SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Journal of Computer Science andand Engineering Research and
 Journal of Computer Science Engineering Research and Development (JCSERD), ISSN XXXX –
                                                                  JCSERD
DevelopmentISSN XXXX – ISSN XXXX – XXXX(Print), 1, May -October (2011)
 XXXX(Print), (JCSERD), XXXX(Online), Volume 1, Number
ISSN XXXX – XXXX(Online)
Volume 1, Number 1, May -October (2011)
                                                               © PRJ PUBLICATION
pp. 17- 29 © PRJ Publication
http://www.prjpublication.com/JCSERD.asp



    AN ENERGY EFFICIENT TOPOLOGY CONTROL FOR 3-TIER
   WSN USING GENETIC ALGORITHM BASED HIERARCHICAL
               COOPERATIVE TECHNIQUE

                               S. Emalda Roslin1, C.Gomathy2
                        1
                           Research Scholar, Sathyabama University,
                   2
                     Prof. & Head/ Dept. of E & C, Sathyabama University
                                 1
                                   roemi_mich@yahoo.co.in

ABSTRACT

Topology control plays a vital role in maximizing the network lifetime and in increasing
the network capacity of a Wireless Sensor Network (WSN). In this paper, a three tier
architecture based topology control algorithm which increases the overall energy
efficiency of WSN is presented. The lower tier involves clustering of sensor nodes which
forms cluster slaves for the purpose of data gathering. The second tier comprises of
cluster heads, which are responsible for transferring data between cluster slaves and super
heads. The third tier consist of super heads, forms a communication network consisting
of super heads, where data forwarding between the super heads to the sink node, takes
place. The third tier forms a communication subnet. Cluster head selection and super
head selection is a critical process in the three tier architecture. So a new methodology
based on genetic algorithm for cluster head selection and super head selection, a
hierarchical cooperative technique which takes care of the nodes bandwidth, residual
energy and memory capacity is proposed and implemented. Simulation results prove the
effectiveness of our algorithm.

Keywords— Bandwidth, Clustering, Genetic Algorithm, Memory Capacity, Residual
Energy , Topology Control, Wireless Sensor Network

1 INTRODUCTION

   Wireless Sensor Network (WSN) comprises of complex sensors with limited power
supplies, low bandwidth, minimum memory capacity and limited energy. Each sensor has
a low power battery as the energy source which cannot be replaced. By the effective
utilization of the nodes battery, an energy efficient network can be obtained. This leads to
the development of Topology Control, which is nothing but maintaining the desired
properties of the network like connectivity, coverage etc., by reducing the energy
consumption and enhancing the network capacity.


                                            17
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

   Topology Control can be broadly categorized in to any of the two approaches. They are
power Control mechanism and power management mechanism [1]. Adjusting the
transmitting power of each node dynamically is termed as power control [2][3][4][5].
Power management is switching off the redundant nodes that are not involved in
transmission nor reception [6][7][8][9][10]. By integrating power control and power
management algorithms it is possible to increase the energy efficiency of a wireless
sensor network.




                                 Fig 1. Network Topology

   Many topology control algorithms are presented in the literature using single tier and
two tier architecture. It has been proved that two tier architecture provides a better
performance compared to the other architectures [11-12].Two tier architecture is based on
clustering, in which, nodes are grouped into several non overlapping regions called
clusters. Clustering greatly reduces the communication costs incurred by sending data to
the nearby Cluster head, instead of directly communicating to the sink which is far away.
Using clusters for transmitting data to the sink, leads to small transmit distances for the
slave nodes and far transmit distances only for few cluster head nodes [11-14].




Fig. 2. Two tier Architecture    Fig. 3. Three tier Architecture

   In this paper, a three tier architecture is developed. The lower tier forms with cluster
slaves, the middle tier with cluster heads and the upper tier comprises of super heads. The
cluster slaves gather the data and forward it to their cluster head. The cluster head
receives data from the slaves and pass it to their near by super head. The upper tier forms
a communication subnet, where the data forwarding to the sink takes place via super
heads. Genetic algorithm is used for the selection of cluster heads and super heads. Once
the cluster heads were elected, the resource rich nodes among them were elected as super
heads. The total energy consumed and the network lifetime were also calculated for the
proposed methodology.


                                            18
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

  The paper is organized in the following order: In section 2 overview of genetic
algorithm is given. The proposed GAHCT methodology is discussed in section 3
followed by the results and discussions in section 4. Finally in section 5 conclusion and
future work is given.

II OVERVIEW OF GENETIC ALGORITHM

   Genetic Algorithm (GA) is an evolutionary tool that is used to solve different varieties
of problem that are not easy to solve using normal methodologies. A GA maintains an
initial population for the problem at hand, and makes it resolve by applying a set of
stochastic operators iteratively [5].




                           Fig 4: Flowchart of Genetic Algorithm

  The repeated processing of the above operations generates best individuals suited for
the given application.

III PROPOSED METHODOLOGY

  Energy, Bandwidth and Memory Capacity are the limited resources for a WSN. Taking
these factors into consideration, the Genetic Algorithm based hierarchical Cooperative
Technique is proposed. Using this methodology an efficient network can be generated.
As the initial step, best nodes called Cluster Head (CH) nodes are to be selected.
Remaining nodes used for collection of data are called Cluster Slaves (CS). The resource



                                            19
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

rich nodes among the cluster heads are elected as Super Heads (SH) for data forwarding
to the sink node.
    Initially nodes are deployed in a random fashion. Every node launches and receives
“Hello” messages from its neighbors with its minimum transmission range and wait for a
random amount of time. On receiving the “Hello” message each node will calculate its
Residual energy, Bandwidth and Memory capacity. These details are sent along with the
“Ack” message. Based on the residual energy values in the “Ack” message, nodes are
categorized in to Normal Nodes (Residual Energy > 20%), Warning Nodes (Residual
Energy between 10 – 20 %), and Danger Nodes (Residual Energy <10 %). The danger
nodes are not eligible for involving in the communication. So these nodes are moved to
Sleep state for a predefined time period. After considering the residual energy of the
neighbors, the Bandwidth and Memory capacity of the Normal nodes and Warning nodes
are considered and compared. The node with higher Bandwidth and Memory at a
particular time is elected as Cluster Heads and the other nodes are listed as Cluster
Slaves. After a predefined time, cluster heads with maximum residual energy, bandwidth
and memory capacity are elected as super heads. These super heads form the
communication subnet, through which data is forwarded to the sink node. The data
transmission between the super nodes takes place using minimum transmission power to
reach the sink node.
   In the proposed methodology, each node is declared as a boolen operator which can
either be True or False. On receiving the Hello message, a comparison on the node's
weight NodeWT (based on Energy, Bandwidth and memory capacity) is made with the
neighbor NeighWT which sends the Hello message. If the NodeWT > NeighWT then the
operator is set as True which means the node is a Cluster Head. If NodeWT < NeighWT
then the operator is set as False, which says node is a Cluster Slave. Like wise for a
period of time some nodes will act as Cluster Heads and some as Cluster slaves. During
that period, Cluster Heads exchange Hello mesaages. The Cluster heads whose NodeWT
> NeighWT are declared as Super heads. After a constant period of time, once again
Hello messages were exchanged, and a new set of Super Heads, Cluster Heads and
Cluster Slaves were selected. By repeatedely changing the heads and slaves, exploitation
of energy over a constant set of nodes can be overcome, thereby the network connectivity
can still be maintained.
A GAHCT ALGORITHM:
     Step 1: Randomly place nodes as initial population
     Step 2: Calculate the fitness function for all individual nodes which uses Remaining
     energy, Bandwidth and Memory capacity
     Step 3: Select nodes with best fitness value as cluster heads for reproduction
     Step 4: Recombine between individual nodes
     Step 5: Mutate individual nodes
     Step 6: Calculate the fitness for the modified individual Nodes
     Step 7: Repeat till a good new population of cluster heads are obtained
     Step 8: The above steps are repeated for the cluster heads to select super heads among
     them
     The flow chart for selection of Cluster Heads is shown in figure 5. The same
     procedure is repeated for the selection of Super Heads.


                                            20
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)


                          Node Deployment



                       Send “Hello” Message



                       Wait for Random time



                     Receive “Ack” that includes
                    Residual Energy, BW, Memory
                              Capacity




                                                  No
                             Residual
                                                            Declare as Danger
                             Energy >
                                                            Node & Switch Off
                               10%


                                        Yes

                                                No
                             Residual
                             Energy >
                               20%


                                         Yes



                                                       No
                              Bandwidh
                                  >
                              Threshold



                                      Yes


                                                  No

                             Memory >                        Declare as Warning
                             Threshold                        Node & List as
                                                               Cluster Slaves


                                          Yes

                        Declare as Cluster Head


                Fig. 5. Flow Chart of GAHCT for Cluster Head Selection




                                                       21
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

IV RESULTS AND DISCUSSION

   Initially network of 50 nodes is deployed and the proposed GAHCT algorithm is
implemented. Since a random initial population has been generated, the number of cluster
slaves, cluster heads and super heads in every iteration is different. More number of
iterations is done. Average of super heads, cluster heads and cluster slaves is taken and is
plotted. in figure 6. From the figure, it is inferred that cluster slaves are more in number
when compared to the cluster heads and super heads. This also leads to an effective data
gathering process.

                                                     36

                                   40

                                   35
        Average of CS, CH and SH




                                   30

                                   25

                                   20
                                                                     10
                                   15
                                                                                    4
                                   10

                                    5

                                    0
                                        Clus ter Slaves   Cluster Heads   Super Heads




                                        Fig 6. Average of CS, CH and SH
  .
   A network scenario with 50 sensor nodes and 1 sink node, whose x, y and z
coordinates were known, is deployed and the scenario is termed as Network Deployment
#1. Using NS-2.34, network deployment #1 is simulated with the parameters given in
Table 1 and the network animator screen is shown is figure 7. For this scenario the
energy consumed by all the nodes in the network is calculated. The energy consumed to
transmit k bits message over a distance d is given by,
                        ETX (k,d) =EElec*k+€amp*k*d2            (1)
   Where EElec is the radio energy dissipation and € amp is transmit amplifier dissipation.
Using the above equation, the energy consumed to transmit data from all the nodes in the
network [2] through the cluster heads to the sink node using GAHCT is calculated.
                           TABLE I. THE SIMULATION PARAMETERS

                                             Parameters                                                  Value

    Deployment Region                                                                   1000 m x 1000 m

    Number of Nodes                                                                     50,100,150,200,250

    Initial Energy                                                                      1 , 2 , 3 , 4 Joules

    Simulation Time                                                                     50, 100, 150, 200, 250, 300 seconds

    Transmission Power                                                                  0.8 mW



                                                                                            22
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

      Receiving Power                     0.2 mW

      Idle Power                          0.003 mW

      Transmission Rate                   250 Kbps




                                            Cluster
                                            Heads

                                             Super
                                             Heads

                                             Cluster
                                             Slaves




                     Fig. 7. Network Animator screenshot for GAHCT
   For deployment #1, the network lifetime is calculated by finding the time elapsed for
the first node to reach a threshold energy level. The initial energy of the nodes is varied
from 1 J to 4 J. In each case, different thresholds γ1, γ2, and γ3 are set for election of CS,
CH and SH. The average network lifetime and the average of the total energy
consumption is calculated and is tabulated in table 2. The network lifetime for
deployment #1 is also calculated by varying the simulation time from 50 to 300 seconds.
The results obtained are plotted in figure 8.
            TABLE II. AVERAGE NETWORK LIFETIME BY VARYING INITIAL ENERGY


                   Threshold value (for
   Initial       CS,CH & SH selection)    Total Energy Average Energy      Average Network
  Energy                                  Consumption Consumption              Lifetime
 (Joules J)                                 (Joules)      (Joules)              (Sec)
              γ1 (J)   γ2 (J)   γ3 (J)


  1           0.75     0.5      0.2         16.9          0.33              19.4


  2             1.8      1      0.3         52.3          1.04              30.33


  3             2      1.75     0.75        54.17         1.08              31


  4             3.5 2.5         1.5         82.78         1.65              41.31




                                             23
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

The average network lifetime by varying the initial energy levels for a network density of
50 nodes is obtained as 30.53 seconds. The average network lifetime calculated by
varying the network simulation time for a constant density of 50 nodes is obtained as
31.03 seconds. In figure 8 the dip in the graph shows a decreased network lifetime due to
more energy drain during that simulation instance. The total energy consumption is also
calculated as 101.4 J using the proposed methodology for various network densities and
is plotted in figure 9.




               Fig. 8 Average Network Lifetime by varying simulation time




                  Fig 9. Total Energy Consumption of 3 tier architecture
                                                     3-

   The network topology of one tier architecture (before applying GAHCT) is shown in
figure 10. In this a mesh topology is obtained where each node gets connected to all the
nodes in the network. This leads to a more complex network. Figure 11 shows the
topology of a two tier architecture using the proposed GAHCT, where only two tiers are
     ogy
present (network with CS and CH). The topology obtained after applying GAHCT for
three tier architecture is shown in figure 12, 13, 14 and 15. On comparing figure 10 and
figure 15, it is well proved that GAHCT reduced the number of links between the nodes
   ure
in the network to the maximum. Thus reducing the number of links leads to a more
energy efficient network




                                           24
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)




                                                30


                                                20




                                       Nodes→
                                                10


                                                0
                                                     0
                                                         200
                                                               400                                                        1000
                                                                                                                   800
                                                                     600                                    600
                                                                           800                     400
                                                                                          200
                                                           x position→           1000
                                                                                    0      y position→




                   Fig.10. Network Topology of One – tier architecture




                                  25

                                  20

                                  15
                         Nodes→




                                  10

                                   5

                                   0
                                           0                                                                                      1000
                                                         200                                                               800
                                                                400                                                600
                                                                           600                              400
                                                                                    800              200
                                                                                              1000
                                                                                                0          y position→
                                                                      x position→


                   Fig.11. Network Topology of Two – tier architecture




                                  25

                                  20
                        Nodes→




                                  15

                                  10

                                   5
                                                                                                                               1000
                                   0
                                                                                                                         800
                                        0
                                                                                                                   600
                                                         200
                                                                 400                                         400
                                                                            600
                                                                                                      200
                                                                                        800
                                                                     y position→                 1000 x position→
                                                                                                   0




                   Fig.12. Cluster formation (lower tier) using GAHCT




                                                                                        25
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)




                                   30

                                   20




                          Nodes→
                                   10

                                        0
                                                                                                                                      1000
                                                 0
                                                                                                                               800
                                                             200
                                                                                                                        600
                                                                     400
                                                                             600                                 400

                                                                                     800                200
                                                                           y position→
                                                                                                 1000
                                                                                                 0            x position→




                     Fig.13. Cluster Heads (middle tier) using GAHCT




                                                 20
                                        Nodes→




                                                 10



                                                     0
                                                                                                                                       800
                                                         0
                                                             200                                                               600

                                                                      400                                              400
                                                                              600
                                                                                                           200
                                                                                       800
                                                                   y position→
                                                                                                 1000x position→
                                                                                                    0




     Fig.14. Super Heads forming Communication Subnet (upper tier) using GAHCT




                                          40
                               Nodes→




                                          20


                                             0                                                                                               1000
                                                     0                                                                               800
                                                              200
                                                                                                                              600
                                                                       400
                                                                                                                       400
                                                                                 600
                                                                                           800                200
                                                                       y position→
                                                                                                    1000
                                                                                                      0       x position→




                  Fig.15. Network Topology of a Three – tier architecture

                                                                                       26
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)



V CONCLUSIONS AND FUTURE WORK

The proposed methodology which uses a Genetic Algorithm based Hierarchical
Cooperative Technique classifies each node in the network either as Super Head, Cluster
Head or as Cluster Slave. Group of Cluster Slave nodes form the lower tier of the
network, Cluster Head nodes form the middle tier of the network and Super Head nodes
forms the upper tier of the network. The upper tier acts as a communication subnet. Since
GA is used and the fitness function includes residual energy, bandwidth and memory
capacity, a best set of Super Heads and Cluster Heads were selected. Using these Super
Heads, efficient data forwarding takes place using the minimum transmission energy.
Network lifetime for a network density of 50 nodes, by varying energy levels is obtained
as 30.53 sec which is better than that of previous techniques. As an enhancement of this
work, the proposed methodology can be implemented for various network densities and
the network parameters can be analyzed.

REFERENCES

[1]     Mo Li, Baijian Yang,”A Survey on Topology issues in Wireless Sensor Network”
citeseerx.ist.psu.edu/viewdoc/download
[2]     Dongjin Son, Bhaskar Krishnamachari, and John Heidemann ,”Experimental
study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor
Networks”, Proceedings of the First IEEE Conference on Sensor and Adhoc
Communication and Networks , pp. 289-298.. October, 2004
[3]     Shan Lin, Jingbin Zhang, Gang Zhou, Lin Gu, Tian He†, and John A. Stankovic,
“ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks”,Pages:
223 – 236,SenSys’06, November 1–3, 2006,
[4]     Junseok Kim; Sookhyeon Chang; Younggoo Kwon ,”ODTPC: On-demand
Transmission Power Control for Wireless Sensor Networks”, Information Networking,
ICOIN2008 Volume , Issue , 23-25 Jan. 2008 Journal of Indian institute of science
[5]     B. Zurita Ares, P. G. Park, C. Fischione, A. Speranzon, K. H. Johansson, “On
Power Control for Wireless Sensor Networks: System Model”, Middleware Component
and Experimental Evaluation citeseerx.ist.psu.edu/viewdoc/download
[6]     Amit Sinha,Anantha Chandrakasan “Dynamic Power Management in Wireless
Sensor Networks” IEEE Design & Test of Computers 2001,pp 62 – 74
[7]     Jonathan Hui, Zhiyuan Ren, and Bruce H. Krogh, ” Sentry-Based Power
Management in Wireless Sensor Networks”, pp. 458–472, 2003. Springer-Verlag Berlin
Heidelberg 2003
[8]     Ya Xu, Solomon Bien ,Yutaka Mori, John Heidemann,”Topology Control to
Conserve            Energy        in          Wireless        Adhoc           Networks”
http://www.isi.edu/johnh/PAPERS/y004a.html                              January23,2003
citeseerx.ist.psu.edu/viewdoc/download
[9]     Marcel Busse and Wolfgang Efeelberg ,”Conserving Energy with topology
control in wireless sensor networks”, http://www.informatick.uni-mannheim.de




                                           27
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

[10] Safwan Al-Omari and Weisong Shi,” Redundancy-Aware Topology Management
in Wireless Sensor Networks” http://www.cs.wayne.edu/~weisong/papers/omari06-
topology-management.pdf
[11] Shiyuan Jin, Ming Zhou, Annie S. Wu,” Sensor Network Optimization Using a
Genetic Algorithm “ Available: http://citeseerx.ist.psu.edu/viewdoc/doi=10.1.1.75.9685
[12] G. Ahmed, N. M. Khan, and R. Ramer,”Cluster Head Selection Using
Evolutionary Computing in Wireless Sensor Networks”, PIERS Proceedings, Hangzhou,
China, March 24-28, 2008. pp.883-886.
[13] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan.” Energy-Efficient
Communication Protocol for Wireless Micro-sensor Networks”, In Proceedings of the
Hawaii International Conference on System Science, Maui, Hawaii,2000.
[14] S. Emalda Roslin, Dr. C.Gomathy ,”GAHCT: Genetic Algorithm Based
Hierarchical Cooperative Technique for Energy Efficient Topology Control in Wireless
Sensor Networks”, CiiT International Journal of Wireless Communication ,Vol 3, No 5,
April 2011. On pages:327 -334 ISSN 0974 – 9756, Impact Factor -0.572
[15] Shiyuan Jin, Ming Zhou, Annie S. Wu,” Sensor Network Optimization Using a
Genetic Algorithm “ Available: http://citeseerx.ist.psu.edu/viewdoc/doi=10.1.1.75.9685
[16] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan.” Energy-Efficient
Communication Protocol for Wireless Micro-sensor Networks”, In Proceedings of the
Hawaii International Conference on System Science, Maui, Hawaii,2000.
[17] G. Ahmed, N. M. Khan, and R. Ramer,”Cluster Head Selection Using
Evolutionary Computing in Wireless Sensor Networks”, PIERS Proceedings, Hangzhou,
China, March 24-28, 2008. pp.883-886.
[18] Ching-Tsung Hsueh, Yu-Wei Li, Chih-YuWen and Yen-Chieh Ouyang ,”Secure
Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks”, Sensors 2010, pp.
1251-1278; doi:10.3390/s100201251
[19] Assaf Zaritsky,” Introduction to Genetic Algorithms”, Available:
http://www.cs.bgu.ac.il/~assafza ,Ben-Gurion University, Israel
[20] Jin Fan, D.J.Parish,”Using a Genetic Algorithm to optimize the Performance of a
Wireless Sensor Network “, ISBN: 1-9025-6016-7 © 2007 PGNet
[21] Amol P. Bhondekar, Renu Vig, Madan Lal Singla, C Ghanshyam, Pawan Kapur
,”Genetic Algorithm Based Node Placement Methodology For Wireless Sensor
Networks”, Proceedings of IMECS 2009, March 18 - 20, 2009, Hong Kong.
[22] Sajid Hussain, Abdul Wasey Matin, Obidul Islam,”Genetic Algorithm for
Hierarchical Wireless Sensor Networks” , Journal Of Networks, Vol. 2, No. 5, September
2007.
[23] Z. Pooranian, A. Barati and A. Movaghar, “Queen-bee Algorithm for Energy
Efficient Clusters in Wireless Sensor Networks”, World Academy of Science,
Engineering and Technology 73 2011, pp 1080-1083
[24] M. Ramakrishnan and P. Vanaja Ranjan,” Optimal Power Control with
Overhearing Avoidance for Wireless Sensor Networks”, Journal of computer Science 5
(4),pp. 297-301, 2009, ISSN 1549-36362009
[25] Shan Lin , Jingbin Zhang , Gang Zhou , Lin Gu , Tian He , John A., “Adaptive
Transmission Power Control for Wireless Sensor Networks”,Sensys ’06, In Proc. of the
ACM Conference On Embedded Networked Sensor Systems, 2006.pp. 223–236,


                                           28
Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX –
XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011)

[26] Jianping Pan ,Y.Thomas Hou et al , “Topology Control for Wireless Sensor
Networks”, Proceedings of the 9th annual international conference on Mobile computing
and networking , Mobicom 2003, doi>10.1145/938985.939015.
[27] Mihaela Cardei, Shuhui Yang and Jie Wu,” Fault-Tolerant Topology Control for
Heterogeneous      Wireless Sensor Networks”,IEEE Transactions on parallel and
distributed systems, 05 September 2007.
[28] Ning Li,Jennifer C.Hou,”Topology Control in Heterogeneous Wireless
Networks:Problems and Solutions”, IEEE INFOCOM 2004.
[29] Ya Xu, Solomon Bien, Yutaka Mori, John Heidemann, and Deborah Estrin,
”Topology Control to Conserve Energy in Wireless Adhoc Networks”, Available:
http://www.isi.edu/~johnh/PAPERS/Xu03a.html
[30] Xiang-yang Li and Wen-zhan Song and Yu Wang, ”Localized topology control
for heterogeneous wireless sensor networks”, ACM Transactions on Sensor Networks,
Vol. 2, No. 3, 04 2005, pp. 1-25..
[31] Ma.Victoria Que and Won-Joo Hwaqng, ”Enhancing Topology Control
Algorithms in Wireless Sensor Network using Non-Isotropic Radio Models”, IJCSNS
International Journal of Computer Science and network Security, Vol. 6 No.8B, August
2006.
[32] Harish Sethu, Thomas Gerety, "A Distributed Topology Control Algorithm in the
Presence of Multipath Propagation," Fourth Annual International Conference on Mobile
and Ubiquitous Systems: Networking &Services (MobiQuitous), pp.1-8, 2007.
[33] Shahram Babaie, Saed Shokraneh, Ali Ghaffari, Ahad Jahangiry, "CCGA:
Clustering Based on Cluster Head with Genetic Algorithm im Wireless Sensor Network,”
cicn, pp.367-371, 2010, ," International Conference on Computational Intelligence and
Communication Networks, 2010




                                           29

Weitere ähnliche Inhalte

Was ist angesagt?

Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
ijsc
 

Was ist angesagt? (10)

NSGA-III Based Energy Efficient Protocol for Wireless Sensor Networks
NSGA-III Based Energy Efficient Protocol for Wireless Sensor NetworksNSGA-III Based Energy Efficient Protocol for Wireless Sensor Networks
NSGA-III Based Energy Efficient Protocol for Wireless Sensor Networks
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
 
2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor network2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor network
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
C04511822
C04511822C04511822
C04511822
 
Impacts of structural factors on
Impacts of structural factors onImpacts of structural factors on
Impacts of structural factors on
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
 

Andere mochten auch

Internationalization from sme perspective with reference to pump and motor ma...
Internationalization from sme perspective with reference to pump and motor ma...Internationalization from sme perspective with reference to pump and motor ma...
Internationalization from sme perspective with reference to pump and motor ma...
IAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
IAEME Publication
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
IAEME Publication
 
Investigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhujInvestigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhuj
IAEME Publication
 
Cochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filtersCochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filters
IAEME Publication
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
IAEME Publication
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
Don Norwood
 

Andere mochten auch (9)

Internationalization from sme perspective with reference to pump and motor ma...
Internationalization from sme perspective with reference to pump and motor ma...Internationalization from sme perspective with reference to pump and motor ma...
Internationalization from sme perspective with reference to pump and motor ma...
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
 
Investigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhujInvestigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhuj
 
Cochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filtersCochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filters
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
Ijmet 07 06_005
Ijmet 07 06_005Ijmet 07 06_005
Ijmet 07 06_005
 

Ähnlich wie 3 3 energy efficient topology

Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
ijfcstjournal
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimedia
IAEME Publication
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
Aayush Gupta
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
De31486489
De31486489De31486489
De31486489
IJMER
 

Ähnlich wie 3 3 energy efficient topology (20)

An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimedia
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
De31486489
De31486489De31486489
De31486489
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
1909 1913
1909 19131909 1913
1909 1913
 

Mehr von IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Kürzlich hochgeladen (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 

3 3 energy efficient topology

  • 1. Journal of Computer Science andand Engineering Research and Journal of Computer Science Engineering Research and Development (JCSERD), ISSN XXXX – JCSERD DevelopmentISSN XXXX – ISSN XXXX – XXXX(Print), 1, May -October (2011) XXXX(Print), (JCSERD), XXXX(Online), Volume 1, Number ISSN XXXX – XXXX(Online) Volume 1, Number 1, May -October (2011) © PRJ PUBLICATION pp. 17- 29 © PRJ Publication http://www.prjpublication.com/JCSERD.asp AN ENERGY EFFICIENT TOPOLOGY CONTROL FOR 3-TIER WSN USING GENETIC ALGORITHM BASED HIERARCHICAL COOPERATIVE TECHNIQUE S. Emalda Roslin1, C.Gomathy2 1 Research Scholar, Sathyabama University, 2 Prof. & Head/ Dept. of E & C, Sathyabama University 1 roemi_mich@yahoo.co.in ABSTRACT Topology control plays a vital role in maximizing the network lifetime and in increasing the network capacity of a Wireless Sensor Network (WSN). In this paper, a three tier architecture based topology control algorithm which increases the overall energy efficiency of WSN is presented. The lower tier involves clustering of sensor nodes which forms cluster slaves for the purpose of data gathering. The second tier comprises of cluster heads, which are responsible for transferring data between cluster slaves and super heads. The third tier consist of super heads, forms a communication network consisting of super heads, where data forwarding between the super heads to the sink node, takes place. The third tier forms a communication subnet. Cluster head selection and super head selection is a critical process in the three tier architecture. So a new methodology based on genetic algorithm for cluster head selection and super head selection, a hierarchical cooperative technique which takes care of the nodes bandwidth, residual energy and memory capacity is proposed and implemented. Simulation results prove the effectiveness of our algorithm. Keywords— Bandwidth, Clustering, Genetic Algorithm, Memory Capacity, Residual Energy , Topology Control, Wireless Sensor Network 1 INTRODUCTION Wireless Sensor Network (WSN) comprises of complex sensors with limited power supplies, low bandwidth, minimum memory capacity and limited energy. Each sensor has a low power battery as the energy source which cannot be replaced. By the effective utilization of the nodes battery, an energy efficient network can be obtained. This leads to the development of Topology Control, which is nothing but maintaining the desired properties of the network like connectivity, coverage etc., by reducing the energy consumption and enhancing the network capacity. 17
  • 2. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) Topology Control can be broadly categorized in to any of the two approaches. They are power Control mechanism and power management mechanism [1]. Adjusting the transmitting power of each node dynamically is termed as power control [2][3][4][5]. Power management is switching off the redundant nodes that are not involved in transmission nor reception [6][7][8][9][10]. By integrating power control and power management algorithms it is possible to increase the energy efficiency of a wireless sensor network. Fig 1. Network Topology Many topology control algorithms are presented in the literature using single tier and two tier architecture. It has been proved that two tier architecture provides a better performance compared to the other architectures [11-12].Two tier architecture is based on clustering, in which, nodes are grouped into several non overlapping regions called clusters. Clustering greatly reduces the communication costs incurred by sending data to the nearby Cluster head, instead of directly communicating to the sink which is far away. Using clusters for transmitting data to the sink, leads to small transmit distances for the slave nodes and far transmit distances only for few cluster head nodes [11-14]. Fig. 2. Two tier Architecture Fig. 3. Three tier Architecture In this paper, a three tier architecture is developed. The lower tier forms with cluster slaves, the middle tier with cluster heads and the upper tier comprises of super heads. The cluster slaves gather the data and forward it to their cluster head. The cluster head receives data from the slaves and pass it to their near by super head. The upper tier forms a communication subnet, where the data forwarding to the sink takes place via super heads. Genetic algorithm is used for the selection of cluster heads and super heads. Once the cluster heads were elected, the resource rich nodes among them were elected as super heads. The total energy consumed and the network lifetime were also calculated for the proposed methodology. 18
  • 3. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) The paper is organized in the following order: In section 2 overview of genetic algorithm is given. The proposed GAHCT methodology is discussed in section 3 followed by the results and discussions in section 4. Finally in section 5 conclusion and future work is given. II OVERVIEW OF GENETIC ALGORITHM Genetic Algorithm (GA) is an evolutionary tool that is used to solve different varieties of problem that are not easy to solve using normal methodologies. A GA maintains an initial population for the problem at hand, and makes it resolve by applying a set of stochastic operators iteratively [5]. Fig 4: Flowchart of Genetic Algorithm The repeated processing of the above operations generates best individuals suited for the given application. III PROPOSED METHODOLOGY Energy, Bandwidth and Memory Capacity are the limited resources for a WSN. Taking these factors into consideration, the Genetic Algorithm based hierarchical Cooperative Technique is proposed. Using this methodology an efficient network can be generated. As the initial step, best nodes called Cluster Head (CH) nodes are to be selected. Remaining nodes used for collection of data are called Cluster Slaves (CS). The resource 19
  • 4. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) rich nodes among the cluster heads are elected as Super Heads (SH) for data forwarding to the sink node. Initially nodes are deployed in a random fashion. Every node launches and receives “Hello” messages from its neighbors with its minimum transmission range and wait for a random amount of time. On receiving the “Hello” message each node will calculate its Residual energy, Bandwidth and Memory capacity. These details are sent along with the “Ack” message. Based on the residual energy values in the “Ack” message, nodes are categorized in to Normal Nodes (Residual Energy > 20%), Warning Nodes (Residual Energy between 10 – 20 %), and Danger Nodes (Residual Energy <10 %). The danger nodes are not eligible for involving in the communication. So these nodes are moved to Sleep state for a predefined time period. After considering the residual energy of the neighbors, the Bandwidth and Memory capacity of the Normal nodes and Warning nodes are considered and compared. The node with higher Bandwidth and Memory at a particular time is elected as Cluster Heads and the other nodes are listed as Cluster Slaves. After a predefined time, cluster heads with maximum residual energy, bandwidth and memory capacity are elected as super heads. These super heads form the communication subnet, through which data is forwarded to the sink node. The data transmission between the super nodes takes place using minimum transmission power to reach the sink node. In the proposed methodology, each node is declared as a boolen operator which can either be True or False. On receiving the Hello message, a comparison on the node's weight NodeWT (based on Energy, Bandwidth and memory capacity) is made with the neighbor NeighWT which sends the Hello message. If the NodeWT > NeighWT then the operator is set as True which means the node is a Cluster Head. If NodeWT < NeighWT then the operator is set as False, which says node is a Cluster Slave. Like wise for a period of time some nodes will act as Cluster Heads and some as Cluster slaves. During that period, Cluster Heads exchange Hello mesaages. The Cluster heads whose NodeWT > NeighWT are declared as Super heads. After a constant period of time, once again Hello messages were exchanged, and a new set of Super Heads, Cluster Heads and Cluster Slaves were selected. By repeatedely changing the heads and slaves, exploitation of energy over a constant set of nodes can be overcome, thereby the network connectivity can still be maintained. A GAHCT ALGORITHM: Step 1: Randomly place nodes as initial population Step 2: Calculate the fitness function for all individual nodes which uses Remaining energy, Bandwidth and Memory capacity Step 3: Select nodes with best fitness value as cluster heads for reproduction Step 4: Recombine between individual nodes Step 5: Mutate individual nodes Step 6: Calculate the fitness for the modified individual Nodes Step 7: Repeat till a good new population of cluster heads are obtained Step 8: The above steps are repeated for the cluster heads to select super heads among them The flow chart for selection of Cluster Heads is shown in figure 5. The same procedure is repeated for the selection of Super Heads. 20
  • 5. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) Node Deployment Send “Hello” Message Wait for Random time Receive “Ack” that includes Residual Energy, BW, Memory Capacity No Residual Declare as Danger Energy > Node & Switch Off 10% Yes No Residual Energy > 20% Yes No Bandwidh > Threshold Yes No Memory > Declare as Warning Threshold Node & List as Cluster Slaves Yes Declare as Cluster Head Fig. 5. Flow Chart of GAHCT for Cluster Head Selection 21
  • 6. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) IV RESULTS AND DISCUSSION Initially network of 50 nodes is deployed and the proposed GAHCT algorithm is implemented. Since a random initial population has been generated, the number of cluster slaves, cluster heads and super heads in every iteration is different. More number of iterations is done. Average of super heads, cluster heads and cluster slaves is taken and is plotted. in figure 6. From the figure, it is inferred that cluster slaves are more in number when compared to the cluster heads and super heads. This also leads to an effective data gathering process. 36 40 35 Average of CS, CH and SH 30 25 20 10 15 4 10 5 0 Clus ter Slaves Cluster Heads Super Heads Fig 6. Average of CS, CH and SH . A network scenario with 50 sensor nodes and 1 sink node, whose x, y and z coordinates were known, is deployed and the scenario is termed as Network Deployment #1. Using NS-2.34, network deployment #1 is simulated with the parameters given in Table 1 and the network animator screen is shown is figure 7. For this scenario the energy consumed by all the nodes in the network is calculated. The energy consumed to transmit k bits message over a distance d is given by, ETX (k,d) =EElec*k+€amp*k*d2 (1) Where EElec is the radio energy dissipation and € amp is transmit amplifier dissipation. Using the above equation, the energy consumed to transmit data from all the nodes in the network [2] through the cluster heads to the sink node using GAHCT is calculated. TABLE I. THE SIMULATION PARAMETERS Parameters Value Deployment Region 1000 m x 1000 m Number of Nodes 50,100,150,200,250 Initial Energy 1 , 2 , 3 , 4 Joules Simulation Time 50, 100, 150, 200, 250, 300 seconds Transmission Power 0.8 mW 22
  • 7. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) Receiving Power 0.2 mW Idle Power 0.003 mW Transmission Rate 250 Kbps Cluster Heads Super Heads Cluster Slaves Fig. 7. Network Animator screenshot for GAHCT For deployment #1, the network lifetime is calculated by finding the time elapsed for the first node to reach a threshold energy level. The initial energy of the nodes is varied from 1 J to 4 J. In each case, different thresholds γ1, γ2, and γ3 are set for election of CS, CH and SH. The average network lifetime and the average of the total energy consumption is calculated and is tabulated in table 2. The network lifetime for deployment #1 is also calculated by varying the simulation time from 50 to 300 seconds. The results obtained are plotted in figure 8. TABLE II. AVERAGE NETWORK LIFETIME BY VARYING INITIAL ENERGY Threshold value (for Initial CS,CH & SH selection) Total Energy Average Energy Average Network Energy Consumption Consumption Lifetime (Joules J) (Joules) (Joules) (Sec) γ1 (J) γ2 (J) γ3 (J) 1 0.75 0.5 0.2 16.9 0.33 19.4 2 1.8 1 0.3 52.3 1.04 30.33 3 2 1.75 0.75 54.17 1.08 31 4 3.5 2.5 1.5 82.78 1.65 41.31 23
  • 8. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) The average network lifetime by varying the initial energy levels for a network density of 50 nodes is obtained as 30.53 seconds. The average network lifetime calculated by varying the network simulation time for a constant density of 50 nodes is obtained as 31.03 seconds. In figure 8 the dip in the graph shows a decreased network lifetime due to more energy drain during that simulation instance. The total energy consumption is also calculated as 101.4 J using the proposed methodology for various network densities and is plotted in figure 9. Fig. 8 Average Network Lifetime by varying simulation time Fig 9. Total Energy Consumption of 3 tier architecture 3- The network topology of one tier architecture (before applying GAHCT) is shown in figure 10. In this a mesh topology is obtained where each node gets connected to all the nodes in the network. This leads to a more complex network. Figure 11 shows the topology of a two tier architecture using the proposed GAHCT, where only two tiers are ogy present (network with CS and CH). The topology obtained after applying GAHCT for three tier architecture is shown in figure 12, 13, 14 and 15. On comparing figure 10 and figure 15, it is well proved that GAHCT reduced the number of links between the nodes ure in the network to the maximum. Thus reducing the number of links leads to a more energy efficient network 24
  • 9. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) 30 20 Nodes→ 10 0 0 200 400 1000 800 600 600 800 400 200 x position→ 1000 0 y position→ Fig.10. Network Topology of One – tier architecture 25 20 15 Nodes→ 10 5 0 0 1000 200 800 400 600 600 400 800 200 1000 0 y position→ x position→ Fig.11. Network Topology of Two – tier architecture 25 20 Nodes→ 15 10 5 1000 0 800 0 600 200 400 400 600 200 800 y position→ 1000 x position→ 0 Fig.12. Cluster formation (lower tier) using GAHCT 25
  • 10. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) 30 20 Nodes→ 10 0 1000 0 800 200 600 400 600 400 800 200 y position→ 1000 0 x position→ Fig.13. Cluster Heads (middle tier) using GAHCT 20 Nodes→ 10 0 800 0 200 600 400 400 600 200 800 y position→ 1000x position→ 0 Fig.14. Super Heads forming Communication Subnet (upper tier) using GAHCT 40 Nodes→ 20 0 1000 0 800 200 600 400 400 600 800 200 y position→ 1000 0 x position→ Fig.15. Network Topology of a Three – tier architecture 26
  • 11. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) V CONCLUSIONS AND FUTURE WORK The proposed methodology which uses a Genetic Algorithm based Hierarchical Cooperative Technique classifies each node in the network either as Super Head, Cluster Head or as Cluster Slave. Group of Cluster Slave nodes form the lower tier of the network, Cluster Head nodes form the middle tier of the network and Super Head nodes forms the upper tier of the network. The upper tier acts as a communication subnet. Since GA is used and the fitness function includes residual energy, bandwidth and memory capacity, a best set of Super Heads and Cluster Heads were selected. Using these Super Heads, efficient data forwarding takes place using the minimum transmission energy. Network lifetime for a network density of 50 nodes, by varying energy levels is obtained as 30.53 sec which is better than that of previous techniques. As an enhancement of this work, the proposed methodology can be implemented for various network densities and the network parameters can be analyzed. REFERENCES [1] Mo Li, Baijian Yang,”A Survey on Topology issues in Wireless Sensor Network” citeseerx.ist.psu.edu/viewdoc/download [2] Dongjin Son, Bhaskar Krishnamachari, and John Heidemann ,”Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks”, Proceedings of the First IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 289-298.. October, 2004 [3] Shan Lin, Jingbin Zhang, Gang Zhou, Lin Gu, Tian He†, and John A. Stankovic, “ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks”,Pages: 223 – 236,SenSys’06, November 1–3, 2006, [4] Junseok Kim; Sookhyeon Chang; Younggoo Kwon ,”ODTPC: On-demand Transmission Power Control for Wireless Sensor Networks”, Information Networking, ICOIN2008 Volume , Issue , 23-25 Jan. 2008 Journal of Indian institute of science [5] B. Zurita Ares, P. G. Park, C. Fischione, A. Speranzon, K. H. Johansson, “On Power Control for Wireless Sensor Networks: System Model”, Middleware Component and Experimental Evaluation citeseerx.ist.psu.edu/viewdoc/download [6] Amit Sinha,Anantha Chandrakasan “Dynamic Power Management in Wireless Sensor Networks” IEEE Design & Test of Computers 2001,pp 62 – 74 [7] Jonathan Hui, Zhiyuan Ren, and Bruce H. Krogh, ” Sentry-Based Power Management in Wireless Sensor Networks”, pp. 458–472, 2003. Springer-Verlag Berlin Heidelberg 2003 [8] Ya Xu, Solomon Bien ,Yutaka Mori, John Heidemann,”Topology Control to Conserve Energy in Wireless Adhoc Networks” http://www.isi.edu/johnh/PAPERS/y004a.html January23,2003 citeseerx.ist.psu.edu/viewdoc/download [9] Marcel Busse and Wolfgang Efeelberg ,”Conserving Energy with topology control in wireless sensor networks”, http://www.informatick.uni-mannheim.de 27
  • 12. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) [10] Safwan Al-Omari and Weisong Shi,” Redundancy-Aware Topology Management in Wireless Sensor Networks” http://www.cs.wayne.edu/~weisong/papers/omari06- topology-management.pdf [11] Shiyuan Jin, Ming Zhou, Annie S. Wu,” Sensor Network Optimization Using a Genetic Algorithm “ Available: http://citeseerx.ist.psu.edu/viewdoc/doi=10.1.1.75.9685 [12] G. Ahmed, N. M. Khan, and R. Ramer,”Cluster Head Selection Using Evolutionary Computing in Wireless Sensor Networks”, PIERS Proceedings, Hangzhou, China, March 24-28, 2008. pp.883-886. [13] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan.” Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks”, In Proceedings of the Hawaii International Conference on System Science, Maui, Hawaii,2000. [14] S. Emalda Roslin, Dr. C.Gomathy ,”GAHCT: Genetic Algorithm Based Hierarchical Cooperative Technique for Energy Efficient Topology Control in Wireless Sensor Networks”, CiiT International Journal of Wireless Communication ,Vol 3, No 5, April 2011. On pages:327 -334 ISSN 0974 – 9756, Impact Factor -0.572 [15] Shiyuan Jin, Ming Zhou, Annie S. Wu,” Sensor Network Optimization Using a Genetic Algorithm “ Available: http://citeseerx.ist.psu.edu/viewdoc/doi=10.1.1.75.9685 [16] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan.” Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks”, In Proceedings of the Hawaii International Conference on System Science, Maui, Hawaii,2000. [17] G. Ahmed, N. M. Khan, and R. Ramer,”Cluster Head Selection Using Evolutionary Computing in Wireless Sensor Networks”, PIERS Proceedings, Hangzhou, China, March 24-28, 2008. pp.883-886. [18] Ching-Tsung Hsueh, Yu-Wei Li, Chih-YuWen and Yen-Chieh Ouyang ,”Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks”, Sensors 2010, pp. 1251-1278; doi:10.3390/s100201251 [19] Assaf Zaritsky,” Introduction to Genetic Algorithms”, Available: http://www.cs.bgu.ac.il/~assafza ,Ben-Gurion University, Israel [20] Jin Fan, D.J.Parish,”Using a Genetic Algorithm to optimize the Performance of a Wireless Sensor Network “, ISBN: 1-9025-6016-7 © 2007 PGNet [21] Amol P. Bhondekar, Renu Vig, Madan Lal Singla, C Ghanshyam, Pawan Kapur ,”Genetic Algorithm Based Node Placement Methodology For Wireless Sensor Networks”, Proceedings of IMECS 2009, March 18 - 20, 2009, Hong Kong. [22] Sajid Hussain, Abdul Wasey Matin, Obidul Islam,”Genetic Algorithm for Hierarchical Wireless Sensor Networks” , Journal Of Networks, Vol. 2, No. 5, September 2007. [23] Z. Pooranian, A. Barati and A. Movaghar, “Queen-bee Algorithm for Energy Efficient Clusters in Wireless Sensor Networks”, World Academy of Science, Engineering and Technology 73 2011, pp 1080-1083 [24] M. Ramakrishnan and P. Vanaja Ranjan,” Optimal Power Control with Overhearing Avoidance for Wireless Sensor Networks”, Journal of computer Science 5 (4),pp. 297-301, 2009, ISSN 1549-36362009 [25] Shan Lin , Jingbin Zhang , Gang Zhou , Lin Gu , Tian He , John A., “Adaptive Transmission Power Control for Wireless Sensor Networks”,Sensys ’06, In Proc. of the ACM Conference On Embedded Networked Sensor Systems, 2006.pp. 223–236, 28
  • 13. Journal of Computer Science and Engineering Research and Development (JCSERD), ISSN XXXX – XXXX(Print), ISSN XXXX – XXXX(Online), Volume 1, Number 1, May -October (2011) [26] Jianping Pan ,Y.Thomas Hou et al , “Topology Control for Wireless Sensor Networks”, Proceedings of the 9th annual international conference on Mobile computing and networking , Mobicom 2003, doi>10.1145/938985.939015. [27] Mihaela Cardei, Shuhui Yang and Jie Wu,” Fault-Tolerant Topology Control for Heterogeneous Wireless Sensor Networks”,IEEE Transactions on parallel and distributed systems, 05 September 2007. [28] Ning Li,Jennifer C.Hou,”Topology Control in Heterogeneous Wireless Networks:Problems and Solutions”, IEEE INFOCOM 2004. [29] Ya Xu, Solomon Bien, Yutaka Mori, John Heidemann, and Deborah Estrin, ”Topology Control to Conserve Energy in Wireless Adhoc Networks”, Available: http://www.isi.edu/~johnh/PAPERS/Xu03a.html [30] Xiang-yang Li and Wen-zhan Song and Yu Wang, ”Localized topology control for heterogeneous wireless sensor networks”, ACM Transactions on Sensor Networks, Vol. 2, No. 3, 04 2005, pp. 1-25.. [31] Ma.Victoria Que and Won-Joo Hwaqng, ”Enhancing Topology Control Algorithms in Wireless Sensor Network using Non-Isotropic Radio Models”, IJCSNS International Journal of Computer Science and network Security, Vol. 6 No.8B, August 2006. [32] Harish Sethu, Thomas Gerety, "A Distributed Topology Control Algorithm in the Presence of Multipath Propagation," Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &Services (MobiQuitous), pp.1-8, 2007. [33] Shahram Babaie, Saed Shokraneh, Ali Ghaffari, Ahad Jahangiry, "CCGA: Clustering Based on Cluster Head with Genetic Algorithm im Wireless Sensor Network,” cicn, pp.367-371, 2010, ," International Conference on Computational Intelligence and Communication Networks, 2010 29