SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Minimizing Radio Resource Usage for Machine-to-Machine Communications through
Data-Centric Clustering
ABSTRACT
While clustered communication has been considered as one key technology for wireless
sensor networks, existing work on cluster formation predominantly takes a pure graph theoretic
approach with the goal of optimizing the performance of individual machines. Since the radio
resource available for M2M communications. the proposed algorithm, cluster formation is an
NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a
reasonably good cluster structure without incurring prohibitive computation complexity.
EXISTING SYSTEM
Work on cluster formation predominantly takes a pure graph theoretic approach with the
goal of optimizing the performance of individual machines. Since the radio resource available for
M2Mcommunications is typically limited yet the amount of data to transport is large, such
“resource-agnostic” and “data-agnostic” clustering techniques could lead to sub-optimal
performance. To address this problem, we propose “data-centric” clustering in a resource-
constrained M2M network by prioritizing the quality of overall data over the performance of
individual machines.
DISADVANTAGES
1. It has been envisioned that a huge amount of machines will be installed and inter-
connected in the near future to facilitate better living experiences for human beings
through various M2M (machine-to-machine) applications such as home automation,
neighborhood surveillance, intelligent transportation, and smart energy.
2. Different from conventional wireless sensor networks (WSNs), in many of these M2M
applications machines are not necessarily limited in the form factor.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM
While power control can be optimally solved for any given cluster structure by the
proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime,
guided, stochastic search algorithm to find a reasonably good cluster structure without incurring
prohibitive computation complexity. Compared with baseline approaches, our evaluation results
show that data-centric clustering can achieve noticeable performance gain by select in only
important machines and forming a cluster structure that can balance the radio resource usage of
the two tiers. We there for motivate data-centric clustering as a promising communication model
for resource-constrained M2M networks.
ADVANTAGES
1. densely distributed machines with high aggregate data rate, one promising approach for
overcoming the problem of radio resource scarcity is to leverage spatial reuse by
grouping machines into clusters.
2. The random access channel (RACH) when a large number of machines need to access
the network in a short burst. While these endeavors can potentially alleviate the
performance bottleneck by exploiting the delay tolerant nature of the target M2M
applications, the proposed solutions still fall short for many M2M applications involving
a considerable volume of real-time data to transport .
MODULES
1. problem formulation
2. performance evaluation
3. cluster formation sub-problem
ARCHITECTURE
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM CONFIGURATION
HARDWARE CONFIGURATION
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION
 Operating System - Windows Family
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Programming Language - JAVA
 Java Version - JDK 1.6 & above.

More Related Content

Viewers also liked

Educación social pp
Educación social ppEducación social pp
Educación social pp
Uxue2611
 
TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50TOTVS Connect
 
Homicidio doloso - Febrero
Homicidio doloso - FebreroHomicidio doloso - Febrero
Homicidio doloso - FebreroConsejo Cívico
 
Informe de práctica
Informe de práctica Informe de práctica
Informe de práctica
Maritzel González
 
Manejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabéticaManejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabética
Braulio Enrique Aguilar Zacarías
 
MRMyersResume2016-07-18
MRMyersResume2016-07-18MRMyersResume2016-07-18
MRMyersResume2016-07-18Michael Myers
 
Roteiro 2 provas da rematerialização
Roteiro 2   provas da rematerializaçãoRoteiro 2   provas da rematerialização
Roteiro 2 provas da rematerialização
Bruno Cechinel Filho
 
Educación social
Educación socialEducación social
Educación social
aliciacentella
 
Novidades 11.80 materiais
Novidades 11.80   materiaisNovidades 11.80   materiais
Novidades 11.80 materiais
TOTVS Connect
 
Roteiro 2 mediunidade e médium
Roteiro 2   mediunidade e médiumRoteiro 2   mediunidade e médium
Roteiro 2 mediunidade e médium
Bruno Cechinel Filho
 
Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.
Daniela Fierro Muñoz
 
Історія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мовіІсторія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мові
Alina Kapitula
 
презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*
Alina Kapitula
 

Viewers also liked (16)

62 1231 la contienda
62 1231 la contienda62 1231 la contienda
62 1231 la contienda
 
55 0119 josué el gran guerrero
55 0119 josué el gran guerrero55 0119 josué el gran guerrero
55 0119 josué el gran guerrero
 
Educación social pp
Educación social ppEducación social pp
Educación social pp
 
TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50TOTVS Gestão Fiscal - Apuração migrado 11.50
TOTVS Gestão Fiscal - Apuração migrado 11.50
 
Homicidio doloso - Febrero
Homicidio doloso - FebreroHomicidio doloso - Febrero
Homicidio doloso - Febrero
 
Informe de práctica
Informe de práctica Informe de práctica
Informe de práctica
 
61 0402 el verdadero sello de la pascua
61 0402 el verdadero sello de la pascua61 0402 el verdadero sello de la pascua
61 0402 el verdadero sello de la pascua
 
Manejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabéticaManejo del paciente diabético y nefropatía diabética
Manejo del paciente diabético y nefropatía diabética
 
MRMyersResume2016-07-18
MRMyersResume2016-07-18MRMyersResume2016-07-18
MRMyersResume2016-07-18
 
Roteiro 2 provas da rematerialização
Roteiro 2   provas da rematerializaçãoRoteiro 2   provas da rematerialização
Roteiro 2 provas da rematerialização
 
Educación social
Educación socialEducación social
Educación social
 
Novidades 11.80 materiais
Novidades 11.80   materiaisNovidades 11.80   materiais
Novidades 11.80 materiais
 
Roteiro 2 mediunidade e médium
Roteiro 2   mediunidade e médiumRoteiro 2   mediunidade e médium
Roteiro 2 mediunidade e médium
 
Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.Ley de-infancia-y-adolescencia.
Ley de-infancia-y-adolescencia.
 
Історія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мовіІсторія американської дитячої літератури на англ. мові
Історія американської дитячої літератури на англ. мові
 
презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*презентація до уроку *Про що розповіли незабудки*
презентація до уроку *Про що розповіли незабудки*
 

Similar to Minimizing radio resource usage for machine to-machine communications through data-centric clustering

Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
Shakas Technologies
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Shakas Technologies
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Shakas Technologies
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
Shakas Technologies
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networks
Shakas Technologies
 
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
I3E Technologies
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
Shakas Technologies
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
Shakas Technologies
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
Hari Krishnan
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
Vipin Jacob
 
An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...
Shakas Technologies
 
Ieee 2014 2014 .net project titles
Ieee 2014 2014 .net  project titlesIeee 2014 2014 .net  project titles
Ieee 2014 2014 .net project titles
Nandha Kumar
 
Clustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clustersClustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clusters
Shakas Technologies
 
A fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor networkA fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor network
Shakas Technologies
 
Universal network coding based opportunistic routing for
Universal network coding based opportunistic routing forUniversal network coding based opportunistic routing for
Universal network coding based opportunistic routing for
Shakas Technologies
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
Shakas Technologies
 
Data aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networksData aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networks
Shakas Technologies
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Shakas Technologies
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Shakas Technologies
 
Real time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation systemReal time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation system
Shakas Technologies
 

Similar to Minimizing radio resource usage for machine to-machine communications through data-centric clustering (20)

Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networks
 
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
STATISTICAL DISSEMINATION CONTROL IN LARGE MACHINE-TO-MACHINE COMMUNICATION N...
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...
 
Ieee 2014 2014 .net project titles
Ieee 2014 2014 .net  project titlesIeee 2014 2014 .net  project titles
Ieee 2014 2014 .net project titles
 
Clustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clustersClustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clusters
 
A fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor networkA fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor network
 
Universal network coding based opportunistic routing for
Universal network coding based opportunistic routing forUniversal network coding based opportunistic routing for
Universal network coding based opportunistic routing for
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Data aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networksData aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networks
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Real time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation systemReal time path planning based on hybrid-vanet-enhanced transportation system
Real time path planning based on hybrid-vanet-enhanced transportation system
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Minimizing radio resource usage for machine to-machine communications through data-centric clustering

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering ABSTRACT While clustered communication has been considered as one key technology for wireless sensor networks, existing work on cluster formation predominantly takes a pure graph theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2M communications. the proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a reasonably good cluster structure without incurring prohibitive computation complexity. EXISTING SYSTEM Work on cluster formation predominantly takes a pure graph theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2Mcommunications is typically limited yet the amount of data to transport is large, such “resource-agnostic” and “data-agnostic” clustering techniques could lead to sub-optimal performance. To address this problem, we propose “data-centric” clustering in a resource- constrained M2M network by prioritizing the quality of overall data over the performance of individual machines. DISADVANTAGES 1. It has been envisioned that a huge amount of machines will be installed and inter- connected in the near future to facilitate better living experiences for human beings through various M2M (machine-to-machine) applications such as home automation, neighborhood surveillance, intelligent transportation, and smart energy. 2. Different from conventional wireless sensor networks (WSNs), in many of these M2M applications machines are not necessarily limited in the form factor.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM While power control can be optimally solved for any given cluster structure by the proposed algorithm, cluster formation is an NP-hard problem. Hence, we propose an anytime, guided, stochastic search algorithm to find a reasonably good cluster structure without incurring prohibitive computation complexity. Compared with baseline approaches, our evaluation results show that data-centric clustering can achieve noticeable performance gain by select in only important machines and forming a cluster structure that can balance the radio resource usage of the two tiers. We there for motivate data-centric clustering as a promising communication model for resource-constrained M2M networks. ADVANTAGES 1. densely distributed machines with high aggregate data rate, one promising approach for overcoming the problem of radio resource scarcity is to leverage spatial reuse by grouping machines into clusters. 2. The random access channel (RACH) when a large number of machines need to access the network in a short burst. While these endeavors can potentially alleviate the performance bottleneck by exploiting the delay tolerant nature of the target M2M applications, the proposed solutions still fall short for many M2M applications involving a considerable volume of real-time data to transport . MODULES 1. problem formulation 2. performance evaluation 3. cluster formation sub-problem ARCHITECTURE
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM CONFIGURATION HARDWARE CONFIGURATION  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION  Operating System - Windows Family
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Programming Language - JAVA  Java Version - JDK 1.6 & above.