In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
The preservation of the environment has become a priority and a subject that is receiving more and more attention. This is particularly important in the field of precision agriculture, where pesticide and herbicide use has become more controlled. In this study, we propose to evaluate the ability of the deep learning (DL) and convolutional neural network (CNNs) technology to detect weeds in several types of crops using a perspective and proximity images to enable localized and ultra-localized herbicide spraying in the region of Beni Mellal in Morocco. We studied the detection of weeds through six recent CNN known for their speed and precision, namely, VGGNet (16 and 19), GoogLeNet (Inception V3 and V4) and MobileNet (V1 and V2). The first experiment was performed with the CNNs architectures from scratch and the second experiment with their pre-trained versions. The results showed that Inception V4 achieved the highest precision with a rate of 99.41% and 99.51% on the mixed image sets and for its version from scratch and its pre-trained version respectively, and that MobileNet V2 was the fastest and lightest with its size of 14 MB.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Adaptive photovoltaic solar module based on internet of things and web-based ...IJECEIAES
This paper presents an intelligent of single axis automatic adaptive photovoltaic solar module. A static solar panel has an issue of efficiency on shading effects, irradiance of sunlight absorbed, and less power generates. This aims to design an effective algorithm tracking system and a prototype automatic adaptive solar photovoltaic (PV) module connected through internet of things (IoT). The system has successfully designated on solving efficiency optimization. A tracking system by using active method orientation and allows more power and energy are captured. The solar rotation angle facing aligned to the light-dependent resistor (LDR) voltage captured and high solar panel voltage measured by using Arduino microcontroller. Real-time data is collected from the dynamic solar panel, published on Node-Red webpage, and running interactive via android device. The system has significantly reduced time. Data captured by the solar panel then analyzed based on irradiance, voltage, current, power generated and efficiency. Successful results present a live data analytic platform with active tracking system that achieved larger power generated and efficiency of solar panel compared to a fixed mounted array. This research is significant that can help the user to monitor parameters collected by the solar panel thus able to increase 51.82% efficiency of the PV module.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
The preservation of the environment has become a priority and a subject that is receiving more and more attention. This is particularly important in the field of precision agriculture, where pesticide and herbicide use has become more controlled. In this study, we propose to evaluate the ability of the deep learning (DL) and convolutional neural network (CNNs) technology to detect weeds in several types of crops using a perspective and proximity images to enable localized and ultra-localized herbicide spraying in the region of Beni Mellal in Morocco. We studied the detection of weeds through six recent CNN known for their speed and precision, namely, VGGNet (16 and 19), GoogLeNet (Inception V3 and V4) and MobileNet (V1 and V2). The first experiment was performed with the CNNs architectures from scratch and the second experiment with their pre-trained versions. The results showed that Inception V4 achieved the highest precision with a rate of 99.41% and 99.51% on the mixed image sets and for its version from scratch and its pre-trained version respectively, and that MobileNet V2 was the fastest and lightest with its size of 14 MB.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Adaptive photovoltaic solar module based on internet of things and web-based ...IJECEIAES
This paper presents an intelligent of single axis automatic adaptive photovoltaic solar module. A static solar panel has an issue of efficiency on shading effects, irradiance of sunlight absorbed, and less power generates. This aims to design an effective algorithm tracking system and a prototype automatic adaptive solar photovoltaic (PV) module connected through internet of things (IoT). The system has successfully designated on solving efficiency optimization. A tracking system by using active method orientation and allows more power and energy are captured. The solar rotation angle facing aligned to the light-dependent resistor (LDR) voltage captured and high solar panel voltage measured by using Arduino microcontroller. Real-time data is collected from the dynamic solar panel, published on Node-Red webpage, and running interactive via android device. The system has significantly reduced time. Data captured by the solar panel then analyzed based on irradiance, voltage, current, power generated and efficiency. Successful results present a live data analytic platform with active tracking system that achieved larger power generated and efficiency of solar panel compared to a fixed mounted array. This research is significant that can help the user to monitor parameters collected by the solar panel thus able to increase 51.82% efficiency of the PV module.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...IJERA Editor
Great lifetime and reliability is the key aim of Wireless Sensor Network (WSN) design. As for prolonging
lifetime of this type of network, energy is the most important resource; all recent researches are focused on more
and more energy efficient techniques. Proposed work is Weighted Clustering Approach based on Weighted
Cluster Head Selection, which is highly energy efficient and reliable in mobile network scenario. Weight
calculation using different attributes of the nodes like SNR (Signal to Noise Ratio), Remaining Energy, Node
Degree, Mobility, and Buffer Length gives efficient Cluster Head (CH) on regular interval of time. CH rotation
helps in optimum utilization of energy available with all nodes; results in prolonged network lifetime.
Implementation is done using the NS2 network simulator and performance evaluation is carried out in terms of
PDR (Packet Delivery Ratio), End to End Delay, Throughput, and Energy Consumption. Demonstration of the
obtained results shows that proposed work is adaptable for improving the performance. In order to justify the
solution, the performance of proposed technique is compared with the performance of traditional approach. The
performance of proposed technique is found optimum as compared to the traditional techniques.
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...IJECEIAES
Blood cells diagnosis is becoming essential to ensure a proper treatment can be proposed to a blood related disease patient. In current research trending, automated complete blood count analysis system is required for pathologists or researchers to count the blood cells from the blood smeared images. Hence, a portable mobile-based complete blood count (CBC) analysis framework with the aid of microscope is proposed, and the smartphone camera is mounted to the viewing port of the light microscope by adding a smartphone support. Initially, the blood smeared image is acquired from a light microscope with objective zoom of 100X magnifications view the eyepiece zoom of 10X magnification, then captured by the smartphone camera. Next, the areas constitute to the WBC and RBC are extracted using combination of color space analysis, threshold and Otsu procedure. Then, the number of corresponding cells are counted using topological structural analysis, and the cells in clumped region is estimated using Hough Circle Transform (HCT) procedure. After that, the analysis results are saved in the database, and shown in the user interface of the smartphone application. Experimental results show the developed system can gain 92.93% accuracy for counting the RBC whereas 100% for counting the WBC.
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
Social distancing is one of the simple and effective shields for every individual to control spreading of virus in present scenario of pandemic coronavirus disease (COVID-19). However, existing application of social distancing is a basic model and it is also characterized by various pitfalls in case of dynamic monitoring of infected individual accurately. Review of existing literature shows that there has been various dedicated research attempt towards social distancing using available technologies, however, there are further scope of improvement too. This paper has introduced a novel framework which is capable of computing the level of threat with much higher degree of accuracy using distance and duration of stay as elementary parameters. Finally, the model can successfully classify the level of threats using deep learning. The study outcome shows that proposed system offers better predictive performance in contrast to other approaches.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
Wireless sensor networks have attracted much attention in the research community over the last few years, driven by a wealth of theoretical and practical challenges and an increasing number of practical civilian application. ‘one deployment, multiple applications’ is an emerging trend in the development of WSN, due to the high cost of deploying hundreds and thousands of sensors nodes over a wide geographical area and the application-specific nature of tasking a WSN. A wireless sensor network is a collection of nodes organized into a cooperative network. To reduce the energy consumption, the transmission of data between sensor nodes must be reduced in order to preserve the remaining energy in cluster node. We propose a new energy balancing architecture based on cluster with hexagonal geometry with radius R.select the base station and after select the cluster head with maximum energy of the node and after select mobile agent in minimum distance to cluster head and second highest maximum energy. And then send the data mobile agent to cluster head and cluster head to base station.and we have energy management must be followed to balance the energy in the whole network and improving network lifetime.
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSIJCNCJournal
Internet of Things (IoT) is the fast- growing technology, mostly used in smart mobile devices such as notebooks, tablets, personal digital assistants (PDA), smartphones, etc. Due to its dynamic nature and the limited battery power of the IoT enabled smart mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Existing algorithm does not concentrate about communication links and battery power/energy, but these node links are a very important factor for improving the quality of routing in IoT. In this paper, Context-aware Energy Conserving Algorithm for routing (CECA) was proposed which employs QoS routing metrics like Inter-Meeting Time and residual energy and has been applied to IoT enabled smart mobile devices using different technologies with different microcontroller which resulted in an increased network lifetime, throughput and reduced control overhead and the end to end delay. Simulation results show that, with respect to the speed of the mobile nodes from 2 to 10m/s, CECA increases the network lifetime, thereby increasing the average residual energy by 11.1% and increasing throughput there by reduces the average end to end delay by 14.1% over the Energy-Efficient Probabilistic Routing (EEPR) algorithm. With respect to the number of nodes increases from 10 to 100 nodes, CECA algorithms increase the average residual energy by16.1 % reduces the average end to end delay by 15.9% and control overhead by 23.7% over the existing EEPR
Wireless sensor network is the combination of sensor nodes where sensor nodes are distributed all over the network. There are some challenges that come into the wireless sensor network n context to energy efficiency, network lifetime, storage and battery backup. The most important feature of a routing protocol, in order to be efficient for WSNs, is the energy consumption and the extension of the network’s lifetime. In this paper, we have analyzed various routing techniques for WSN that increases the network lifetime and energy consumption.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Extending network lifetime of wireless sensorIJCNCJournal
One critical issue in designing and managing a wireless sensor network is how to save the energy consumption
of the sensors in order to maximize network lifetime under the constraint of full coverage of the monitored
targets. In this paper, we adopt the common approach of creating disjoint sensor covers to prolong network
lifetime. The typical goal used in the literature is to maximize the number of covers without consideration of
the energy levels of the sensors. We argue that the network lifetime can be extended by maximizing the total
bottleneck energy of the created covers. We formally define the problem of maximizing the total bottleneck
energy of the covers, present for the first time an integer programming formulation of the problem, and develop
two algorithms to solve large problem instances. Extensive experimental tests show that the use of the goal of
maximizing the total bottleneck energy of the covers creates covers with substantially longer network lifetime
than the lifetime of the covers created with the goal of maximizing solely the number of covers.
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
Energy is a serious resource parameter in Wireless Sensor Networks. Utilizing energy in an effectual manner is a challenging task in Wireless Sensor Networks. This paper presents an overview on various energy efficient routing protocols which fulfills the criteria of QoS parameters. Various energy effective and QoS based routing protocols have been compared. To improve the QoS in a network, data fusion and data accumulation is considered to be one of major energy saving technique. The routing protocols based on data aggregation, reduced cost routing and secure routing are also discussed in detail. Simulation tools like NS2, NS3, OMNET etc can be used to evaluate the network performance.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
A multi-hop routing protocol for an energy-efficient in wireless sensor networkIJECEIAES
The low-energy adaptive clustering hierarchy (LEACH) protocol has been developed to be implemented in wireless sensor networks (WSNs) systems such as healthcare and military systems. LEACH protocol depends on clustering the employed sensors and electing one cluster head (CH) for each cluster. The CH nodes are changed periodically to evenly distribute the energy load among sensors. Updating the CH node requires electing different CH and re-clustering sensors. This process consumes sensors’ energy due to sending and receiving many broadcast and unicast messages thus reduces the network lifetime, which is regarded as a significant issue in LEACH. This research develops a new approach based on modifying the LEACH protocol to minimize the need of updating the cluster head. The proposal aims to extend the WSN’s lifetime by maintaining the sensor nodes’ energy. The suggested approach has been evaluated and shown remarkable efficiency in comparison with basic LEACH protocol and not-clustered protocol in terms of extending network lifetime and reducing the required sent messages in the network reflected by 15%, and, in addition, reducing the need to reformatting the clusters frequently and saving network resources.
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
This research work propounds a simple graph theory semblance Divide and Conquer Quad tree based Multi-hop Static Leach (DCQMS-Leach) energy efficient routing protocol for wireless sensor networks. The pivotal theme of this research work is to demonstrate how divide and conquer plays a pivotal role in a multi-hop static leach energy efficient routing protocol. This research work motivates, enforces, reckons the DCQMS-Leach energy efficient routing protocol in wireless sensor networks using Mat lab simulator.This research work also computes the performance concepts of DCQMS-Leach routing protocol using various performance metrics such as Packet Drop Rate (PDR), Throughput, and End to End Delay (EED) by comparing and contrasting alive nodes with number of nodes, number of each packets sent to the cluster heads with rounds, number of cluster heads with rounds, number of packets forwarded to the base station with rounds and finally dead nodes with number of rounds. In order to curtail energy consumption this research work proffers a routing methodology such as DCQMS-Leach in energy efficient wireless,sensor routing protocol. The recommended DCQMS-Leach overcomes the in adequacies of all other different leach protocols suggested by the previous researchers.
Advancement of Zone Based Energy Efficient Protocol for WSNijtsrd
The Wireless Sensor Networks WSNs is an area of emerging technology which involves numerous number of sensor nodes motes, a base station, processing power and storage. However, these have very limited power. The nodes exchange data and control messages with each other and towards the base station to fulfill a sensing and monitoring process. In present work, we have suggested a region based routing protocol for heterogeneous WSNs. In proposed technique, few motes forward data straight to the base station BS whereas other motes follow clustering method to forward data to the BS. We have employed R SEP protocol and equated with standard Low Energy adaptive clustering hierarchy LEACH and SEP protocols. Experimental outcomes exhibits that R SEP improves the lifetime of WSN and the amount of work accomplished in the network by R SEP is much more than the conventional LEACH and SEP protocols. Anita | Kirti Bhatia | Shalini Bhadola "Advancement of Zone Based Energy Efficient Protocol for WSN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32987.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/32987/advancement-of-zone-based-energy-efficient-protocol-for-wsn/anita
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...IJERA Editor
Great lifetime and reliability is the key aim of Wireless Sensor Network (WSN) design. As for prolonging
lifetime of this type of network, energy is the most important resource; all recent researches are focused on more
and more energy efficient techniques. Proposed work is Weighted Clustering Approach based on Weighted
Cluster Head Selection, which is highly energy efficient and reliable in mobile network scenario. Weight
calculation using different attributes of the nodes like SNR (Signal to Noise Ratio), Remaining Energy, Node
Degree, Mobility, and Buffer Length gives efficient Cluster Head (CH) on regular interval of time. CH rotation
helps in optimum utilization of energy available with all nodes; results in prolonged network lifetime.
Implementation is done using the NS2 network simulator and performance evaluation is carried out in terms of
PDR (Packet Delivery Ratio), End to End Delay, Throughput, and Energy Consumption. Demonstration of the
obtained results shows that proposed work is adaptable for improving the performance. In order to justify the
solution, the performance of proposed technique is compared with the performance of traditional approach. The
performance of proposed technique is found optimum as compared to the traditional techniques.
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...IJECEIAES
Blood cells diagnosis is becoming essential to ensure a proper treatment can be proposed to a blood related disease patient. In current research trending, automated complete blood count analysis system is required for pathologists or researchers to count the blood cells from the blood smeared images. Hence, a portable mobile-based complete blood count (CBC) analysis framework with the aid of microscope is proposed, and the smartphone camera is mounted to the viewing port of the light microscope by adding a smartphone support. Initially, the blood smeared image is acquired from a light microscope with objective zoom of 100X magnifications view the eyepiece zoom of 10X magnification, then captured by the smartphone camera. Next, the areas constitute to the WBC and RBC are extracted using combination of color space analysis, threshold and Otsu procedure. Then, the number of corresponding cells are counted using topological structural analysis, and the cells in clumped region is estimated using Hough Circle Transform (HCT) procedure. After that, the analysis results are saved in the database, and shown in the user interface of the smartphone application. Experimental results show the developed system can gain 92.93% accuracy for counting the RBC whereas 100% for counting the WBC.
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
Social distancing is one of the simple and effective shields for every individual to control spreading of virus in present scenario of pandemic coronavirus disease (COVID-19). However, existing application of social distancing is a basic model and it is also characterized by various pitfalls in case of dynamic monitoring of infected individual accurately. Review of existing literature shows that there has been various dedicated research attempt towards social distancing using available technologies, however, there are further scope of improvement too. This paper has introduced a novel framework which is capable of computing the level of threat with much higher degree of accuracy using distance and duration of stay as elementary parameters. Finally, the model can successfully classify the level of threats using deep learning. The study outcome shows that proposed system offers better predictive performance in contrast to other approaches.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
Wireless sensor networks have attracted much attention in the research community over the last few years, driven by a wealth of theoretical and practical challenges and an increasing number of practical civilian application. ‘one deployment, multiple applications’ is an emerging trend in the development of WSN, due to the high cost of deploying hundreds and thousands of sensors nodes over a wide geographical area and the application-specific nature of tasking a WSN. A wireless sensor network is a collection of nodes organized into a cooperative network. To reduce the energy consumption, the transmission of data between sensor nodes must be reduced in order to preserve the remaining energy in cluster node. We propose a new energy balancing architecture based on cluster with hexagonal geometry with radius R.select the base station and after select the cluster head with maximum energy of the node and after select mobile agent in minimum distance to cluster head and second highest maximum energy. And then send the data mobile agent to cluster head and cluster head to base station.and we have energy management must be followed to balance the energy in the whole network and improving network lifetime.
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSIJCNCJournal
Internet of Things (IoT) is the fast- growing technology, mostly used in smart mobile devices such as notebooks, tablets, personal digital assistants (PDA), smartphones, etc. Due to its dynamic nature and the limited battery power of the IoT enabled smart mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Existing algorithm does not concentrate about communication links and battery power/energy, but these node links are a very important factor for improving the quality of routing in IoT. In this paper, Context-aware Energy Conserving Algorithm for routing (CECA) was proposed which employs QoS routing metrics like Inter-Meeting Time and residual energy and has been applied to IoT enabled smart mobile devices using different technologies with different microcontroller which resulted in an increased network lifetime, throughput and reduced control overhead and the end to end delay. Simulation results show that, with respect to the speed of the mobile nodes from 2 to 10m/s, CECA increases the network lifetime, thereby increasing the average residual energy by 11.1% and increasing throughput there by reduces the average end to end delay by 14.1% over the Energy-Efficient Probabilistic Routing (EEPR) algorithm. With respect to the number of nodes increases from 10 to 100 nodes, CECA algorithms increase the average residual energy by16.1 % reduces the average end to end delay by 15.9% and control overhead by 23.7% over the existing EEPR
Wireless sensor network is the combination of sensor nodes where sensor nodes are distributed all over the network. There are some challenges that come into the wireless sensor network n context to energy efficiency, network lifetime, storage and battery backup. The most important feature of a routing protocol, in order to be efficient for WSNs, is the energy consumption and the extension of the network’s lifetime. In this paper, we have analyzed various routing techniques for WSN that increases the network lifetime and energy consumption.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Extending network lifetime of wireless sensorIJCNCJournal
One critical issue in designing and managing a wireless sensor network is how to save the energy consumption
of the sensors in order to maximize network lifetime under the constraint of full coverage of the monitored
targets. In this paper, we adopt the common approach of creating disjoint sensor covers to prolong network
lifetime. The typical goal used in the literature is to maximize the number of covers without consideration of
the energy levels of the sensors. We argue that the network lifetime can be extended by maximizing the total
bottleneck energy of the created covers. We formally define the problem of maximizing the total bottleneck
energy of the covers, present for the first time an integer programming formulation of the problem, and develop
two algorithms to solve large problem instances. Extensive experimental tests show that the use of the goal of
maximizing the total bottleneck energy of the covers creates covers with substantially longer network lifetime
than the lifetime of the covers created with the goal of maximizing solely the number of covers.
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
Energy is a serious resource parameter in Wireless Sensor Networks. Utilizing energy in an effectual manner is a challenging task in Wireless Sensor Networks. This paper presents an overview on various energy efficient routing protocols which fulfills the criteria of QoS parameters. Various energy effective and QoS based routing protocols have been compared. To improve the QoS in a network, data fusion and data accumulation is considered to be one of major energy saving technique. The routing protocols based on data aggregation, reduced cost routing and secure routing are also discussed in detail. Simulation tools like NS2, NS3, OMNET etc can be used to evaluate the network performance.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
A multi-hop routing protocol for an energy-efficient in wireless sensor networkIJECEIAES
The low-energy adaptive clustering hierarchy (LEACH) protocol has been developed to be implemented in wireless sensor networks (WSNs) systems such as healthcare and military systems. LEACH protocol depends on clustering the employed sensors and electing one cluster head (CH) for each cluster. The CH nodes are changed periodically to evenly distribute the energy load among sensors. Updating the CH node requires electing different CH and re-clustering sensors. This process consumes sensors’ energy due to sending and receiving many broadcast and unicast messages thus reduces the network lifetime, which is regarded as a significant issue in LEACH. This research develops a new approach based on modifying the LEACH protocol to minimize the need of updating the cluster head. The proposal aims to extend the WSN’s lifetime by maintaining the sensor nodes’ energy. The suggested approach has been evaluated and shown remarkable efficiency in comparison with basic LEACH protocol and not-clustered protocol in terms of extending network lifetime and reducing the required sent messages in the network reflected by 15%, and, in addition, reducing the need to reformatting the clusters frequently and saving network resources.
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
This research work propounds a simple graph theory semblance Divide and Conquer Quad tree based Multi-hop Static Leach (DCQMS-Leach) energy efficient routing protocol for wireless sensor networks. The pivotal theme of this research work is to demonstrate how divide and conquer plays a pivotal role in a multi-hop static leach energy efficient routing protocol. This research work motivates, enforces, reckons the DCQMS-Leach energy efficient routing protocol in wireless sensor networks using Mat lab simulator.This research work also computes the performance concepts of DCQMS-Leach routing protocol using various performance metrics such as Packet Drop Rate (PDR), Throughput, and End to End Delay (EED) by comparing and contrasting alive nodes with number of nodes, number of each packets sent to the cluster heads with rounds, number of cluster heads with rounds, number of packets forwarded to the base station with rounds and finally dead nodes with number of rounds. In order to curtail energy consumption this research work proffers a routing methodology such as DCQMS-Leach in energy efficient wireless,sensor routing protocol. The recommended DCQMS-Leach overcomes the in adequacies of all other different leach protocols suggested by the previous researchers.
Advancement of Zone Based Energy Efficient Protocol for WSNijtsrd
The Wireless Sensor Networks WSNs is an area of emerging technology which involves numerous number of sensor nodes motes, a base station, processing power and storage. However, these have very limited power. The nodes exchange data and control messages with each other and towards the base station to fulfill a sensing and monitoring process. In present work, we have suggested a region based routing protocol for heterogeneous WSNs. In proposed technique, few motes forward data straight to the base station BS whereas other motes follow clustering method to forward data to the BS. We have employed R SEP protocol and equated with standard Low Energy adaptive clustering hierarchy LEACH and SEP protocols. Experimental outcomes exhibits that R SEP improves the lifetime of WSN and the amount of work accomplished in the network by R SEP is much more than the conventional LEACH and SEP protocols. Anita | Kirti Bhatia | Shalini Bhadola "Advancement of Zone Based Energy Efficient Protocol for WSN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32987.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/32987/advancement-of-zone-based-energy-efficient-protocol-for-wsn/anita
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
In wireless sensor networks (WSN), conserving energy and increasing lifetime of the network are a critical issue that has been addressed by substantial research works. The clustering technique has been proven particularly energy-efficient in WSN. The nodes form groups (clusters) that include one cluster head and member clusters. Cluster heads (CHs) are able to process, filter, gather the data sent by sensors
belonging to their cluster and send it to the base station. Many routing protocols which have been proposed are based on heterogeneity and use the clustering scheme such as SEP and DEEC. In this paper we introduce a new approach called WDDC in which cluster heads are chosen on the basis
of probability of ratio of residual energy and average energy of the network. It also takes into consideration distances between nodes and the base station to favor near nodes with more energy to be cluster heads. Furthermore, WDDC is dynamic; it divides network lifetime in two zones in which it changes its behavior. Simulation results show that our approach performs better than the other distributed clustering protocols such as SEP and DEEC in terms of energy efficiency and lifetime of the network.
Improved LEACH protocol for increasing the lifetime of WSNsIJECEIAES
Recently, wireless sensor network (WSN) is taking a high place in several applications: military, industry, and environment. The importance of WSNs in current applications makes the WSNs the most developed technology at the research level and especially in the field of communication and computing. However, WSN’s performance deals with a number of challenges. Energy consumption is the most considerable for many researchers because nodes use energy to collect, treat, and send data, but they have restricted energy. For this reason, numerous efficient energy routing protocols have been developed to save the consumption of power. Low energy adaptive clustering hierarchy (LEACH) is considered as the most attractive one in WSNs. In the present document, we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and in data transmission, then we propose an enhanced protocol. The proposed algorithm aims to improve energy consumption and prolong the lifetime of WSN through selecting CHs depending on the remaining power, balancing the number of nodes in clusters, determining abandoned nodes in order to send their data to the sink. Then CHs choose the optimal path to achieve the sink. Simulation results exhibit that the enhanced method can decrease the consumption of energy and prolong the life-cycle of the network.
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
The longevity of the network and the lack of resources are the main problems within the WSN. Minimizing energy dissipation and optimizing the lifespan of the WSN network are real challenges in the design of WSN routing protocols. Load balanced clustering increases the reliability of the system and enhances coordination between different nodes within the network. WSN is one of the main technologies dedicated to the detection, sensing, and monitoring of physical phenomena of the environment. For illustration, detection, and measurement of vibration, pressure, temperature, and sound. The WSN can be integrated into many domains, like street parking systems, smart roads, and industrial. This paper examines the efficiency of our two proposed clustering algorithms: Fuzzy C-means based hierarchical routing approach for homogeneous WSN (F-LEACH) and fuzzy distributed energy efficient clustering algorithm (F-DEEC) through a detailed comparison of WSN performance parameters such as the instability and stability duration, lifetime of the network, number of cluster heads per round and the number of alive nodes. The fuzzy C-means based on hierarchical routing approach is based on fuzzy C-means and low-energy adaptive clustering hierarchy (LEACH) protocol. The fuzzy distributed energy efficient clustering algorithm is based on fuzzy C-means and design of a distributed energy efficient clustering (DEEC) protocol. The technical capability of each protocol is measured according to the studied parameters.
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
The Energy hole problem is a major problem of
data collection in wireless sensor networks. The sensors near the
static sink serve as relays for remote sensors, which reduce their
energy rapidly, causing energy holes in the sensor field. This
project has proposed a customizable mobile sink based adaptive
protected energy efficient clustering protocol (MSAPEEP) for
improvement of the problem of energy holes along with that we
also characterize and made comparison with the previous
existing protocols. A MSAPEEP uses the adaptive protected
method (APM) to discover the best possible number of cluster
heads (CHs) to get better life span and constancy time of the
network. The effectiveness of MSAPEEP is compared with
previous protocols; specifically, low energy adaptive clustering
hierarchy (LEACH) and mobile sink enhanced energy efficient
PEGASIS based routing protocol using network simulator(NS2).
Examples of simulation result show that MSAPEEP is more
reliable and removes the potential of energy hole and enhances
the stability and life span of the wireless sensor network(WSN).
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
Similar to Solution for intra/inter-cluster event-reporting problem in cluster-based protocols for wireless sensor networks (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Solution for intra/inter-cluster event-reporting problem in cluster-based protocols for wireless sensor networks
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 1, February 2022, pp. 868~879
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i1.pp868-879 868
Journal homepage: http://ijece.iaescore.com
Solution for intra/inter-cluster event-reporting problem in
cluster-based protocols for wireless sensor networks
Raed Taleb Al-Zubi1
, Abdulraheem Ahmed Kreishan1
, Mohammad Qasem Alawad1
,
Khalid Ahmad Darabkh2
1
Department of Electrical Engineering, School of Engineering, The University of Jordan, Amman, Jordan
2
Department of Computer Engineering, School of Engineering, The University of Jordan, Amman, Jordan
Article Info ABSTRACT
Article history:
Received Feb 17, 2021
Revised Sep 3, 2021
Accepted Sep 15, 2021
In recent years, wireless sensor networks (WSNs) have been considered one
of the important topics for researchers due to their wide applications in our
life. Several researches have been conducted to improve WSNs performance
and solve their issues. One of these issues is the energy limitation in WSNs
since the source of energy in most WSNs is the battery. Accordingly, various
protocols and techniques have been proposed with the intention of reducing
power consumption of WSNs and lengthen their lifetime. Cluster-oriented
routing protocols are one of the most effective categories of these protocols.
In this article, we consider a major issue affecting the performance of this
category of protocols, which we call the intra/inter-cluster event-reporting
problem (IICERP). We demonstrate that IICERP severely reduces the
performance of a cluster-oriented routing protocol, so we suggest an effective
Solution for IICERP (SIICERP). To assess SIICERP’s performance,
comprehensive simulations were performed to demonstrate the performance
of several cluster-oriented protocols without and with SIICERP. Simulation
results revealed that SIICERP substantially increases the performance of
cluster-oriented routing protocols.
Keywords:
Cluster-based networks
Routing protocols
SIICERP
Wireless sensor networks
This is an open access article under the CC BY-SA license.
Corresponding Author:
Khalid Ahmad Darabkh
Department of Computer Engineering, School of Engineering, The University of Jordan
P.O. Box, Amman 11942, Jordan
Email: k.darabkeh@ju.edu.jo
1. INTRODUCTION
Mechanical-systems (MEMS) technology, and digital electronic switches, the implementation of
WSNs in the real world become feasible. In the last few years, wireless sensor networks (WSNs) have been
considered as a hot research topic with a rapidly increasing set of important applications. A WSN is made up
of a considerable number of small, intelligent devices termed sensor nodes. The sensor nodes differ in their
characteristics such as cost, power consumption, and size. Each sensor node consists of a power unit which is
basically a small battery, communication unit which contains a wireless transceiver, sensing unit which contains an
analog to digital converter (ADC), and data processing unit which contains a small processor and a limited size
storage unit [1]-[4].
Sensor nodes have different sensing capabilities based on the environment. They sense the
environment, process the data, and transmit it to the receiver via wireless channel. These nodes are randomly
deployed in distant regions for monitoring aims. In a WSN, the primary mission of deployed sensor nodes is
to gather the data from the area of interest region and then direct it toward the sink node or base station (BS)
by means of pre-determined channels. The BS then transmits these data via wireless channel to a remote
destination for further analysis and processing. BS may be inside the region of sensing or far from it according
2. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
869
to the application area [5]. There are various kinds of sensors as radar sensors, infrared sensors, visual and
magnetic sensors, acoustic sensors, thermal sensors. Accordingly, WSN can be used in different applications
such as healthcare applications, environmental applications, healthcare applications, and many other fields [6],
[7]. Although the WSNs have many interesting applications and attractive characteristics, they face many
challenges such as energy constraint, node deployment, data aggregation, network heterogeneity, scalability
issue, and security [8]-[14]. Between those challenges, energy hindrance is the most worrying matter for several
researchers in domain of WSNs. Sensor nodes need a lot of energy since they sense, process, transmit and
collect data. In fact, the battery is the main source of energy in these nodes, and it is nearly impossible to change
or recharge it after the nodes have been deployed in the network [10]-[13]. As a result, well-investigated
protocols for collecting data in the wireless network are required in order to reduce the consumption of power
and hence extend the network's lifetime.
Numerous energy-efficient data collection techniques were proposed for WSNs, such as routing
protocols. These protocols can be categorized into three major groups: tree-oriented routing protocols [1], [2],
flat-oriented routing protocols [3]-[5], and cluster-oriented routing protocols [6]-[24]. In this article, we
principally focus on the group of cluster-oriented routing protocols, which has demonstrated to be on the top
of energy-saving routing protocols [25]-[32]. In cluster-oriented routing protocols, the wireless network is
organized into groups, which are named as clusters. Each cluster has one cluster head (CH) and other normal
nodes named as member nodes. All member nodes are in charge of sensing the data and transmitting it to the
CH, while the CH is in charge of collecting data from member nodes, aggregating the data, and then
transmitting it to the BS. It is noteworthy that the clustering in WSN can be either static or variable. In static
clustering, clusters are usually formed once the nodes are deployed, and remain the same until the lifetime of
the network expires. The role of CH in each cluster rotates among all nodes. On the other hand, in variable
clustering, the network's lifetime is divided into numerous rounds. At the start of each round, new clusters are
formed. There are some protocols which employ a third form of nodes known as relay nodes (RNs), which are
in charge of receiving data from CHs and relaying it to the BS. Actually, WSNs can save energy by using
cluster-based routing protocols, thus extending their lifespan. Figure 1 shows the architecture of cluster-based
routing protocols.
All cluster-oriented routing protocols, whether static or variable, time driven or event driven,
centralized or distributed protocols, have a major problem that significantly depletes nodes’ batteries. This
problem is known as the intra/inter-cluster event-reporting problem (IICERP). This matter manifests itself on
two categories: intra-transmission and inter-transmission. If an event occurs in a certain network region during
the first category, several nodes from the same cluster or dissimilar clusters will report the occurrence by
sending identical data packets to their respective CHs. In the second category, if an event occurs in a specified
network region, many CHs will report the occurrence to the BS by sending identical data packets.
Figure 2 illustrates IICERP problem on both levels. The figure shows that nodes N1, N2, and N3 send
comparable data packets to respective CH node (CH1) to report on occurrence. Furthermore, it demonstrates
that CH1 and CH2 send the BS an overly similar data packet to tell about event B. Thus, reporting on event A
necessitates the transmission of three identical data packets from three different nodes. As a result, CH1 will
execute data aggregation for the same three data packets, thereby consuming more energy. Furthermore,
transferring the same data packets to the BS by the CH1 and CH2 for reporting on the same event (event B)
consumes an increasing amount of energy.
Figure 1. Architecture of cluster-based routing protocols
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 868-879
870
Figure 2. IICERP on both intra and inter transmission levels
In this research paper, we propose solution for intra/inter-cluster event-reporting problem (SIICERP),
an effective Solution to the IICERP problem that enhances the performance of existing cluster-oriented routing
protocols. In fact, SIICERP is absolutely consistent with cluster-oriented routing protocols and mainly aims to
report an event through only one CH node and one normal node. We implement SIICERP into two cluster-
oriented routing protocols to assess its performance. The first employs a static clustering scheme, whereas the
second employs a variable clustering scheme. The simulation findings reveal that SIICERP considerably
conserves energy and thereby elongates the network’s lifetime. It is worth mentioning that preliminary findings
of this research have been published in [33].
The remainder of the paper is laid out as follows. Section 2 introduces the related work. SIICERP is
presented and explained in section 3. In section 4, we utilize simulations to assess SIICERP's performance.
Finally, concluding observations will be drawn in section 5.
2. RELATED WORK
In this work, we primarily introduce a solution for IICERP (SIICERP) in cluster-oriented routing
protocols. In the literature, several cluster-based routing protocols have been developed [6]-[24], [34], [35].
However, in this work, we only consider two cluster-oriented protocols presented in [34] and [35] in order to
demonstrate the influence of the suggested solution. In point of fact, we choose these two protocols because
one is based upon the variable clustering mechanism [34] while the other relies on the static clustering
mechanism [35].
Low energy adaptive clustering hierarchy (LEACH) is the first and most well-known cluster-oriented
routing protocol proposed by the authors in [34]. This protocol divides the overall network lifetime into time
slots named as rounds. Each round begins with a short setup period and ends with a long steady state period.
In the setup period, CH nodes are chosen and clusters are established. The CH nodes are chosen in the form of
a random probability. At the start of every single round, each node proceeds by generating a random number in
the range from 0 to 1. After then, the resulting number is compared to a preset limit 𝑇(𝑛) for the sake of
determining whether this node is a normal node or a CH node. T (n) is calculated using (1),
( )
0 ,
,
1
1 mod
If n S
p
If n S
p r
p
T n
−
=
(1)
where r is the current round number, n is the node, p is the percentage of the desired number of CH nodes from
all nodes in the network, and S is the set of nodes that worked as CHs in the previous rounds.
Then, each CH node sends an announcement message to all nodes in the entire network, using carrier
sensing multiple access (CSMA) protocol, informing them that it has been selected as CH. Announcement
message includes the location of selected CH. Normal nodes will select their CHs on the basis of the strength
4. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
871
of the signals of received messages. Each normal node sends a join message to the CH closest to it, informing
it that it has joined the cluster. As a result, clusters are formed. The clusters, in general, have varying numbers
of member nodes. All CH nodes produce time division multiple access (TDMA) schedules to arrange data
transmission among member nodes in their clusters. They then broadcast these schedules to their member
nodes, informing them of when each node should send the data it has collected. Each TDMA schedule is broken
into time slots of equal length. The number of slots in the cluster is equal to the number of member nodes, and
the length of every slot is the time each node takes to send its data packet. The setup period ends at this point,
then the steady state period starts. The steady state period is divided into many time slots named frames. The
total number of these frames in a cluster equals the total number of member nodes. In each cluster, member
nodes send their data packet to their CH node in their own frame. After that, the CH aggregates these data packets
along with its own data and sends the resulting data packet towards BS using CSMA protocol. Figure 3 shows the
network lifetime according to the LEACH protocol.
Figure 3. Network lifetime based on LEACH protocol
Load balancing cluster head (LBCH), an energy-saving routing protocol that uses a static clustering
scheme, was proposed in [35]. In this protocol, each cluster has one CH node, member nodes, and one relay
node (RN). The CH collects and aggregates data packets from its member nodes and sends them to the RN.
The RN, in multi-hop routing, sends the data collected in each cluster to the BS. LBCH protocol divides the
network lifetime into two periods: a short setup period and a long steady state period. At the setup period, BS
broadcasts to all nodes in the network a hello message. The nodes therefore send their energy and locations to
the BS. After that, the BS splits the network region into clusters of similar size. The width and length of each
cluster do not exceed a predetermined threshold distance. Subsequently, the BS chooses one CH node and one
RN for each cluster, that is, the initial CHs and RNs. The RN's role necessitates much energy because it receives
the cluster's total data packets and then transmits these data packets to the next RN. Thus, the RNs are selected
by computing the magnitudes of the nodes in each cluster to reduce the power consumption of these nodes.
The magnitude of a node is inversely related to node’s distance from the BS and linearly proportional to node’s
energy. The node with the greatest magnitude in the cluster will be chosen as the cluster's RN. The magnitude
Mn of node n is calculated using (2),
𝑀𝑛 = 𝐸𝑛 +
1
𝑑(𝑛,𝐵𝑆)
(2)
where, En refers to the node n energy, and d (n, BS) belongs to the distance from node 𝑛 to the BS. The BS
determines the routing paths after selecting the RNs and sends the next RN hop to each RN. Also, the CH of
each cluster is chosen by BS on the basis of the weight of each node. The weight Wn of node n is calculated
using (3),
𝑊
𝑛 = 𝐸𝑛 +
1
𝑑(𝑛,𝑅𝑁)
+
1
𝑑𝑛
(3)
where d (n, RN) belongs to the distance from node n to the RN, and dn represents the average distance from
node n to all other members in the cluster. The equation illustrates that the closest node to the RN and to the
other members and which has the highest level of energy is chosen as CH for the cluster.
For the next rounds, the role of CHs and RNs is rotated between all nodes in the cluster, guaranteeing
load balance among nodes. In this protocol, the nodes that were selected as CHs in the prior rounds will not be
chosen as CHs in the present round, the same for RNs. More precisely, any node in the cluster may take the
role of CH and RN only once in any round. Once all nodes in each cluster have taken their turn as CH and RN,
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 868-879
872
the same process will be repeated for choosing CHs and RNs. The BS then produces TDMA schedules for all
cluster nodes with the aim of regulating the transfer of data among the nodes and the CH. Furthermore, in order
to regulate the transmission of data among each cluster and BS, the BS allocates each cluster a unique code
division multiple access (CDMA) code. The steady state period is separated into identical frames named rounds
whereas each round is separated into several time slots equal to the highest number of nodes in a cluster besides
one more time slot designated for the purposes of controlling the next round. On the other hand, the member
nodes send their own data packets to the respective CH in their allotted time slots. The CH then aggregates all
data packets and forwards them to the respective RN in its cluster, which in turn sends them back to the BS in
the multi-hop routing process. In the additional time slot, BS selects both new CHs and RNs for the next round
and broadcasts a message about the selected CHs and RNs to all nodes before the next round begins.
3. PROPOSED PROTOCOL: SIICERP
3.1. Design of SIICERP
The idea behind SIICERP can be summarized as follows: if the sensing regions (i.e., approximated as
circles around sensors [36]) of some sensors are overlapped, then similar packets will be redundantly sent by
these sensors to report a common event occurs on the overlapped region. This idea is depicted in Figure 4. Based on
this idea, SIICERP is designed such that a single packet is transmitted to report any event. The node that sends
this packet is selected such that, in the network, the load is balanced and the total energy consumption is
reduced. To satisfy these requirements, SIICERP is designed as follows:
a. First, SIICERP can work with any cluster-based scheme. During the setup time in each round, the clusters
and their corresponding CHs are selected according to the used cluster-based scheme. The energy and the
positions of the sensors in each cluster are sent to the BS via the CHs.
b. Second, to avoid interference, CDMA scheme is employed to conduct the communications between the BS
and the clusters; different codes are assigned for different clusters and one code is used in one cluster.
c. Third, the BS runs a time-scheduling algorithm (discussed in section 3.2) to determine for each sensor the
time slots in which the sensor can report an event and the time slots in which the sensor listens to its
neighbors using their CDMA codes. This schedule is announced by the BS during the setup time in each
round and it is followed by the sensors during the steady state time. As a result of this schedule, a sensor
(say sensor x) waits until its determined time slot to report an event. During this waiting time, if other sensor
reports the same event, then sensor x cancels the reporting process.
3.2. Proposed time-scheduling algorithm
The time-scheduling algorithm proposed can be explained using the example shown in Figure 5 as
follows:
a. First, the BS assigns for each sensor in the network a unique time slot based on its energy; the first slot goes
to the one with the most energy, and the final slot goes to the one with the least energy. Each sensor is
assigned an index number (IN) which is the same as the time slot's index. It is clear that the length of the
created time-schedule is directly proportional to the network density (i.e., number of nodes in the network).
As a result, it may be very long. Accordingly, the next steps of this algorithm reduce the length of this
schedule by allowing different sensors to share the same time slot. Assume that after applying this step on
the example shown in Figure 5, the result is given Table 1:
Figure 4. Illustration of the main idea behind SIICERP Figure 5. An example to illustrate the
proposed time-scheduling algorithm
6. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
873
Table 1. The result of applying the first step of the time-scheduling algorithm
on the example shown in Figure 5
Time-slot IN Sensor
1 1 D
2 2 F
3 3 E
4 4 C
5 5 A
6 6 G
7 7 B
b. Second, starting with the sensor that has IN=1, the INs of all its neighbors (i.e., that are located within the
2Rs range; see Table 2) are reset to 1. This procedure is repeated to all sensors such that the IN (in this step)
of any sensor is not changed more than once. The result of applying this step on the considered example is
given in Table 3.
Table 2. Neighbors of each sensor in the example shown in Figure 5
Sensor Neighbors Cluster
A D 1
B E, F 2
C --- 2
D A 1
E B 2
F B 2
G --- 1
Table 3. The result of applying the second step of the time-scheduling algorithm
on the example shown in Figure 5
Time-slot IN Sensor
1 1 D
2 2 F
3 3 E
4 4 C
5 1 A
6 6 G
7 2 B
c. Third, perform a new modification on the IN values based on the following two cases:
1) If a sensor's IN value equals the current time slot's index, then this indicates that the IN of this sensor was
not changed in step 2 and no one of the time slots before the current time slot were assigned to one of its
neighbors. Hence, it is possible to assign a new time slot (also new value for the IN) from the previous time
slots if this new time slot was not assigned for another sensor from the same cluster. In this case, if the IN
value of a sensor is reset to a new value, then the IN of all its neighbors should be changed to the new value.
2) If a sensor's IN value not equals the current time slot's index, then this indicates that the IN of this sensor
was changed and the sensor has a neighbor in the time-slot of index IN and that neighbor has more energy.
Hence, it is possible to assign a new time slot (also new value for the IN) from the prior time slots (starting
with the one that has index of IN+1) if this new time slot was not assigned for another sensor from the same
cluster. In this case, if the IN of a sensor is given a new value, then the INs of all its neighbors are changed
to the new value.
The result of applying the third step on the considered example can be summarized as follows:
− The result after checking the IN of sensor F are shown in Table 4,
− The result after checking the IN of sensor E are shown in Table 5,
− The result after checking the IN of sensor C are shown in Table 6,
− The result after checking the IN of sensor A are shown in Table 7,
− The result after checking the IN of sensor G are shown in Table 8,
− The result after checking the IN of sensor B are shown in Table 9.
Based on the final schedule, each sensor listens to its neighbor during their time slots and sends its reports
during its time slot.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 868-879
874
Table 4. The result of applying the third step (after checking the IN of sensor F) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2
3 3 E
4 4 C
5 1 A
6 6 G
7 1 B
Table 5. The result of applying the third step (after checking the IN of sensor E) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2 E
3 3
4 4 C
5 1 A
6 6 G
7 2 B
Table 6. The result of applying the third step (after checking the IN of sensor C) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2 E
3 3 C
4 4
5 1 A
6 6 G
7 2 B
Table 7. The result of applying the third step (after checking the IN of sensor A) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2 E,A
3 3 C
4 4
5 1
6 7 G
7 2 B
Table 8. The result of applying the third step (after checking the IN of sensor G) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2 E,A
3 3 C,G
4 4
5 1
6 7
7 2 B
Table 9. The result of applying the third step (after checking the IN of sensor B) of the time-scheduling
algorithm on the example shown in Figure 5
Time-slot IN Sensor
1 1 D,F
2 2 E,A
3 3 C,G
4 4 B
8. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
875
4. PERFORMANCE EVALUATION
Comprehensive simulations were run to assess SIICERP's performance. As we discussed before,
SIICERP is a cluster-oriented routing protocol that can be used with any other cluster-oriented routing protocol.
However, we select the two protocols that were discussed in section 2. One of them is called LEACH protocol
[34] which is based on variable clustering (the clusters formation is changed with time) and the second one is
called LBCH protocol [35] which is based on fixed clustering (the cluster formation is fixed through the life-
time of the network). In our simulations, we refer to LEACH and LBCH with SIICERP as SIICERP-LEACH
and SIICERP-LBCH, respectively.
4.1. Simulation parameters
In our simulation, we consider different simulation scenarios. In Table 10, we summarize some of
simulation parameters. These parameters were used in [34] and [35]. Other parameters will be specifically
mentioned for each simulation scenario.
Table 10. Parameters for simulation
Parameter Value
Size of data packet 1024 bits
Size of control packet 176 bits
Prime energy 2.4 J
Energy for transferring one bit (ETX) 50 nJ/bit
Energy for receiving one bit (ERX) 50 nJ/bit
Energy for data aggregation (EDA) 5 nJ/bit
Energy of transmit amplifier considering free
space, propagation model
10 PJ/bit/m2
Energy of transmit amplifier considering
multi-path, propagation model
0.0013 PJ/bit/m4
Simulation area 100x100 m
Sensors distribution Random
Base-station position (50 m, 125 m)
Sensing range 10 m
4.2. Simulation results
4.2.1. SIICERP-LEACH and LEACH protocols
Figure 6 presents the effect of one part of IIER issue (i.e., sending redundant reporting packets from
sensors to their CHs). In this case, we run the simulation with 1000 rounds and one event is selected in a random
position per round. The number of sensors in the network is changed and the mean number of CHs is chosen
to be constant by selecting certain ratios of CHs (𝑝) for each corresponding number of sensors. For example,
for 100 sensors we set p=0.1, for 300 sensors, we set p=0.034, for 500 sensors, we set p=0.02, and for
700 sensors, we set p=0.0143. Figure 6 indicates that by applying SIICERP with LEACH, the number of
reporting packets sent to the CHs is limited to the number of events (i.e., 1000 events). This is because, with
SIICERP, each event is reported by one packet only. However, without SIICERP, the issue of IIER will be
shown clearly as the number of sensors over the network is increased; more sensors will redundantly send
packets to report one event.
In Figure 7, we illustrate the effect of the other part of the IIER issue (i.e., sending redundant reporting
packets from CHs to the BS to announce one event). To achieve this goal, we use 300 sensors with different
number of CHs. We run this simulation for 1000 rounds and with one event created in a random position during
each round. As we can see from Figure 7, SIICERP reduces the number of reporting packets sent from the CHs
to the BS to the number of events (i.e., 1000 events). Without SIICRP, this number is increased with increasing the
number of un-cooperated CHs that redundantly send many packets to report one event.
The results of a simulated scenario in which the proportion of CHs is 0.05, the events’ locations per
round are dispersed over a grid shape, and the number of sensors is 100, are shown in Figures 8 and 9 bearing
in mind that a single sensing range is considered as the shortest distance between events. This event allocation
is selected so that each sensor senses the nearest event to it in each round and certainly has a packet to report
it. Because the sensors are dispersed throughout the network, it's possible that various sensors detect the same
event. It is clear from Figures 8 and 9 that SIICERP-LEACH achieves higher performance compared to
LEACH protocol (i.e., 610% and 160% average improvements concerning the number of alive sensors and the
total residual energy, respectively).
Figures 10 and 11 present the results of the simulation scenario used for Figures 8 and 9 except that
in each round, a random number of events, which is uniformly distributed considering 1-50 interval, is chosen
whereas their locations are spread randomly across the network area. From Figures 10 and 11, it is observed that
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 868-879
876
the SIICERP improves the performance of LEACH protocol (i.e., 280% and 172% improvements regarding
the number of alive sensors and the total residual energy, respectively).
Figure 6. The number of reporting packets sent
from the sensors to their CHs in the LEACH
protocol with and without the proposed solution
Figure 7. The number of reporting packets sent
from the CHs to BS in the LEACH protocol with
and without the proposed solution
Figure 8. Number of sensors alive in the LEACH
protocol with and without the proposed solution.
Events locations have a grid distribution over the
simulation area
Figure 9. Total residual energy in the network in
the LEACH protocol with and without the proposed
solution. Events locations have a grid distribution
over the simulation area
Figure 10. Number of sensors alive in the LEACH
protocol with and without the proposed solution.
Events locations have a random distribution over
the simulation area
Figure 11. Total residual energy in the LEACH
protocol with and without the proposed solution.
Events locations have a random distribution over
the simulation area
10. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
877
4.2.2. SIICERP-LBCH and LBCH protocols
Since, in section 4.2.1, we thoroughly study the IIER problem. In this section, we just conduct two
simulation scenarios to demonstrate the impact of SIICERP on LBCH performance. In both scenarios, the ratio
of clusters is 0.05. However, in one of them, the events’ positions per round are located over a grid shape as
discussed before in section 4.2.1. Figures 12 and 13 present the results of this simulation. In the other scenario,
a random number of events (i.e., uniformly distributed in the range of 1 to 50) per round is selected and the
locations of them are randomly distributed over the network area. Figures 14 and 15 depict the results of this
scenario. From these figures, we can see that SIICERP effectively solves IIER issue.
Figure 12. The total number of sensors alive in the
LBCH protocol with and without the proposed
solution. Events locations have a grid distribution
over the simulation area
Figure 13. Total residual energy in the network in
the LBCH protocol with and without the proposed
solution. Events locations have a grid distribution
over the simulation area
Figure 14. Number of sensors alive in the LBCH
protocol with and without the proposed solution.
Events locations have a random distribution over
the simulation area
Figure 15. Total residual energy in the LBCH
protocol with and without the proposed solution.
Events locations have a random distribution over
the simulation area
5. CONCLUSION
In this work, we studied an important issue in cluster-based routing schemes for WSNs; we found that
many reporting packets are unnecessarily sent to the BS by the sensors and the CHs to report one event. Clearly,
this will consume more energy in network. Therefore, we proposed a new solution for this issue. The new
solution is basically based on generating a precise time-schedule, which will be received by all of the network's
nodes. This time-schedule leads to reporting any event using a single packet sent by the sensor that senses this
event and has the most remaining energy among all the sensors that sense the same event. Simulations show
that the proposed solution enhances the cluster-oriented routing schemes’ performance in the dimensions of
load balancing and WSNs’ lifetime.
REFERENCES
[1] S. Hong and K. Han, “Tree-based routing algorithms on wireless sensor networks: survey,” Journal of Systems and Information
Technology, vol. 16, no. 2, pp. 113-121, 2014, doi: 10.1108/JSIT-11-2013-0065.
[2] B. Gong and T. Jiang, "A tree-based routing protocol in wireless sensor networks," 2011 International Conference on Electrical
and Control Engineering, Yichang, 2011, pp. 5729-5732, doi: 10.1109/ICECENG.2011.6057953.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 868-879
878
[3] M. H. Anisi, A. H. Abdullah, A. S. Razak, and M. A. Ngadi, “An overview of data routing approaches for wireless sensor networks,”
Sensors (Basel), vol. 12, no. 4, pp. 3964-3996, 2012, doi:10.3390/s120403964.
[4] A. Kanavalli, D. Sserubiri, P. D. Shenoy, K. R. Venugopal, and L. M. Patnaik, “A flat routing protocol for sensor networks,” 2009
Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS), Delhi, 2009, pp. 1-5,
doi: 10.1109/ICM2CS.2009.5397948.
[5] H. Echoukairi, K. Bourgba, and M. Ouzzif, “A survey on flat routing protocols in wireless sensor networks,” International
Symposium on Ubiquitous Networking, vol. 366, 2015, pp. 311-324, doi: 10.1007/978-981-287-990-5_25.
[6] W. Dargie and J. Wen, “A simple clustering strategy for wireless sensor networks,” IEEE Sensors Letters, vol. 4, no. 6, pp. 1-4,
2020, Art no. 7500804, doi: 10.1109/LSENS.2020.2991221.
[7] R. T. Al-Zubi, M. Q. Alawad, A. A. Kreishan and K. A. Darabkh, “A yet efficient event reporting protocol for wireless sensor
networks,” 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, Canada, 2021,
pp. 1-5, doi: 10.1109/IEMTRONICS52119.2021.9422558.
[8] M. Mirzaie and S. M. Mazinani, “AFLCH: Self-adaptive unequal fuzzy based clustering of heterogeneous sensors in wireless sensor
networks,” 2020 28th Iranian Conf. on Electrical Engineering (ICEE), 2020, pp. 1-5, doi: 10.1109/ICEE50131.2020.9260624.
[9] K. A. Darabkh, E. N. AL-zoubi, F. A. Al-naimat, and A. F. Khalifeh, “Mobile sink optimization for enhancing data delivery in
wireless sensor networks,” 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver,
Canada, 2020, pp. 1-4, doi: 10.1109/IEMTRONICS51293.2020.9216356.
[10] B. Kumar, U. K. Tiwari, and S. Kumar, “Energy efficient quad clustering based on k-means algorithm for wireless sensor network,”
2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2020, pp. 73-77,
doi: 10.1109/PDGC50313.2020.9315853.
[11] P. K. Mishra and S. K. Verma, “A survey on clustering in wireless sensor network,” 2020 11th International Conference on
Computing, Communication and Networking Technologies (ICCCNT), 2020, pp. 1-5, doi: 10.1109/ICCCNT49239.2020.9225420.
[12] A. F. Khalifeh, H. Abid, and K. A. Darabkh, “Double Mobility WSN: exploiting the mobility of sink and cluster head nodes for
better WSN energy preservation and lifetime,” 2020 IEEE International IOT, Electronics and Mechatronics Conference
(IEMTRONICS), Vancouver, Canada, 2020, pp. 1-4, doi: 10.1109/IEMTRONICS51293.2020.9216449.
[13] L. Chen, W. Liu, D. Gong, and Y. Chen, “Cluster-based routing algorithm for WSN based on subtractive clustering,” 2020 Int.
Wireless Communications and Mobile Computing (IWCMC), 2020, pp. 403-406, doi: 10.1109/IWCMC48107.2020.9148244.
[14] K. A. Darabkh, W. Kassab, and A. Khalifeh, “Maximizing the life time of wireless sensor networks over iot environment,” 2020
Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 2020, pp. 270-274,
doi: 10.1109/FMEC49853.2020.9144826.
[15] P. K. Mishra and S. K. Verma, “OCSSP: Optimal cluster size selection-based clustering protocol using fuzzy logic for wireless
sensor network,” 2020 IEEE International Conference on Advent Trends in Multidisciplinary Research and Innovation (ICATMRI),
2020, pp. 1-4, doi: 10.1109/ICATMRI51801.2020.9398435.
[16] K. A. Darabkh, J. Zomot, Z. Al-qudah, and A. Khalifeh, “IEDB-CHS-BOF: Improved energy and distance based CH selection with
balanced objective function for wireless sensor networks,” 2020 Fifth International Conference on Fog and Mobile Edge Computing
(FMEC), Paris, France, 2020, pp. 275-279, doi: 10.1109/FMEC49853.2020.9144808.
[17] Z. Hammodi, A. A. Hilli, and M. Al-Ibadi, “Optimal placement of single cluster head in wireless sensor networks via clustering,”
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021, pp. 1157-1160,
doi: 10.1109/CCWC51732.2021.9376150.
[18] A. Khalifeh et al., “Wireless sensor networks for smart cities: Network design, implementation and performance evaluation,”
Electronics, vol. 10, no. 2, 2021, Art. No. 218, doi: 10.3390/electronics10020218.
[19] T. J. Swamy, G. Ramamurthy, and P. Nayak, “Optimal, secure cluster head placement through source coding techniques in wireless
sensor networks,” IEEE Communications Letters, vol. 24, no. 2, pp. 443-446, 2020, doi: 10.1109/LCOMM.2019.2953850.
[20] B. Zhu, E. Bedeer, H. H. Nguyen, R. Barton, and J. Henry, “Improved soft-k-means clustering algorithm for balancing energy
consumption in wireless sensor networks,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4868-4881, 2021,
doi: 10.1109/JIOT.2020.3031272.
[21] S. Umbreen, D. Shehzad, N. Shafi, B. Khan, and U. Habib, “An energy-efficient mobility-based cluster head selection for lifetime
enhancement of wireless sensor networks,” IEEE Access, vol. 8, pp. 207779-207793, 2020, doi: 10.1109/ACCESS.2020.3038031.
[22] Y. Tao, J. Zhang, and L. Yang, “An unequal clustering algorithm for wireless sensor networks based on interval type-2 TSK fuzzy
logic theory,” IEEE Access, vol. 8, pp. 197173-197183, 2020, doi: 10.1109/ACCESS.2020.3034607.
[23] A. Khalifeh et al., “Radio frequency based wireless charging for unsupervised clustered WSN: System implementation and
experimental evaluation,” Energies, vol. 14, no. 7, pp. 1-21, 2021, doi: 10.3390/en14071829.
[24] T. Zhang, G. Chen, Q. Zeng, G. Song, C. Li, and H. Duan, “Routing clustering protocol for 3D wireless sensor networks based on
fragile collection ant colony algorithm,” IEEE Access, vol. 8, pp. 58874-58888, 2020, doi: 10.1109/ACCESS.2020.2982691.
[25] Wafa’a Kassab and Khalid A. Darabkh, “A-Z survey of internet of things: Architectures, protocols, applications, recent advances,
future directions and recommendations,” Journal of Network and Computer Applications, vol. 163, 2020, Art. no. 102663,
doi: 10.1016/j.jnca.2020.102663.
[26] F. Lin, W. Dai, W. Li, Z. Xu, and L. Yuan, “A framework of priority-aware packet transmission scheduling in cluster-based
industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5596-5606, 2020,
doi: 10.1109/TII.2019.2944980.
[27] K. A. Darabkh, J. N. Zomot, and Z. Al-qudah, “EDB-CHS-BOF: Energy and distance based cluster head selection with balanced
objective function protocol,” IET Communications, vo. 13, no. 19, pp. 3168-3180, 2019, doi: 10.1049/iet-com.2019.0092.
[28] A. Arulmurugan, S. F. Waris, and N. Bhagyalakshmi, “Analysis of cluster head selection methods In WSN,” 2021 6th International
Conference on Inventive Computation Technologies (ICICT), 2021, pp. 114-119, doi: 10.1109/ICICT50816.2021.9358532.
[29] K. A. Darabkh, W. S. Al-Rawashdeh, R. T. Al-Zubi, and S. H. Alnabelsi, “C-DTB-CHR: Centralized density and threshold-based
cluster head replacement protocols for wireless sensor networks,” The Journal of Supercomputing, vol. 73, no. 12,
pp. 5332-5353, 2017, doi: 10.1007/s11227-017-2089-4.
[30] B. Pitchaimanickam, “Dragonfly algorithm for hierarchical clustering in wireless sensor networks,” 5th International Conference
on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 192-197, doi: 10.1109/ICICCS51141.2021.9432337.
[31] R. T. Ai-Zubi, N. Abedsalam, A. Atieh and K. A. Darabkh, “Lifetime-improvement routing protocol for wireless sensor networks,”
2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), Hammamet, Tunisia, 2018, pp. 683-687, doi:
10.1109/SSD.2018.8570628.
[32] H. Amirinia and R. Liscano, “Optimized application driven scheduling for clustered WSN,” 2020 International Symposium on
Networks, Computers and Communications (ISNCC), 2020, pp. 1-6, doi: 10.1109/ISNCC49221.2020.9297230.
12. Int J Elec & Comp Eng ISSN: 2088-8708
Solution for intra/inter-cluster event-reporting problem in … (Raed Taleb Al-Zubi)
879
[33] R. T. Al-Zubi, A. A. Kreishan, M. Q. Alawad and K. A. Darabkh, “On the event reporting of intra/inter-cluster sensor networks,”
2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, Canada, 2021, pp. 1-6, doi:
10.1109/IEMTRONICS52119.2021.9422549.
[34] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor
networks,” Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000, doi: 10.1109/HICSS.2000.926982.
[35] R. T. Al-Zubi, N. Abedsalam, A. Atieh, and K. A. Darabkh, “LBCH: Load balancing cluster head protocol for wireless sensor
networks,” Informatica, vol. 29, no. 4, pp. 633-650, 2018.
[36] A. More and V. Raisinghani, “A survey on energy efficient coverage protocols in wireless sensor networks,” Journal of King Saud
University-Computer and Information Sciences, vol. 29, no. 4, pp. 428-448, 2017, doi: 10.1016/j.jksuci.2016.08.001.
BIOGRAPHIES OF AUTHORS
Raed Taleb Al-Zubi received the PhD degree in Electrical and Computer
Engineering/Wireless communications and Networking from University of Arizona-USA, in
2010. His PhD thesis was under supervision of Prof. Marwan Krunz. Prof. Al-Zubi was
granted a full scholarship from the University of Jordan-Jordan to get his PhD degree. He
received BS and MS degrees in Electrical Engineering from the university of Jordan- Jordan,
in 2002 and 2005, respectively. He is currently a full professor at the department of electrical
engineering in the University of Jordan. His current research interests include system
architecture, communication protocol designs for wireless networks with emphasis on cross-
layer designs for ultra-wideband (UWB) networks, wireless sensor networks, cognitive radio
networks, biometrics, pattern recognition, optical communications, and image processing. He
can be contacted at email: r.alzubi@ju.edu.jo.
Abdulraheem Ahmed Kreishan received the BS degree in Electrical
Engineering from the University of Jordan-Jordan, in 2020. His graduation project was under
supervision of Prof. Raed Al-Zubi, with a title of “Energy Efficient Data Collection Protocol
for Wireless Sensor Networks”. He is currently a site engineer at Jordan School Expansion
Project (JSEP) funded by USAID. His current research interests include research &
development, communication protocol designs for wireless networks with emphasis on
routing and limitations issues, wireless sensor networks, networks and routers configurations,
CCNA, and renewable energy resources designing and installation. He can be contacted at
email: abdulraheem.kreishan97@gmail.com.
Mohammad Qasem Alawad received the BS degree in Electrical Engineering
from the university of Jordan- Jordan, in 2020. His current research interests focus on wireless
sensor networks. He can be contacted at email: m.qasem@bk.ru.
Khalid Ahmad Darabkh received the PhD degree in Computer Engineering
from the University of Alabama in Huntsville (UAH), USA, in 2007 with honors. He was
selected for inclusion in the Who's Who Among Students in American Universities and
Colleges. He was honored by UAH for being not only so outstanding, but also finishing the
PhD requirements along with publishing a massive number of reputable scientific articles in
record time. He has joined the Computer Engineering Department at the University of Jordan
as an Assistant Professor since 2007 and obtained a distinguished professorship in 2016. He
authored and co-authored of at least a hundred seventy highly esteemed research articles. He
is among World’s Top 2% Scientists List, for various disciplines, compiled by Stanford
University in 2020. Prof. Darabkh is the recipient of 2020 Federation of Arab Scientific
Research Councils Reward–Theme of Innovation. Prof. Darabkh is further the recipient of Ali
Mango Distinguished Researcher Reward for Scientific Colleges and Research Centers in
Jordan. He is among Top 5 JU Researcher’s List who published the highest number of quality
manuscripts in Scopus. He is engaged in research mainly on Internet of things, Software-
defined networks, vehicular networks, flying ad-hoc networks, Fog networking, Full duplex
cognitive radio networks, queuing systems and networks, multimedia transmission, channel
coding, steganography and watermarking, as well as innovative and interactive learning
environments. He can be contacted at email: k.darabkeh@ju.edu.jo.