Hybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network

Size: px
Start display at page:

Download "Hybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network"

Transcription

1 Middle-East Journal of Scientific Research 23 (10): , 2015 ISSN IDOSI Publications, 2015 DOI: /idosi.mejsr Hybrid Node Deployment Algorim to Mitigate e Coverage Whole Problem in Wireless Sensor Network L. Malai and R.K. Gnanamury 1 Asst.Professor/CSE, Vivekanandha College of Engineering for Women, Namakkal , Tamilnadu, India 2 Professor/ ECE, S.K.P Engineering College, Thiruvannamalai , Tamilnadu, India Abstract: Due to random deployment of static sensor nodes and environmental factors existence of holes in wireless sensor networks is inevitable. This holes results in reducing e data transmission performance and in additional energy consumption. Consequently, e hole problem is an important factor for prolonging e network lifetime. The network lifetime can be improved by deploying additional mobile sensors wi e initial static sensor deployment. Finding e number of additional sensors used is a optimization problem. To solve is we are proposing a Hybrid Electromagnetism like algorim (EM) wi genetic operators to obtain e best/optimal coverage of network area by sensor nodes. A new approach calculates e coverage rate of e sensors by using binary detection model and applies e EM wi genetic operators in order to obtain e optimal solution wiin e minimum iterations. A simulation result shows at e Hybrid EM algorim wi genetic operator performs better an basic GA based node redeployment. Key words: Coverage hole Node deployment Coverage hole healing Mobile sensors Hybrid sensor network Lifetime INTRODUCTION Intersection of ese points is called coverage point. Therefore, e main objective of e point coverage In recent years, e rapid developments of wireless protocols is to maximize e number of grid points at communication technology and microelectronics enables could be covered in e field. The coverage issue in wide application of e low-cost, low-power, multi- WSNs depends on many factors, such as e network function and tiny wireless sensor nodes. Hundreds and topology, sensor sensing model and e most important ousands of wireless sensor nodes distributed one is e deployment strategy at is used to distribute roughout a particular area constitute a wireless sensor or row e sensor nodes in e field [4]. The sensor network (WSN).[1] WSNs have widespread application nodes can be deployed eier manually based on a value and prospect in bo military and civil fields, such predefined design of e sensor locations, or randomly by as environmental monitoring, inventory management, dropping em from an aircraft. Random deployment is disaster recovery, object tracking and intrusion detection usually preferred in large scale WSNs not only because it and so on [2]. The Deployment of WSN may vary from is easy and less expensive but also because it might be application to application. It may contain static sensor or e only choice in remote and hostile environments. mobile sensor or hybrid of bo e sensors. However, random deployment of e sensor nodes can One of e key points in e design stage of a WSN cause holes formulation; erefore, in most cases, random at is related to e sensing attribute is e coverage of deployment is not guaranteed to be efficient for achieving e sensing field. In e literature, e coverage problem e required objective in terms of e coverage [3]. in WSNs has been addressed eier as point coverage or In order to overcome e problem of holes area coverage [3]. While area coverage protocols are formulation after initial deployment of e sensor nodes in designed to maximize e area of e sensing field at e sensing field, an efficient algorim at would could be covered, target coverage, on e oer hand, maximize e covered area or coverage point should be assumes at e sensing field is divided into grids. employed. In WSNs where all nodes are stationary, e Corresponding Auor: L. Malai, Asst.Professor/CSE, Vivekanandha College of Engineering for Women, Namakkal , Tamilnadu, India. 2500

2 area of e sensing field and e number of sensor nodes In [7, 8], auors have used Voronoi diagrams to are small, coverage can be maximized by manually detect coverage holes in mobile sensor networks. In [9], deploying additional nodes to e initially deployed ones. auors proposed a coverage hole detection meod However, in large scale WSNs where human intervention (CHDM) for mobile sensors by maematical analysis. It is not possible or when e sensing filed is hostile, is assumed at network consists of mobile nodes each random deployment is e only choice. wi sensing radius r and communication radius 2r. A In random deployment, e holes formulation node p is defined as neighbor of node q if it lies in its problem might be reduced or eliminated after initial communication range. On e basis of central angle deployment using one of two approaches. In e first between neighbor sensors, e auors presented approach, if all sensor nodes are mobile, en an efficient different cases to find coverage holes in communication algorim should be designed such at e coverage is circle around a redundant movable node. To patch hole, maximized while at e same time e moving cost of e a redundant node is moved to an appropriate position mobile nodes is minimized. In is case, e mobility inside e hole. In [10], e auors used e basic EM feature of e nodes can be utilized in order to maximize algorim for dynamic deployment of mobile sensor e coverage. After e initial configuration of e mobile network and avoid e coverage holes. nodes in e sensing field, an efficient algorim such as Researchers also used e hybrid of static and potential field algorim or virtual force algorim can be dynamic sensor nodes in order to improve e coverage. employed for e purpose of relocating e sensor nodes In [11], a bidding protocol was proposed, in which e [5]. static nodes are utilized as bidders and a number of mobile In e second approach, if e sensor nodes are nodes move accordingly to satisfy e coverage hybrid in which some of e nodes are stationary and e requirements. In [12], a distributed protocol was proposed oer are mobile, an efficient algorim should be at considers e different sensing capabilities of e employed in order to find e number and locations of e nodes using realistic sensing coverage model. In is mobile nodes at should be added after e initial protocol, e static nodes determine e uncovered areas deployment of e stationary nodes. One of e using a probabilistic coverage algorim and e mobile algorims at can be employed is an optimization nodes move accordingly using virtual force algorim. In algorim which is used to find an optimal or near optimal [13], several approaches were proposed based on virtual solution. This paper proposed an optimization algorim force algorim and paticle swarm optimization. The which is e hybrid of electromagnetism and GA obtained solutions were analyzed for better deployment operations to find number of sensor nodes at can be in e region of interest. Recently, a biogeography-based added after e initial node deployment in order to optimization algorim was proposed in [14] to maximize maximize e coverage. e coverage area of e network. Genetic algorims have This paper is organized as follows. Section 2 also been used to solve e problem of optimal node discusses e operation of e GA. Section 3 presents e deployment. In random deployment, genetic algorims related work. Section 4 discusses e assumptions and e are applied to determine near optimal positions for components of e proposed approach. Section 5 additional mobile nodes in order to maximize e coverage. presents simulation experiments and discusses e results In [15], a force-based genetic algorim was and Section 6 concludes e paper proposed, in which e mobile nodes utilize e sum of e forces used by e neighbors to choose eir direction. In Related Works: The WSN can have static node or mobile [16], a multi-objective genetic algorim running on a base node or hybrid of static and mobile sensor networks. This station was used. The base station determines where e section presents e existing algorim for each of e mobile nodes can move to maximize e coverage and category. In [6], e auors proposed 3MeSH (triangular minimize e travelled distance. The auors of [17] mesh self-healing hole detection algorim), which is a presented a triangular oriented diagram to detect a hole. distributed coordinate-free hole detection algorim for The auors connected e center of ree adjacent static sensors. If node detects presence of 3MeSH ring sensors to produce triangle and furer presented various defined by all its neighbors, en it is a boundary node. possibilities of occurrence of holes and en calculated For detecting large holes, nodes are allowed to collect e area which is not covered by any of em. This connectivity information from nodes furer away but at uncovered area is coverage hole. The approach is simple e cost of increased complexity. as compared to Voronoi diagram construction. 2501

3 Moreover, it can determine exact area of hole. In [18], e auors proposed a genetic algorim based node (2) deployment in order to optimize e network coverage and connectivity. They model e location of potential mobile sensor as chromosome in e solution apace of GA. The fundamental procedures of EM include initialize, EM based eory efficiently finds which mobile node local search, calculating total force and moving particles. should be moved in order get e maximum coverage. But The generic pseudo-code for e EM is as follows: it requires more number of iteration to find e optimal solution. GA based approaches find e optimum position Algorim 1. EM () of mobile sensor wi e minimum iterations. So in our proposed approach we combine e advantages of bo EM and GA to find e best optimal solutions. The purpose of is hybrid framework is to take e advantage of EM, which yields a high diversity population and GA operator let e algorim converge faster. Electromagnetism-Like Algorim: EM simulates e attraction-repulsion mechanism of electromagnetism eory which is based on Coulomb s law [19]. Each particle represents a solution and e charge of each particle relates to its solution quality. The better solution quality of e particle, e higher charge e particle has. Moreover, e electrostatic force between two point charges is directly proportional to e magnitudes of each charge and inversely proportional to e square of e distance between e charges. The fixed charge of particle i is shown as follows: i i best k where q is e charge of particle i, f(x )), f(x ) and f(x ) denote e objective value of particle i, e best solution and particle k. Finally, m is e population size. The solution quality or charge of each particle determines e magnitude of an attraction and repulsion effect in e population. A better solution encourages oer particles to converge to attractive valleys while a bad solution discourages particles to move toward is region. These particles move along wi e total force and so diversified solutions are generated. The following formulation is e force of particle i. (1) initialize() while (hasn t met stop criterion) do localsearch() calculate total force F() move particle by F() evaluate particles() End While Proposed Approach: In is section, we present our proposed approach The Fig.1 represents e overview of proposed system.. We first present e network assumptions and coverage model and en we discuss e hybrid approach. Network Assumptions: It was assumed at e sensor nodes are randomly deployed and equipped wi GPS and e base station node position is stationary. Furermore, e number of sensor nodes at are initially deployed equals e number of nodes at are required to achieve full coverage as if ese nodes were deterministically deployed. It was also assumed at few mobile nodes are available and can be used to repair e coverage holes after initial deployment of e stationary nodes. Coverage Model and Hole Detection: We assumed at each sensor node wi a sensing radius r can cover an area of circular shape. We also assumed at a Point P j can be detected by sensor S i if P j is wiin e sensing range of S. This can be represented using e binary i model of sensor detection which is given by Fig. 1: Overall view of Proposed System 2502

4 (3) Algorim 3. A Hybrid Framework where D is e distance between e point being sensed P j and e sensor node Si. The coverage function Coverage(S) equals 1 when e target object can be covered or sensed, oerwise it equals 0. If all e points wiin e deployment are covered by at least one node en e network is fully connected network. Oerwise we need to deploy additional mobile sensors to increase e coverage. Hybrid Approach for Mobile Sensor Deployment: The hybrid framework includes modified EM procedures and genetic operators, which adopts selection and mating. The selection operator is binary tournament and uniform crossover operator is applied in e framework. Generic EM provides an excellent diversity while GA is able to converge to a better solution quickly. Thus e hybrid meod takes e advantage of bo sides. The hybrid system starts wi determining which particle is moved by EM or mated by GA crossover operator. The new solution can be obtained from crossing between a better solutions selected by a binary tournament meod. And EM is used to move e inferior solution to a new position. This hybrid approach may encourage solutions converging toward better region quickly and to prevent from trapping into local optima by maintaining e population diversity. Algorim 2 is e pseudo code of e main procedures of e hybrid framework. The Algorim.3 presents our proposed approach. Algorim 2. A Hybrid Framework Initialize () while (hasn t met stop criterion) do local_search() avg calc_avgobjectivevalues() for i = 1 to m do if ((i best) and( f(xi ) < avg) en j a selected particle to mate particle i by binary tournament() uniform_crossover(xi, x j ) else if (f(xi ) > avg) en CalcForce() and Move(xi) end if end for evaluate particles() end while Initialize e Required Parameter: sensor detection radius r, communication range of e sensors comr, e size of e coverage area A, e number of static sensors Ns, Number of mobile sensors Nm, dimension of e population n parameter of GA crossover rate crrate, mutation rate murate, e maximum number of maxiteration iteration iteration are initialized Deploy e Static Sensors Randomly: Calculate e coverage ratio of static deployed nodes using (3) and find e optimum number of mobile sensors required to get e full coverage.initialize random locations for e deployment of mobile sensors. Deploy e Mobile Sensors Randomly Using: for t1=1 to m do for t2=1 to n do <Uniform(0,1) l k + ( u k- lk) end for end for (4) while iter maxiteration Calculate e Objective Function (fx) Values of e Sensors: In order to calculate e charges of e sensors which are deployed in e solution space randomly according to e particle model in e EM algorim, e objective function value of each sensor is calculated based on eir existing positions as follows: where f(xi) is e objective function value of sensor i, is e coordinate value in e k dimension of e sensor i. Calculate Charge of e Sensors: Sensors used in e network are assumed as a charged particle in e solution of e dynamic deployment problem. In order to calculate attraction-repulsion forces between e sensors based on e particle model of e EM algorim which is expressed by Algorim 1, e charge values of each sensor qi are calculated using (1). 2503

5 Detect e Optimal Distributed Mobile Sensors: Sensors which have been placed in optimal locations are detected wi e help (3) Middle-East J. Sci. Res., 23 (10): , 2015 Calculate e Resultant Force of Non-Optimal Sensors: A resultant force, fi, which is calculated according to (2) by adding up e forces applied by e oer sensors in e area to each sensor, is not optimal as a result of not being able to be placed in an optimal location, is applied to e non-optimal sensors. There is no need to calculate e resultant forces of optimal sensors. Because as it is stated on e next step, e 9 step, once and e sensors are placed on optimal locations, eir placements will not be changed so on. Fig. 2: Coverage ratio of different sensing ranges Update e Locations of Non-Optimal Sensors: Each nonoptimal sensor in e area updates its current location according to Algorim 2 by moving in e direction of e resultant force applied on it. iter = iter +1 end while Performance Evaluation: In is section, e performance of e proposed hybrid algorim is evaluated in terms of e amount of coverage (coverage ratio), degree of coverage (k-coverage) and number of additional mobile nodes. Moreover, e effect of e number of randomly deployed static nodes and e sensing ranges on coverage and number of additional mobile nodes were investigated. In e simulation environment, it was assumed at e sensor nodes were randomly deployed in 200m 200m sensor field. The number of static nodes deployed is set to 100. For e experiments e number of deployed mobile nodes is fixed to 30, while e sensing ranges vary from 10m to 20m. In e second experimente number of mobile node varies from 30 to 50. In each experiment, e coverage ratio, k- coverage was measured before and after applying e proposed algorim. Also e results were compared wi pure genetic algorim based node deployment, results shows e hybrid algorim performs better an e existing one. Effect of Sensing Range: Figure 2 shows e coverage ratio when e static nodes are randomly deployed and after adding 30 mobile nodes as a function of e sensing ranges. It is shown at e coverage ratio increases as e sensing radius of e deployed nodes increases. Fig. 3: Coverage ratio of different sensing ranges Fig. 4: Coverage ratio of different sensing ranges Fig. 5: Performance of Hybrid scheme 2504

6 Figure 3 shows e k-coverage when e static nodes 3. Wang, B., Coverage Problems in Sensor are randomly deployed and after adding e 30 mobile nodes as a function of e sensing ranges. As shown, e k- coverage increases as e sensing radii of e deployed nodes increase. This is because e coverage among sensor nodes wi large sensing range is very likely to overlap and hence more targets would be covered by multiple nodes. Figure 4 shows e number of additional mobile Networks -Survey, ACM Computing Surveys, 43(4): Younis, M. and K. Akkaya, Strategies and Tech for Node Placement in Wireless Sensor Networks: A Sur vey, Ad Hoc Networks, 6(4): Howard, A., M.J. Mataric and G.S. Sukhatm, Sensor Network Deployment using Potential Fields: nodes as a function of e sensing range. It is shown at A distributed, Scalable Solution to e Area e number of mobile nodes decreases as e sensing radii Coverage Problem, Proceedings of 6 International of e nodes increase. This is because more targets would Symposium on Distributed Autonomous Robotics be covered as e sensing range of e static nodes increases and hence less mobile nodes would be added to Systems, Fukuoka, June 2002, pp: increase e coverage ratio. 6. Li, X., D.K. Hunter and K. Yang, Distributed Figure 5 shows e performance of EM algorim, coordinate-free hole detection and recovery, in Genetic algorim and hybrid approach in terms of Proceedings of e 2006 IEEE GLOBECOM, San coverage ratio. The figure shows clearly at e hybrid Francisco, Calif, USA, November-December approach outperforms e case of random deployment of 7. Guiling, W., G. Cao and T. La Porta, e static nodes as e additional mobile nodes are Movement-assisted sensor deployment, in located into regions where targets are not covered by e rd Proceedings of e 23 Annual Joint Conference of static nodes. e IEEE Computer and Communications Societies, CONCLUSION IEEE, March Kanno, J., J.G. Buchart, R.R. Selmic and V. Phoha, Detecting coverage holes in wireless sensor This paper presents a hybrid framework to find an optimal solution to e coverage holes problem caused by random deployment of stationary sensor nodes in wireless sensor network. The coverage holes are detected by binary detection and ey are healed by adding mobile sensors wi e existing stationary sensors. The performance of e algorim was evaluated in terms of e coverage ratio, k-coverage and e number of additional mobile nodes requires for various sensing ranges. The results are also compared wi e existing algorims like EM and GA. The simulation results showed at e hybrid algorim can maximize e coverage of e sensing field by finding e minimum number of additional mobile nodes and eir best positions in e field. REFERENCES 1. Malai, L. and R.K. Gnanamury, Energy Efficient Data Collection Framework for WSN wi Layers and Uneven Clusters, International Review on Computers and Software (IRECOS), 9(4): Ahmed, N., S.S. Kanhere and S. Jha, The Holes Problem in Wireless Sensor Networks: A Survey, ACM SIGMOBILE Mobile Computing and Communications Review, 9(2): 4-8. networks, in Proceedings of e 17 Mediterranean Conference on Control and Automation (MED 09), pp: , Thessaloniki, Greece, June Zhao, E., J. Yao, H. Wang and Y. Lv, A coverage hole detection meod and improvement scheme in WSNs, in Proceedings of e International Conference on Electric Information and Control Engineering (ICEICE 11), pp: , April Recep ozdag and Ali Karci, Sensor Node Deployment Based on Electromagnetism-Like Algorim in Mobile Wireless Sensor Networks, International Journal of Distributed Sensor Networks Volume 2015, Article ID , pp: Wang, G., G. Cao and T. La Porta, A bidding protocol for deploying mobile sensors, in Proceedings of e 11 IEEE International Conference on Network Protocol (ICNP 03), pp: , November Ahmed, N., S. Kanhere and S. Jha, A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks, Wireless Communications and Mobile Computing, 11(1):

7 13. Wang, X. and S. Wang, Hierarchical 17. Babaie, S. and S.S. Pirahesh, Hole detection Deployment Optimization for Wireless Sensor for increasing coverage in wireless sensor network Networks, IEEE Transactions on Mobile using triangular structure, International Journal of Computing, 10(7): Computer Science Issues, 9(1): TMC Omar Banimelhem1, Moad Mowafi1 and Walid 14. Wang, G., L. Guo, H. Duan, L. Liu and H. Wang, Aljoby, Genetic Algorim Based Node Dynamic Deployment of Wireless Sensor Networks Deployment in Hybrid Wireless Sensor Networks by Biogeography Based Optimization Algorim, Communications and Network, 5: , November Journal of Sensor and Actuator Networks, Vol. 1, No : Birbil, S.I. and S.C. Fang, An 15. Sahin, C. et al., Design of Genetic Algorims electromagnetism-like mechanism for global for To- pology Control of Unmanned Vehicles, optimization, Journal of Global Optimization, International Journal of Applied Decision Sciences, 25: (3): Qu, Y. and S. Georgakopoulos, Relocation of Wireless Sensor Network Nodes using a Genetic Algorim, Pro-ceedings of 12 Annual IEEE Wireless and Microwave Technology Conference (WAMICON), Clearwater Beach, April 2011, pp:

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and

More information

Distributed Coordinate-free Hole Recovery

Distributed Coordinate-free Hole Recovery Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ xliw@essex.ac.uk Abstract This paper proposes a distributed

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153

Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153 Int. J. Sensor Networks, Vol. 5, No. 3, 2009 153 Distributed coordinate-free algorithm for full sensing coverage Xiaoyun Li Complex and Adaptive Systems Laboratory, University College Dublin, Dublin 4,

More information

Modified Coverage Hole Detection Algorithm for Distributed WSNs

Modified Coverage Hole Detection Algorithm for Distributed WSNs Modified Coverage Detection Algorithm for Distributed WSNs K. Lakshmi Joshitha 1 and Dr.S.Jayashri 2 1 Research Scholar, Anna University, Chennai, India Email: lakshmijoshitha@yahoo.com 2 Director, Adhiparasakthi

More information

Keywords coverage holes, energy efficient, hole detection, hole healing

Keywords coverage holes, energy efficient, hole detection, hole healing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and

More information

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2

Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014

More information

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm , pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College

More information

A Bidding Protocol for Deploying Mobile Sensors

A Bidding Protocol for Deploying Mobile Sensors A Bidding Protocol for Deploying Mobile Sensors Guiling Wang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 1 Email: {guiwang,gcao,tlp}@cse.psu.edu

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed 1,2 nahmed@cse.unsw.edu.au 1 Computer Science and Engineering, University of New South Wales, Sydney, Australia. Salil S. Kanhere 1 salilk@cse.unsw.edu.au

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Coverage Hole Detection in Wireless Sensor Networks

Coverage Hole Detection in Wireless Sensor Networks Coverage Hole Detection in Wireless Sensor Networks Rakesh Kumar 1, Sakshi Dhingra 2 1, 2 Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar, Haryana,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

A Service Revenue-oriented Task Scheduling Model of Cloud Computing Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION

APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,

More information

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Hole Detection and Healing Using Heal Algorithm

Hole Detection and Healing Using Heal Algorithm Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department

More information

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE

STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE STUDY OF MOBILE NODE BASED COVERAGE RECOVERY PROCESS FOR WSN DEPLOYED IN LARGE FOOD GRAIN WAREHOUSE Neha Deshpande 1 & A. D. Shaligram 2 1 A.G.College, Pune, Maharshtra, India 2 Dept. Of Electronic Science,

More information

Repairing Sensor Network Using Mobile Robots

Repairing Sensor Network Using Mobile Robots Repairing Sensor Network Using Mobile Robots 1 Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent

More information

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)

More information

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks G.Sumalatha #1, N.Zareena *2, Ch.Gopi Raju #3 #1&2 Asst.Prof, Department of CSE, Vignan's LARA Institute Of Technology & Science,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China

More information

Detection And Recovery Of Coverage Holes In WSN Using Grid Based Clustering

Detection And Recovery Of Coverage Holes In WSN Using Grid Based Clustering INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 7 12 Detection And Recovery Of Coverage Holes In WSN Using Grid Based Clustering Anjna Paul, Anjali Chaudhary

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

A GENETIC ALGORITHM FOR RESOURCE LEVELING OF CONSTRUCTION PROJECTS

A GENETIC ALGORITHM FOR RESOURCE LEVELING OF CONSTRUCTION PROJECTS A GENETIC ALGORITHM FOR RESOURCE LEVELING OF CONSTRUCTION PROJECTS Mahdi Abbasi Iranagh 1 and Rifat Sonmez 2 Dept. of Civil Engrg, Middle East Technical University, Ankara, 06800, Turkey Critical path

More information

Holes in Wireless Sensor Network

Holes in Wireless Sensor Network HOLE DETECTION AND HEALING FOR A RoI IN WIRELESS SENSOR NETWORKS Divya K Suku, Phini Ann Philip PG Scholar, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala Assistant Professor, Department

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and

More information

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks

An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks An Optimal Algorithm for Coverage Hole Healing in Hybrid Sensor Networks Dung T. Nguyen, Nam P. Nguyen, My T. Thai, Abdelsalam Helal Department of Computer and Information Science and Engineering, University

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Defending Wireless Sensor Networks Against Adversarial Localization

Defending Wireless Sensor Networks Against Adversarial Localization Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,

More information

DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR

DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR Khaled Almi ani, Muder Almi ani, Ali Al_ghonmein and Khaldun Al-Moghrabi ABSTRACT Al-Hussein Bin Talal University, Ma an, Jordan

More information

Partial Coverage in Homological Sensor Networks

Partial Coverage in Homological Sensor Networks !000000999 IIIEEEEEEEEE IIInnnttteeerrrnnnaaatttiiiooonnnaaalll CCCooonnnfffeeerrreeennnccceee ooonnn WWWiiirrreeellleeessssss aaannnddd MMMooobbbiiillleee CCCooommmpppuuutttiiinnnggg,,, NNNeeetttwwwooorrrkkkiiinnnggg

More information

Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks

Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks Amitabha Ghosh Honeywell Technology Solutions Laboratory 151/1 Doraisanipalya, Bannerghatta Road Bangalore 560076, INDIA amitabhaghosh@honeywellcom

More information

SCHEDULING IN CLOUD COMPUTING

SCHEDULING IN CLOUD COMPUTING SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism

More information

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7148, USA E-mail: jing@cs.uno.edu Abstract.

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Relocating Sensor Nodes to Maximize Cumulative Connected Coverage in Wireless Sensor Networks

Relocating Sensor Nodes to Maximize Cumulative Connected Coverage in Wireless Sensor Networks Sensors 2008, 8, 2792-2817 sensors ISSN 12-8220 2008 by MDPI www.mdpi.org/sensors Full Research Paper Relocating Sensor Nodes to Maximize Cumulative Connected Coverage in Wireless Sensor Networks Vedat

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

A Genetic Algorithm-Evolved 3D Point Cloud Descriptor

A Genetic Algorithm-Evolved 3D Point Cloud Descriptor A Genetic Algorithm-Evolved 3D Point Cloud Descriptor Dominik Wȩgrzyn and Luís A. Alexandre IT - Instituto de Telecomunicações Dept. of Computer Science, Univ. Beira Interior, 6200-001 Covilhã, Portugal

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University

More information

Génération de colonnes et réseaux de capteurs sans fil

Génération de colonnes et réseaux de capteurs sans fil Génération de colonnes et réseaux de capteurs sans fil André Rossi, Alok Singh, Marc Sevaux ( ) Lab-STICC, Université de Bretagne-Sud, Lorient, France ( ) DCIS, University of Hyderabad, Hyderabad, India

More information

Secured Medical Information Transmission Using Chaos Through Cloud Computing

Secured Medical Information Transmission Using Chaos Through Cloud Computing Middle-East Journal of Scientific Research 23 (10): 2552-2558, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.10.22764 Secured Medical Information Transmission Using Chaos

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Neubrückstrasse 10, 3012

More information

Coverage in Wireless Sensor Networks: A Survey

Coverage in Wireless Sensor Networks: A Survey Coverage in Wireless Sensor Networks: A Survey Raymond Mulligan Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer Science, Hofstra University Hempstead, NY 11549,

More information

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India

More information

MCTA: Target Tracking Algorithm based on

MCTA: Target Tracking Algorithm based on This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on

More information

Search Algorithm in Software Testing and Debugging

Search Algorithm in Software Testing and Debugging Search Algorithm in Software Testing and Debugging Hsueh-Chien Cheng Dec 8, 2010 Search Algorithm Search algorithm is a well-studied field in AI Computer chess Hill climbing A search... Evolutionary Algorithm

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling

Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling R.G. Babukartik 1, P. Dhavachelvan 1 1 Department of Computer Science, Pondicherry University, Pondicherry, India {r.g.babukarthik,

More information

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility

More information

Energy Efficient Coverage for Mobile Sensor Network

Energy Efficient Coverage for Mobile Sensor Network Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Mobile Phone Tracking & Positioning Techniques

Mobile Phone Tracking & Positioning Techniques Mobile Phone Tracking & Positioning Techniques Laxmana Siridhara Arigela #1, Putta Aditya Veerendra *2, Simhadri Anvesh *2, Kolisetty Sandeep Satya Hanuman #3 1 Assistant Professor, Department of ECE,

More information

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, 07ee055@ms.dendai.ac.jp

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and

More information

Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province

Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province Ran Cao 1,1, Yushu Yang 1, Wei Guo 1, 1 Engineering college of Northeast Agricultural University, Haerbin, China

More information

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of

More information