International
Conference on, pp. 1070-1075. IEEE, 2011.
[15] Li, Chenmin, Guoping Tan, Jingyu Wu, Zhen Zhang,
and Lizhong Xu. "Analyzing cluster-head selection
mechanisms and improving the LEACH."
In Electronics, Communications and Control (ICECC),
2011 International Conference on, pp. 747-750. IEEE,
2011.
[16] Shujiang, Li, Du Kuan, and Kong Lixin. "Improvement
and simulation of clustering routing algorithm in
wireless sensor network." In Industrial Electronics and
Applications (ICIEA), 2011 6th IEEE Conference on,
pp. 1068-1073. IEEE, 2011.
[17] Lu, Yingqi, Du Zhang, Ya Chen, Xiao Liu, and Ping
Zong. "Improvement of LEACH in Wireless Sensor
Networks based on balanced energy strategy." In
information and Automation (ICIA), 2012
International Conference on, pp. 111-115. IEEE, 2012.
[18] Chen, Guijun, Xueying Zhang, Jun Yu, and Maofeng
Wang. "An improved LEACH algorithm based on
heterogeneous energy of nodes in wireless sensor
networks." In Computing, Measurement, Control and
Sensor Network
(CMCSN), 2012 International Conference on, pp. 101-
104. IEEE, 2012.
[19] Lindsey, Stephanie, and Cauligi S. Raghavendra.
"PEGASIS: Power-efficient gathering in sensor
information systems." In Aerospace conference
6. Based On Heterogeneity and Electing Probability of Nodes Improvement in LEACH
(IJSRD/Vol. 1/Issue 9/2013/0065)
All rights reserved by www.ijsrd.com 1960
proceedings, 2002. IEEE, vol. 3, pp. 3-1125. IEEE,
2002.
[20] Kraus, Sarit, Roni Parshani, and Yuval Shavitt. "A
study on gossiping in transportation
networks." Vehicular Technology, IEEE Transactions
on 57, no. 4 (2008): 2602-2607.