SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org
Page | 59
Paper Publications
Sensor Deployment Algorithm for Hole
Detection and Healing By Using Local Healing
Rini Baby N
M.G University, Kottayam, Kerala, India
Abstract: The main services provided by a WSN (wireless sensor network) is monitoring a particular region ie, RoI
or specified region. The emergence of hole in that particular region is unavoidable. Due to some environmental
factors, Random deployment and external attacks etc. In this work hole detection and hole healing process are
discussed .Here show that heal deals with some virtual forces. According to the size of hole and also to improve the
coverage area and need more energy efficient process.
Keywords: wireless sensor network, Hole identification, Hole detection, RoI.
I. INTRODUCTION
A WSN is based on small sensors which are capable of sensing or monitoring a particular region .These sensors are
communicating with each other. These small sensors are deployed in the target location for sensing that area. Due to the
random deployment or sudden shock or external attack these sensors become failure. And thus occur the absence of
sensors. Such that a particular area could be monitored. Due to this anomalies resulting the formation of different kinds
holes. Such as coverage holes, routing holes etc. Here taken a large bounded hole such that the area not covered by any
node. The important challenge that need to be overcome by WSN are the coverage as well as the energy consumption and
the limited battery life. Sensing and communicating are the two task that a node perform. The nodes are able to
communicate with the neighbours such that a packet from a source can reach its destination if there are no holes present.
If the event that occurring the holes neither detected or if not reported there will be a coverage problem occurred. So we
promote a self organizing mechanism to detect and to recover the presence of hole in our network. This is the main task of
our network. For this process there are several steps regarding to the detection and healing. Healing is not an algorithm
it’s a usual steps together through these process called as healing. The need of a complete solution together called hole
detection and healing (HEAL) that may in most effective manner. Also this avoid the drawbacks of the previous works.
The sensor deployment algorithm for hole detection and healing by using local handling is the solution which is a
distributed and localized algorithm ,that can carried out in two phases. The first phase consist of three steps: Hole
Identification, Hole discovery and border detection. The second phase consist of the healing process. And also improve
the coverage area and become more energy efficient such that energy level of each and every node is improved. So that
the nodes life time is dramatically increased. During the healing process is done had given a more power or a penetration.
Power to avoid the obstacles such as walls or buildings that present in that particular environment. So that it can increase
the coverage area also at the end of the deployments of the nodes no nodes is present in the obstacles. For evaluating the
HEAL can compare with others. According to the movement, Coverage area and the total distance travelled for
comparison here use the DSSA and SMART algorithm. And also consider a large number of nodes having large holes.
For calculating the radius or size of hole global operations are done in olden days .Now by using some rules it can
calculate easily.
II. THE PROBLEM DEFINITION
Different types of holes and various characteristic of holes are occurred. Such that during the normal operation of the
network a great loss occurred.eg:the several holes will made a network inactive or ineffective. A single hole makes the
whole network damage or make it not such an effective manner. Before the proposed method make these following
assumptions:
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org
Page | 60
Paper Publications
1. Consider a dense mobile WSN having more number of sensors that are deployed in an area having some obstacles.
2. The deployment may be random or not.
3. All the nodes be homogeneous.
4. The location information are available through GPS system.
5. Consider a sensing model ask the sensor range,Rc the communication range .And also Rc≥ 2Rs because inorder to
ensure the TENT rate.
III. PROPOSED SYSTEM
In this ,propose HEAL, it’s a localized and distributed hole healing algorithm as opposed to the centralised approach and
it is related to a distributed system. For the complete work it should follow the following criteria.
1. Determining the boundary of the area.
2. Detecting the coverage area of the hole and also its character.
3. Determine the target nodes and also extra penetration power is needed to given for each node.
4. Relocate each node according to the target with minimum moving and messaging cost. Such as to increase the life time
of a node.
IV. SENSOR DEPLOYMENT
For the construction of this project design domain NS2. And having some system requirements: For hardware of
processor with Pentium 111 and speed of 1.5GHz with memory (RAM) 256MB,harddisk of 40GB is needed. The
software used is the operating system is linux and TIL scripting language .And this can be operated in a virtual machine
box.The sensor nodes are deployed over some region or area for the phenomenon that are should be monitored. Here each
and every node in the WSN maintains the details of the neighbour node.
V. HOLE IDENTIFICATION
This process is comes under the hole detection. Such that, when only the hole identification is done process is initiated.
The hole existence of a hole which is done by identifying the stuck node which are the boundaries of a hole.In order to
find out the stuck node executes TENT rule. To identify stuck node must assess the existence of a hole such that by
executing TENT rule. So can check whether the node p is a stuck node by the following steps. If no angle spanned by a
pair of adjacent neighbour greater than 2Ď€/3 is not a stuck node.
1. For each p,order all of its neighbours in counter clockwise.
2. For each adjacent pairs (u,v) draw a perpendicular bisector of the two edges with p(u,v)(v,p).
3. They intersect at a centre o. If o is in communication range of p, then no black region (ie; all are in communication
range), So p cannot be stuck in the direction upv.
Fig 1: p is strongly stuck node
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org
Page | 61
Paper Publications
A node is strong stuck if it has at least one stuck angle. And if angle upv is <120 degrees ,p cannot be stuck (the point
black region disappears).The computation of TENT rule can be performed with only information on 1-hop neighbours.
VI. DISCOVERY OF HOLE
The nodes that are marked as stuck nodes by using TENT Rule discover the holes.Stuck node and border nodes are
similar to this algorithm. Consider a stuck node bi having the same ID creates a new hole –discovery packet,whose aim is
to collect the location information about the boundary nodes and then forward to next. This process is repeated until the
HD packet travelled around the hole and received by the initiator node bi . At the end,the node having the smallest hole
ID removes the HD packets and name itself the hole manager (HM).
VII. BORDER DETECTION
The network boundary nodes will execute the TENT rule and detect that they are the stuck nodes. Each stuck node
launches the distributed hole detection algorithm (DHD) to identify the nodes that surrounded the hole. In the HD packet
define four variables to identify the network boundary Xmax; Ymax; Xmin; Ymin.Each stuck nodes which receives a HD
packet compares the coordinates Xmax; Ymax; Xmin; Ymin. Each defined in the packet with its co-ordinates.at the end
the largest hole that defines the network boundary will define by these co-ordinates.
VIII. PRINCIPLE OF HEALING PROCESS
After the determining the stuck node and boundary nodes the nodes in the local area of the holes involved in the healing
process. A virtual force that from the hole centre will move the nodes towards the centre repulsive forces also defined to
minimise the overlapping in between the nodes.
Fig 2: principle of healing process
The HM calculates the centre and size of the hole. The node relocation will done by the attractive and repulsive
force.ie:the concept of the virtual forces. There are certain threshold values. The movement is the resultant of both forces.
IX. SCENARIO- VALIDATION OF HEAL
The validation of Heal is based to the DSSA and SMART both are a schedule based protocol, its objective is to assign the
time slots to the nodes and avoid collision.
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org
Page | 62
Paper Publications
Fig3 Heal to cope with obstacles
Fig4: energy based healing
Fig5: Comparison in terms of movement
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org
Page | 63
Paper Publications
The comparison is to see the performance of heal, when it is used to improve the network coverage
Fig 6: Comparison in terms of coverage
That the HEAL to cope with obstacles such that nodes gets a penetration power. It will improve the coverage and the
energy based on a energy efficiency. This will improve the life time of the network.
X. CONCLUSION
Wireless sensor network application become a part of life. So its existing problem should affect the network. This paper
proposed a method of energy efficient healing. So increase the coverage area. By introduce an energy based local healing
based on the energy level of nodes will improve the sensors life time and also the networks.
REFERENCES
[1] N. Ahmed, S.S. Kanhere, and S. Jha, “The Holes Problem in Wireless Sensor Networks: A Survey,” SIGMOBILE
Mobile Computing Comm.
[2] B. Wang, Coverage Control in Sensor Networks. Springer, 2010.
[3] R. Ghrist and A. Muhammad, “Coverage and Hole-Detection in Sensor Networks via Homology,” Proc. Fourth Int’l
Symp. Information Processing in Sensor Networks (IPSN ’05), pp. 254-260, Apr.
[4] Q. Fang, J. Gao, and L.J. Guibas, “Locating and Bypassing Holes in Sensor Networks,” Mobile Networks and
Applications, vol. 11, no. 2, pp. 187-200, 2006
[5] Abdelhamid Mellouk Khalid Assnoune, Mustapha Reda Senouci,” Localized Movement-Assisted Sensor
Deployment Algorithm for Hole Detection and Healing”, VOL. 25, NO. 5, MAY 2014.
[6] B. Kun, T. Kun, G. Naijie, L.D. Wan, and L. Xiaohu, “Topological Hole Detection in Sensor Networks with
Cooperative Neighbors,”Proc. Int’l Conf. Systems and Networks Comm. (ICSN ’06), p. 31, 2006.
[7] V. De Silva, R. Ghrist, and A. Muhammad, “Blind Swarms for Coverage in 2-D,” Proc. Robotics: Science and
Systems, pp. 335-342, June 2005.
[8] F. Stefan and K. Christian, “Hole Detection or: How Much Geometry Hides In Connectivity” Proc. 22nd Ann.
Symp. Computational Geometry (SCG’06), pp. 377-385, 2006.
[9] Chang CY, Chang HR, Hsieh CC, Chang CT. OFRD: Obstacle-Free Robot Deployment Algorithms for Wireless
Sensor Networks. IEEE Wireless Communications and Networking Conference (WCNC), Hongkong, March 2007.

More Related Content

What's hot

Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
O026084087
O026084087O026084087
O026084087ijceronline
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkBADALKUMAR56
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...IJRST Journal
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNIRJET Journal
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
 

What's hot (19)

Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
O026084087
O026084087O026084087
O026084087
 
Ad34186189
Ad34186189Ad34186189
Ad34186189
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor network
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSN
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor Network
 

Viewers also liked

Voltage Stability Calculations in Power Transmission Lines: Indications and A...
Voltage Stability Calculations in Power Transmission Lines: Indications and A...Voltage Stability Calculations in Power Transmission Lines: Indications and A...
Voltage Stability Calculations in Power Transmission Lines: Indications and A...paperpublications3
 
Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...paperpublications3
 
Enhanced Zigbee Tree Routing In Wireless Sensor Network
Enhanced Zigbee Tree Routing In Wireless Sensor NetworkEnhanced Zigbee Tree Routing In Wireless Sensor Network
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
 
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...paperpublications3
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
A Distinctive Analysis between Distributed and Centralized Power Generation
A Distinctive Analysis between Distributed and Centralized Power GenerationA Distinctive Analysis between Distributed and Centralized Power Generation
A Distinctive Analysis between Distributed and Centralized Power Generationpaperpublications3
 
Shared Steering Control between a Driver and an Automation: Stability in the ...
Shared Steering Control between a Driver and an Automation: Stability in the ...Shared Steering Control between a Driver and an Automation: Stability in the ...
Shared Steering Control between a Driver and an Automation: Stability in the ...paperpublications3
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selectionpaperpublications3
 
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...paperpublications3
 
Informative Indoor Tracking
Informative Indoor TrackingInformative Indoor Tracking
Informative Indoor Trackingpaperpublications3
 
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...paperpublications3
 

Viewers also liked (12)

Voltage Stability Calculations in Power Transmission Lines: Indications and A...
Voltage Stability Calculations in Power Transmission Lines: Indications and A...Voltage Stability Calculations in Power Transmission Lines: Indications and A...
Voltage Stability Calculations in Power Transmission Lines: Indications and A...
 
Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...
 
Android Based E-Home
Android Based E-HomeAndroid Based E-Home
Android Based E-Home
 
Enhanced Zigbee Tree Routing In Wireless Sensor Network
Enhanced Zigbee Tree Routing In Wireless Sensor NetworkEnhanced Zigbee Tree Routing In Wireless Sensor Network
Enhanced Zigbee Tree Routing In Wireless Sensor Network
 
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...
Implementation of Energy Management System to PV-Diesel Hybrid Power Generati...
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
A Distinctive Analysis between Distributed and Centralized Power Generation
A Distinctive Analysis between Distributed and Centralized Power GenerationA Distinctive Analysis between Distributed and Centralized Power Generation
A Distinctive Analysis between Distributed and Centralized Power Generation
 
Shared Steering Control between a Driver and an Automation: Stability in the ...
Shared Steering Control between a Driver and an Automation: Stability in the ...Shared Steering Control between a Driver and an Automation: Stability in the ...
Shared Steering Control between a Driver and an Automation: Stability in the ...
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
 
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...
 
Informative Indoor Tracking
Informative Indoor TrackingInformative Indoor Tracking
Informative Indoor Tracking
 
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...
A Wearable Textile Bed Sheet Cotton Substrate Material Micro Strip Antenna in...
 

Similar to Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingmarwaeng
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
C0361011014
C0361011014C0361011014
C0361011014ijceronline
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problemijasuc
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 

Similar to Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing (20)

Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healing
 
G044034350
G044034350G044034350
G044034350
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
C0361011014
C0361011014C0361011014
C0361011014
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

  • 1. ISSN 2349-7815 International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org Page | 59 Paper Publications Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Rini Baby N M.G University, Kottayam, Kerala, India Abstract: The main services provided by a WSN (wireless sensor network) is monitoring a particular region ie, RoI or specified region. The emergence of hole in that particular region is unavoidable. Due to some environmental factors, Random deployment and external attacks etc. In this work hole detection and hole healing process are discussed .Here show that heal deals with some virtual forces. According to the size of hole and also to improve the coverage area and need more energy efficient process. Keywords: wireless sensor network, Hole identification, Hole detection, RoI. I. INTRODUCTION A WSN is based on small sensors which are capable of sensing or monitoring a particular region .These sensors are communicating with each other. These small sensors are deployed in the target location for sensing that area. Due to the random deployment or sudden shock or external attack these sensors become failure. And thus occur the absence of sensors. Such that a particular area could be monitored. Due to this anomalies resulting the formation of different kinds holes. Such as coverage holes, routing holes etc. Here taken a large bounded hole such that the area not covered by any node. The important challenge that need to be overcome by WSN are the coverage as well as the energy consumption and the limited battery life. Sensing and communicating are the two task that a node perform. The nodes are able to communicate with the neighbours such that a packet from a source can reach its destination if there are no holes present. If the event that occurring the holes neither detected or if not reported there will be a coverage problem occurred. So we promote a self organizing mechanism to detect and to recover the presence of hole in our network. This is the main task of our network. For this process there are several steps regarding to the detection and healing. Healing is not an algorithm it’s a usual steps together through these process called as healing. The need of a complete solution together called hole detection and healing (HEAL) that may in most effective manner. Also this avoid the drawbacks of the previous works. The sensor deployment algorithm for hole detection and healing by using local handling is the solution which is a distributed and localized algorithm ,that can carried out in two phases. The first phase consist of three steps: Hole Identification, Hole discovery and border detection. The second phase consist of the healing process. And also improve the coverage area and become more energy efficient such that energy level of each and every node is improved. So that the nodes life time is dramatically increased. During the healing process is done had given a more power or a penetration. Power to avoid the obstacles such as walls or buildings that present in that particular environment. So that it can increase the coverage area also at the end of the deployments of the nodes no nodes is present in the obstacles. For evaluating the HEAL can compare with others. According to the movement, Coverage area and the total distance travelled for comparison here use the DSSA and SMART algorithm. And also consider a large number of nodes having large holes. For calculating the radius or size of hole global operations are done in olden days .Now by using some rules it can calculate easily. II. THE PROBLEM DEFINITION Different types of holes and various characteristic of holes are occurred. Such that during the normal operation of the network a great loss occurred.eg:the several holes will made a network inactive or ineffective. A single hole makes the whole network damage or make it not such an effective manner. Before the proposed method make these following assumptions:
  • 2. ISSN 2349-7815 International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org Page | 60 Paper Publications 1. Consider a dense mobile WSN having more number of sensors that are deployed in an area having some obstacles. 2. The deployment may be random or not. 3. All the nodes be homogeneous. 4. The location information are available through GPS system. 5. Consider a sensing model ask the sensor range,Rc the communication range .And also Rc≥ 2Rs because inorder to ensure the TENT rate. III. PROPOSED SYSTEM In this ,propose HEAL, it’s a localized and distributed hole healing algorithm as opposed to the centralised approach and it is related to a distributed system. For the complete work it should follow the following criteria. 1. Determining the boundary of the area. 2. Detecting the coverage area of the hole and also its character. 3. Determine the target nodes and also extra penetration power is needed to given for each node. 4. Relocate each node according to the target with minimum moving and messaging cost. Such as to increase the life time of a node. IV. SENSOR DEPLOYMENT For the construction of this project design domain NS2. And having some system requirements: For hardware of processor with Pentium 111 and speed of 1.5GHz with memory (RAM) 256MB,harddisk of 40GB is needed. The software used is the operating system is linux and TIL scripting language .And this can be operated in a virtual machine box.The sensor nodes are deployed over some region or area for the phenomenon that are should be monitored. Here each and every node in the WSN maintains the details of the neighbour node. V. HOLE IDENTIFICATION This process is comes under the hole detection. Such that, when only the hole identification is done process is initiated. The hole existence of a hole which is done by identifying the stuck node which are the boundaries of a hole.In order to find out the stuck node executes TENT rule. To identify stuck node must assess the existence of a hole such that by executing TENT rule. So can check whether the node p is a stuck node by the following steps. If no angle spanned by a pair of adjacent neighbour greater than 2Ď€/3 is not a stuck node. 1. For each p,order all of its neighbours in counter clockwise. 2. For each adjacent pairs (u,v) draw a perpendicular bisector of the two edges with p(u,v)(v,p). 3. They intersect at a centre o. If o is in communication range of p, then no black region (ie; all are in communication range), So p cannot be stuck in the direction upv. Fig 1: p is strongly stuck node
  • 3. ISSN 2349-7815 International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org Page | 61 Paper Publications A node is strong stuck if it has at least one stuck angle. And if angle upv is <120 degrees ,p cannot be stuck (the point black region disappears).The computation of TENT rule can be performed with only information on 1-hop neighbours. VI. DISCOVERY OF HOLE The nodes that are marked as stuck nodes by using TENT Rule discover the holes.Stuck node and border nodes are similar to this algorithm. Consider a stuck node bi having the same ID creates a new hole –discovery packet,whose aim is to collect the location information about the boundary nodes and then forward to next. This process is repeated until the HD packet travelled around the hole and received by the initiator node bi . At the end,the node having the smallest hole ID removes the HD packets and name itself the hole manager (HM). VII. BORDER DETECTION The network boundary nodes will execute the TENT rule and detect that they are the stuck nodes. Each stuck node launches the distributed hole detection algorithm (DHD) to identify the nodes that surrounded the hole. In the HD packet define four variables to identify the network boundary Xmax; Ymax; Xmin; Ymin.Each stuck nodes which receives a HD packet compares the coordinates Xmax; Ymax; Xmin; Ymin. Each defined in the packet with its co-ordinates.at the end the largest hole that defines the network boundary will define by these co-ordinates. VIII. PRINCIPLE OF HEALING PROCESS After the determining the stuck node and boundary nodes the nodes in the local area of the holes involved in the healing process. A virtual force that from the hole centre will move the nodes towards the centre repulsive forces also defined to minimise the overlapping in between the nodes. Fig 2: principle of healing process The HM calculates the centre and size of the hole. The node relocation will done by the attractive and repulsive force.ie:the concept of the virtual forces. There are certain threshold values. The movement is the resultant of both forces. IX. SCENARIO- VALIDATION OF HEAL The validation of Heal is based to the DSSA and SMART both are a schedule based protocol, its objective is to assign the time slots to the nodes and avoid collision.
  • 4. ISSN 2349-7815 International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org Page | 62 Paper Publications Fig3 Heal to cope with obstacles Fig4: energy based healing Fig5: Comparison in terms of movement
  • 5. ISSN 2349-7815 International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 2, Issue 4, pp: (59-63), Month: October - December 2015, Available at: www.paperpublications.org Page | 63 Paper Publications The comparison is to see the performance of heal, when it is used to improve the network coverage Fig 6: Comparison in terms of coverage That the HEAL to cope with obstacles such that nodes gets a penetration power. It will improve the coverage and the energy based on a energy efficiency. This will improve the life time of the network. X. CONCLUSION Wireless sensor network application become a part of life. So its existing problem should affect the network. This paper proposed a method of energy efficient healing. So increase the coverage area. By introduce an energy based local healing based on the energy level of nodes will improve the sensors life time and also the networks. REFERENCES [1] N. Ahmed, S.S. Kanhere, and S. Jha, “The Holes Problem in Wireless Sensor Networks: A Survey,” SIGMOBILE Mobile Computing Comm. [2] B. Wang, Coverage Control in Sensor Networks. Springer, 2010. [3] R. Ghrist and A. Muhammad, “Coverage and Hole-Detection in Sensor Networks via Homology,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN ’05), pp. 254-260, Apr. [4] Q. Fang, J. Gao, and L.J. Guibas, “Locating and Bypassing Holes in Sensor Networks,” Mobile Networks and Applications, vol. 11, no. 2, pp. 187-200, 2006 [5] Abdelhamid Mellouk Khalid Assnoune, Mustapha Reda Senouci,” Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing”, VOL. 25, NO. 5, MAY 2014. [6] B. Kun, T. Kun, G. Naijie, L.D. Wan, and L. Xiaohu, “Topological Hole Detection in Sensor Networks with Cooperative Neighbors,”Proc. Int’l Conf. Systems and Networks Comm. (ICSN ’06), p. 31, 2006. [7] V. De Silva, R. Ghrist, and A. Muhammad, “Blind Swarms for Coverage in 2-D,” Proc. Robotics: Science and Systems, pp. 335-342, June 2005. [8] F. Stefan and K. Christian, “Hole Detection or: How Much Geometry Hides In Connectivity” Proc. 22nd Ann. Symp. Computational Geometry (SCG’06), pp. 377-385, 2006. [9] Chang CY, Chang HR, Hsieh CC, Chang CT. OFRD: Obstacle-Free Robot Deployment Algorithms for Wireless Sensor Networks. IEEE Wireless Communications and Networking Conference (WCNC), Hongkong, March 2007.