SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011



    Multidimensional scaling algorithm and its current
           applications in wireless localization
                                                 Kulvir Kaur, Student (M.Tech)
                                    Electronics and communication engg. Punjabi university
                                                     Patiala, Punjab, India
                                                   Shergill_14@yahoo.co.in
                                                    Manjit Sandhu,Sr.Lecturer
                                          Electronics and communication engg., sbbsiet
                                                     Jalandhar, Punjab, India
                                                 Manjit_sandhu67@yahoo.com

Abstract— The paper gives an overview of multidimensional
scaling (MDS) algorithm. Aside from brief introduction to
MDS, its characteristics, its various types and its current
applications has been discussed in wireless systems i.e.
localization of wireless sensors in a network and determining
the position of a mobile station without GPS. MDS is an
algorithm by means of which information contained in a set of
data is represented by a set of points in a low dimensional space.
These points are arranged in such a way that distances between
the points represents the relation between the data elements.

Keywords—MDS algorithm, MDS types, MDS current
applications, localization                                                          In the fig.1, the distance between point 4 and 5 is
                                                                         small but 1 and 6 is large which shows that assault and
                        I.INTRODUCTION                                   receiving stolen gold are very unalike but burglary and libel
                                                                         are little alike according to respondents views.
   MDS is a set of data analyses technique. Information
contained in a set of data is represented by a points in a                B. Literature survey
multidimensional space such that the distance between the                    MDS is a set of data analysis methods, which allow one
points tells about the relation between data sets i.e. their             to infer the dimensions of the perceptual space of subjects.
similarity or dissimilarity. Two data objects, if they are similar       The primary outcome of an MDS analysis is a spatial
are represented by points that are close to each other in space          configuration, in which the objects are represented as points
and dissimilar objects are represented by points that are far            in such a way, that their distances correspond to the
apart.                                                                   similarities of the objects. Their detailed study has been given
                                                                         in [1],[2],[3]. First well known MDS proposal was given by
 A. Example of MDS
                                                                         torgerson in 1952 that fits Euclidean distance model. It was
    Suppose in a survey, it has been asked to compare the                based on metric analyses i.e. quantitative approach. In 1950,
legal offences in term of their seriousness. The resulting data          Attneave gives a Non-Euclidean distance model but it was
is represented in the form of a table 1. Each entry in the               not so successful. In 1962, Shepard gives psychometric
table tells the percentage by which respondents give their               approach. In 1964, Kruskal gives a non metric approach i.e.
views of dissimilarity between offences.                                 based on qualitative analyses. Till then new researches are
   The given information can be represented easily by MDS                going on and various softwares have also been introduced
analyses and represented the data in 2D space as shown in                for MDS like INDSCAL, ALSCAL etc. MDS has been used
fig1                                                                     in various applications. Main is used in wireless localization
                                                                         like sensor network localization and mobile station
                                                                         localization.
                                                                             A wireless sensor network [5] comprises of a large
                                                                         number of wireless sensor nodes and is randomly deployed.
                                                                         The location information does not only expand application
                                                                         scenarios, but also enhances performance of network
                                                                         protocols. In many applications, such as environmental
                                                                         monitoring, disaster detection, and battlefield monitoring,
                                                                         location information is vital. Deployments of wireless sensor
                                                                         net-works can be roughly categorized into manual settings,
                                                                         GPS-based approaches, and localization algorithms. It is not
© 2011 ACEEE                                                         6
DOI: 01.IJCSI.02.01.42
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011


practical to manually set sensor location, because it is too          potential disadvantage of TOA method. The MDS has been
time-consuming and expensive.                                         proposed for wireless network based mobile location. Due
    For the GPS-based localization method, the current/               to the MDS needs distance measurement data between the
existing GPS component is too big to fit into a tiny wireless         MS and BSs, the MDS technique has been proposed for
sensor node. Another drawback is that GPS cannot be used              mobile location using the TOA method [18]. It improves the
in indoors. Locations of sensor nodes can be computed with            performance of mobile location estimation.
the localization algorithm. A great deal of work over the past
few years has focused on the sensor localization problem. A            C. Algorithmic flow of MDS
detailed survey of this area is provided in [6]. In the case              It is shown in fig. 2. Proximities are the data for MDS
when all pair-wise distances are known, the coordinates can           analyses. It can show similarity vs. A-similarity and can be
be derived by using a classical method known as                       symmetric vs. Asymmetric. MDS model can be metric/non
multidimensional scaling (MDS) [7], [8]. Shang et al.                 metric with Euclidean distance or non Euclidean distance.
proposed the MDS-MAP localization algorithm using                     Dimensions can be 1,2or more depending on the parameters
multidimensional scaling. MDS-MAP introduced in [9] can               that are to be surveyed. Analyses can be individual,
be mentioned as a well known example of this class where it           aggregated or weighted.
computes the shortest paths between all pairs of nodes in                 Details are given ahead. Various softwares are used for
order to approximate the missing entries of the distance              MDS analyses that gives the final results of coordinates of
matrix. Another algorithms that mainly consider the sensor            data in the space. Most commonly used is ALSCAL
localization as a non-convex optimization problem and                 developed by Forrest Young.
directly estimate the coordinates of sensors is a relaxation to
semi-definite programming (SDP) [10]. In [11] where they
use matrix completion methods as a mean to reconstruct the
distance matrix. Their analysis is based on a number of strong
assumptions. First, they assume that even far away sensors
have non-zero probability of detecting their distances.
Second, the algorithm explicitly requires the knowledge of
detection probabilities between all pairs. MDS MAP require
weaker assumptions. It use shortest paths for the missing
entries in the distance matrix and apply MDS to find the
topology of the network. Here it is assumed that only
neighbouring sensors have information about each other and
that only connectivity information is known and the
                                                                                        II. CHARACTERISTICS OF MDS
knowledge of detection probabilities plays no role in this
algorithm. MDS-MAP still has the following drawbacks: 1)                        There are four main characteristics that a researcher
The time complexity is high. When there are a huge number             must consider while using MDS:-
of sensors, large bandwidth and computation are required to           •         The data : It is simply the data that is to be presented
estimate locations. 2) In the case of a network area with non-        for MDS analyses. It can be in the form of matrix. Distinction
convex shape, the computed coordinates are often erroneous.           between data can be made on ‘way of data’ and ‘modes of
To resolve the drawbacks of MDS-MAP, a HMDS [12] is                   data’.
proposed which has low time complexity and which can                  •         Way of data : It simply represent the dimensionality
operate in non-convex network environments.                           matrix like ‘One way data’ It is like a single column matrix
    Mobile locations could support many applications, such            that can’t be scaled i.e. can’t apply MDS. ‘Two way data’ It
as emergency services, roadside assistance, navigation,               is represented in matrix form and can be scaled by MDS.
tracking, and so on [13]. With the popularization of wireless         •         Modes of data : It tells about the kind of matrix the
services, more and more people call for emergency services            input data has like ‘One mode data’ has rows and columns
by wireless phone, and the system operators want to provide           refer to the same set of objects. The matrix is square and
subscriber’s location information which conforms to the FCC           symmetric. ‘Two mode data’ has rows and columns of matrix
requirement. Location estimations can be done through many            refers to different set of objects. The matrix is rectangular
ways. The first is the Global Positioning System (GPS) [14],          and asymmetric.
which provides accurate positioning but fails when satellite          The transformation technique : It rescales data in a matrix
signals are blocked like indoor situations. The second is MS          into an n –dimensional space. Two types:-monotonic and
location based on RSS measurements [15]. This method is               linear. ‘Monotonic’ preserves ordinal information of the data.
has to measure the power of the signal at the receiver and            It assumes rank order of entries in data matrix contain
low accuracy is achieved in this way due to the complex               significant information. ‘Linear’ are expressible in simple
propagation mechanisms. The third way uses the angle-of-              mathematical form and are simpler. Data dissimilarities are
arrival (AOA) [16]. However, this method requires a complex           direct estimate of distance between the points.
antenna array system and suffers from NLOS propagation.
The fourth method is the TOA [17]. NLOS propagation is a

© 2011 ACEEE
                                                                  7
DOI: 01.IJCSI.02.01.42
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

•         The models The model represents data value as                                        III.TYPES OF MDS
distance between the points in n- dimensional space. Main
model used in MDS is ‘Euclidean distance model’ the data                   MDS can be classified into various types:-
in the matrix is represented as ‘distance like’. It can be              •         Classical MDS: - It takes only one input matrix
unweighted and weighted. In ‘Unweighted model’,all                      giving dissimilarity between pair of items. It uses Euclidean
dimensions are given equal importance. Distance between                 distance model to model the dissimilarities. Two types:-
points i and j in dimension a is given by:                              Metric CMDS:- The data in the matrix represents quantitative
                                                                        similarities. Ratio and interval level of measurements are
                                                                        used. Transformation used is linear transformation i.e.
        where x ia specifies the position of point i in                      I{S}= D+E where I{S} is linear transformation of
dimension a. In ‘Weighted model’, the importance of each                similarities. D is Euclidean distance matrix. E is matrix of
dimension is taken in form of weights. It gives the distance            error. Data matrix is square and symmetric.
between the points i and j as:                                          Non metric CMDS: -. The data in matrix represents
                                                                        qualitative similarities. Ordinal level of measurement is used.
                                                                        Transformation is monotonic transformation. i.e.
         where wka is a diagonal matrix represented the                   M{S} = D+E where m{S} is monotonic transformation
importance of each dimension to each individual.                        of similarities. The model is Euclidean distance model. Data
•        Scaling techniques: Here we categorize the data in             is two mode i.e. Matrix is rectangular and asymmetric.
such a way that the properties of original relations remain             •         Replicated MDS:- It permits the analyses of several
unchanged. The number of topologies has been proposed                   matrices of similarity data simultaneously. It uses same
but the most long lived classification is that of Stevens (1946).       Euclidean distance model as in CMDS but on several input
He disguised data in nominal, ordinal, interval and ratio level         data matrix not on a single matrix. It is also of two types
of measurement that are shown in fig.3. In MDS, mostly                  metric and non-metric.
ordinal and ratio level are used.                                       •         Weighted MDS: In RMDS the difference in
         In ‘Ordinal level’ we categories the data on the basis         responses of individuals is taken into account but in WMDS
of ranks Then plotting in n-dimensional space on this rank              the cause of difference in response of several individuals is
basis is done. It is further of two types: partial i.e. Some            consider To take it into account weight wk is included that
objects while ranking can come at same level, often results             represents the importance of each dimension to each
from missing data, and complete i.e. no missing data.                   individual. So it is also called individual difference scaling
In ‘Ratio level’ Numerical value of distance between objects            (INDSCAL).
between adjacent points is consider.                                        It uses weighted Euclidean distance model. It is also of
                                                                        metric and non metric types. RMDS generates a single
                                                                        distance matrix D, while WMDS generates m unique distance
                                                                        matrices Dk, one for each data matrix Sk.

                                                                        IV.APPLICATIONS IN LOCALIZATION TECHNIQUES
                                                                                  Applications of MDS are appearing at an increasing
                                                                        rate and at various disciplines such as ‘Marketing’ for taking
                                                                        the preferences and perceptions of respondents and ‘Data
                                                                        visualizations’ tuning a metric space, in which points
                                                                        correspond to descriptors values, so that the metric space
                                                                        represents a perceptive distance between images. Here
                                                                        main discussion will be on :-
                                                                             • localization in a wireless sensor network using MDS
                                                                             • Finding the location of a mobile station in an area
                                                                                  of a cellular network using MDS
                                                                         A. Localization in a wireless sensor network
                                                                                  Determining the physical position of sensor from a
                                                                        large number of sensors randomly and densely deployed in
                                                                        a certain area is important to use the data collected by the
                                                                        sensor. Two approaches are proposed for localization of
                                                                        wireless sensor network:-
                                                                           a) Centralized approach:- In centralization approach,
                                                                        the inter-node ranging and connectivity data is migrated to a
                                                                        central base station and then the resultinglocations are
                                                                        migrated back to respective nodes. MDS-MAP is centralized
                                                                        algorithm used for network sensor localization that uses

© 2011 ACEEE                                                        8
DOI: 01.IJCSI.02.01.42
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011


multidimensional scaling. It uses classic metric MDS.                      1) Clustering phase:- Here the whole network is divided
          Let there are n sensors in a network, with positions             into multiple clusters using various algorithms.
Xi, i = 1 . . . n, and let matrix X = [X1, X2, . . . ,Xn]T . X is          2) Intra cluster localization phase:- Each cluster contains
nxm, where m is the dimensionality of X. Consider m to be                  one cluster head, lots of gateways and many members.
an unknown. Let D = [dij ] be the nxn matrix of pair-wise                  Cluster head collects distance measurements from all
distance measurements. The distance measurements dij must                  members of the cluster and compute distances of all pairs of
obey the triangular inequality: dij + dik >= djk for all (i, j,            devices using the shortest path algorithm such as the Dijkstra
k).                                                                        algorithm, so form a distance matrix of cluster members.
          Classical metric MDS is derived from the ‘Law of                 Applying a MDS on a distance matrix computes the relative
Cosines’, which states that given two sides of a triangle dij ,            coordinates of each cluster member and forms a local map.
dik, and the angle between them _jik, the third side can be                3) Merge phase:- A gateway node participates in at least
computed using the formula:                                                two neighbouring clusters, exchanges information between
                                                                           two clusters. Each gateway is assigned at least two
                                                                           coordinates from each cluster the gateway participated in.
Rewriting:                                                                 Different coordinates in the same gateway node implies that
                                                                           the coordinate systems in neighbouring clusters are different,
                                                                           and this information can be used to merge two coordinate
Similarly, dik = Xk-Xi, djk =Xk-Xi. So rewriting we get                    systems into a unified coordinate system.
                                                                                     These merged clusters repeatedly broadcast merge
                                                                           requests to neighbouring clusters and calibrate coordinates
To find the positions X we have to choose some X0 from X                   of the neighbouring clusters until the coordinates of all
to be the origin of a coordinate system, and construct a matrix            clusters are consistent and a global map is computed. Hence
B that is known as the matrix of scalar products and the                   we get accurate positioning system.
values as follows:


 Now, we get a new value of coordinates X’shifted according
to origin X0. Where Xi’=Xi–X 0.................................. (1)
Now B can also be written as: X’X’T=B
We can solve for X0 by taking an eigen-decomposition of B
into an orthonormal matrix of eigenvectors U and a diagonal
matrix of matching eigenvalues V.
        B = X’X’T = UVUT
        X’= UV1/2         We need to find X in 2-D space or                 B. Finding the location of a mobile station in a cellular
3D-space. To do this, we throw away all but the two or three               network using MDS
largest eigenvalues from V, leaving a 2x2 or 3x3 diagonal
                                                                                        Mobile locations estimation can support many
matrix, and throw away the matching eigenvectors U. Then
                                                                           applications, such as emergency services, roadside assistance,
X0 has the proper dimensionality. Now from (1) we can find
                                                                           navigation, tracking etc. Various techniques can be used like
Xi’s. Hence we have determine the coordinates of sensors.
                                                                           GPS, RSS but these suffer from drawbacks like blockage of
          This approach of MDS has some drawbacks as
                                                                           signal and complex propagation path.
mentioned. A single pass of multidimensional scaling cannot
                                                                                    The MDS has been proposed for wireless network
operate on a large topology, MDS MAP also does not use
                                                                           based mobile location. Due to the MDS needs distance
anchor nodes very well as anchor density increases,
                                                                           measurement data between the MS and BSs, the MDS
calculated positions are very near to actual value but don’t
                                                                           technique has been proposed for mobile location using the
have exact values, This approach requires distance
                                                                           TOA (time of arrival) method. Using TOA method, the range
measurement for all pairs of nodes but some nodes are very
                                                                           can be modelled as: ri= di+ni where ri is range measurement
far away from a particular sensor and distance can’t be
                                                                           between MS and BSi. ni is range error that occurs due to
measured.
                                                                           multipath fading and propagation losses that includes range
          To overcome these difficulties we use another
                                                                           delay. To estimate mobile location, a square distance matrix
method based on distributed approach.
                                                                           is constructed as:
          b) Distributed approach:- This approach is also
called hierarchical MDS-based localization algorithm
(HMDS).In this architecture, a sensor node may take the a)
roles of cluster head, cluster member or gateway node. It
makes an assumption that whole network is connected i.e.
two node have at least one path. Also, each device supports
RSSI (Received signal strength indicator measurement).
HMDS has three execution phase which are as follows:

© 2011 ACEEE                                                           9
DOI: 01.IJCSI.02.01.42
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

distance between BSi and BSj. ht is matrix of range between            [3] Cox, T.F., Cox, M.A.A., (2001), Multidimensional Scaling,
BS and MS. From Dt we can obtain the scalar product matrix             Chapman and Hall.
Bt that gives the distance of all BSs and MS from a given              [4] P. Bickel, P. Diggle, S. Fienberg, K. Krickeberg, I. Olkin, N.
location that is consider as origin. But distance in matrix Dt         Wermuth, S. Zeger, “Modern Multidimensional Scaling Theory
is pair wise between either in BSs or BS and MS. Bt is                 and Applications,” Springer, 1997.
obtained by double centring technique i.e. subtracting rows            [5] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and
                                                                       Erdal Cayirci, “A survey on sensor networks,” IEEE
and columns means from each element. Then add grand mean
                                                                       Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug 2002.
to each element and multiplying by (-1/2).                             [6] G. B. J. Hightower, “Locations systems for ubiquitous
          When employing the classical MDS, the centroid               computing,” IEEE Computer, vol. 34, pp. 57–66, 2001.
of the all coordinates is assumed at the origin, so the scalar         [7] Y. Shang, W. Ruml, Y. Zhang, and M. P. J. Fromherz,
matrix, Bt can be express as :                                         “Localization from connectivity in sensor networks,” IEEE Trans.
                                                                       Parallel Distrib.Syst., vol. 15, no. 11, pp. 961–974, 2004.
                                                                       [8] X. Ji and H. Zha, “Sensor positioning in wireless ad-hoc sensor
                                                                       networks using multidimensional scaling,” in Proc. IEEE
                                                                       INFOCOM, March 2004.
                                                                       [9] Sau Yee Wong, Joo Ghee Lim, SV Rao and Winston KG Seah,
                                                                       “Density-aware hop-count localization (DHL) in wireless sensor
                                                                       networks with variable density,” Proceedings of IEEE Wireless
By eigenvalue decomposition Bt can be represented as :                 Communications and Networking Conference (WCNC2005), vol.
    BT=UVUT                                                            3, pp. 1848-1853, Mar. 2005.
Where V is diagonal matrix of eigenvalues of Bt. And U is a            [10] P. Biswas and Y. Ye, “Semidefinite programming for ad hoc
matrix having corresponding eigenvectors.                              wireless sensor network localization,” in IPSN ’04: Proceedings
From this we can evaluate the value of X as                            of the 3rd international symposium on Information processing in
                                                                       sensor networks. New York, NY, USA: ACM, 2004, pp. 46–54.
   X= UV1/2
                                                                       [11] P. Drineas, A. Javed, M. Magdon-Ismail, G. Pandurangant, R.
         Now if we know the value of X, also all BSs are               Virrankoski, and A. Savvides, “Distance matrix reconstruction from
fixed and hence we know the value of coordinates of BSs.               incomplete distance information for sensor network localization,”
Thus, from (2), we can find the value of XMS i.e. coordinates          in Proceedings of Sensor and Ad-Hoc Communications and
of MS.                                                                 Networks Conference (SECON), vol. 2, Sept. 2006, pp. 536–544.
      Classical multidimensional scaling is sensitive to the           [12] Gwo-Jong Yu and Shao Wang “A Hierarchical MDS-based
range measurements error in the NLOS (non line of sight)               Localization Algorithm for Wireless Sensor Networks”,Journal of
scenario.                                                              Information Technology and Applications.
                                                                       [13] C. Drane, M. Macnaughtan, and C. Scott, “Positioning GSM
                                                                       telephones,” IEEE Commun. Mag., vol. 36, no. 4, pp. 46–55, Apr.
                         CONCLUSION
                                                                       1998
         This paper gives an overview of multidimensional              [14] E. Kapplan, “Understanding GPS: Principles and
scaling algorithm and its current practical applications. It is        Applications,” Artech House, 1996.
an optimization algorithm that has very bright scope in future         [15] G.D. Ott, “Vehicle Location in Cellular Mobile Radio
                                                                       Systems”, IEEE Trans. on Veh. Technol., vol. VT-26, pp. 43-46,
and will help in understanding and solving large complex
                                                                       Feb. 1977.
processes which seems to be very difficult in today’s scenario.        [16] J. C. Liberti Jr. and T. S. Rappaport, “Smart Antennas for
                         REFERENCES                                    Wireless Communications: IS-95 and Third Generation CDMA
                                                                       Applications,”Prentice Hall, 1999.
[1] Multidimensional Scaling, by Forrest W.Young, University           [17] M. Pent, M.A. Spirito, and E. Turco, “Method for positioning
ofNorth Californiahttp://forrest.psych.unc.edu/teaching/p208a/         GSM mobile stations using absolute time delay measurements,”
mds/mds.html.                                                          Electronics Letters, vol. 33, pp. 2019-2020, Nov. 1997.
[2] Borg, I. and Groenen, P.: “Modern Multidimensional                 [18] K. W. Cheung, H. C. So, “A multidimensional scaling
Scaling: theory and applications” (2nd ed.), Springer-Verlag           framework for mobile location using time-of-arrival
New York, 2005.                                                        measurements,” IEEE Trans. Signal Process., vol. 53, pp. 460 –
                                                                       470, Feb 2005.
                                                                       [19] R.-T. Juang, D.-B. Lin, and H.-P. Lin, “Hybrid SADOA/TDOA
                                                                       mobile positioning for cellular networks,” IET Communications,
                                                                       vol. 1, Issue 2,pp. 282-287, Apr. 2007.




© 2011 ACEEE                                                      10
DOI: 01.IJCSI.02.01.42

Weitere ähnliche Inhalte

Was ist angesagt?

Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object DetectionIRJET Journal
 
Localization Algorithms under Correlated Shadowing in Wireless Sensor Networks
Localization Algorithms under Correlated Shadowing in Wireless Sensor NetworksLocalization Algorithms under Correlated Shadowing in Wireless Sensor Networks
Localization Algorithms under Correlated Shadowing in Wireless Sensor NetworksEditor IJCATR
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIJCNCJournal
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingIAEME Publication
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
IRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET Journal
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
A new study of dss based on neural network and data mining
A new study of dss based on neural network and data miningA new study of dss based on neural network and data mining
A new study of dss based on neural network and data miningAttaporn Ninsuwan
 

Was ist angesagt? (20)

Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Ch35473477
Ch35473477Ch35473477
Ch35473477
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object Detection
 
Localization Algorithms under Correlated Shadowing in Wireless Sensor Networks
Localization Algorithms under Correlated Shadowing in Wireless Sensor NetworksLocalization Algorithms under Correlated Shadowing in Wireless Sensor Networks
Localization Algorithms under Correlated Shadowing in Wireless Sensor Networks
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
L026070074
L026070074L026070074
L026070074
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applying
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
IRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial Images
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
A new study of dss based on neural network and data mining
A new study of dss based on neural network and data miningA new study of dss based on neural network and data mining
A new study of dss based on neural network and data mining
 

Andere mochten auch

IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...
IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...
IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...IEEEFINALYEARSTUDENTPROJECTS
 
Working with Dimensional data in Distributed Hash Tables
Working with Dimensional data in Distributed Hash TablesWorking with Dimensional data in Distributed Hash Tables
Working with Dimensional data in Distributed Hash TablesMike Malone
 
Multidimensional scaling1
Multidimensional scaling1Multidimensional scaling1
Multidimensional scaling1Carlo Magno
 
Multidimensional scaling & Conjoint Analysis
Multidimensional scaling & Conjoint AnalysisMultidimensional scaling & Conjoint Analysis
Multidimensional scaling & Conjoint AnalysisOmer Maroof
 
Multidimensional scaling
Multidimensional scalingMultidimensional scaling
Multidimensional scalingH9460730008
 
Attitude measurement and scaling techniques
Attitude measurement and scaling techniquesAttitude measurement and scaling techniques
Attitude measurement and scaling techniquesCharu Rastogi
 
Marketing Research - Perceptual Map
Marketing Research - Perceptual MapMarketing Research - Perceptual Map
Marketing Research - Perceptual MapMinha Hwang
 

Andere mochten auch (7)

IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...
IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...
IEEE 2014 JAVA DATA MINING PROJECTS A probabilistic approach to string transf...
 
Working with Dimensional data in Distributed Hash Tables
Working with Dimensional data in Distributed Hash TablesWorking with Dimensional data in Distributed Hash Tables
Working with Dimensional data in Distributed Hash Tables
 
Multidimensional scaling1
Multidimensional scaling1Multidimensional scaling1
Multidimensional scaling1
 
Multidimensional scaling & Conjoint Analysis
Multidimensional scaling & Conjoint AnalysisMultidimensional scaling & Conjoint Analysis
Multidimensional scaling & Conjoint Analysis
 
Multidimensional scaling
Multidimensional scalingMultidimensional scaling
Multidimensional scaling
 
Attitude measurement and scaling techniques
Attitude measurement and scaling techniquesAttitude measurement and scaling techniques
Attitude measurement and scaling techniques
 
Marketing Research - Perceptual Map
Marketing Research - Perceptual MapMarketing Research - Perceptual Map
Marketing Research - Perceptual Map
 

Ähnlich wie Multidimensional scaling algorithm and its current applications in wireless localization

Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
 
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...CSEIJJournal
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...M H
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksM H
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 

Ähnlich wie Multidimensional scaling algorithm and its current applications in wireless localization (20)

Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
A2 l
A2 lA2 l
A2 l
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Multidimensional scaling algorithm and its current applications in wireless localization

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 Multidimensional scaling algorithm and its current applications in wireless localization Kulvir Kaur, Student (M.Tech) Electronics and communication engg. Punjabi university Patiala, Punjab, India Shergill_14@yahoo.co.in Manjit Sandhu,Sr.Lecturer Electronics and communication engg., sbbsiet Jalandhar, Punjab, India Manjit_sandhu67@yahoo.com Abstract— The paper gives an overview of multidimensional scaling (MDS) algorithm. Aside from brief introduction to MDS, its characteristics, its various types and its current applications has been discussed in wireless systems i.e. localization of wireless sensors in a network and determining the position of a mobile station without GPS. MDS is an algorithm by means of which information contained in a set of data is represented by a set of points in a low dimensional space. These points are arranged in such a way that distances between the points represents the relation between the data elements. Keywords—MDS algorithm, MDS types, MDS current applications, localization In the fig.1, the distance between point 4 and 5 is small but 1 and 6 is large which shows that assault and I.INTRODUCTION receiving stolen gold are very unalike but burglary and libel are little alike according to respondents views. MDS is a set of data analyses technique. Information contained in a set of data is represented by a points in a B. Literature survey multidimensional space such that the distance between the MDS is a set of data analysis methods, which allow one points tells about the relation between data sets i.e. their to infer the dimensions of the perceptual space of subjects. similarity or dissimilarity. Two data objects, if they are similar The primary outcome of an MDS analysis is a spatial are represented by points that are close to each other in space configuration, in which the objects are represented as points and dissimilar objects are represented by points that are far in such a way, that their distances correspond to the apart. similarities of the objects. Their detailed study has been given in [1],[2],[3]. First well known MDS proposal was given by A. Example of MDS torgerson in 1952 that fits Euclidean distance model. It was Suppose in a survey, it has been asked to compare the based on metric analyses i.e. quantitative approach. In 1950, legal offences in term of their seriousness. The resulting data Attneave gives a Non-Euclidean distance model but it was is represented in the form of a table 1. Each entry in the not so successful. In 1962, Shepard gives psychometric table tells the percentage by which respondents give their approach. In 1964, Kruskal gives a non metric approach i.e. views of dissimilarity between offences. based on qualitative analyses. Till then new researches are The given information can be represented easily by MDS going on and various softwares have also been introduced analyses and represented the data in 2D space as shown in for MDS like INDSCAL, ALSCAL etc. MDS has been used fig1 in various applications. Main is used in wireless localization like sensor network localization and mobile station localization. A wireless sensor network [5] comprises of a large number of wireless sensor nodes and is randomly deployed. The location information does not only expand application scenarios, but also enhances performance of network protocols. In many applications, such as environmental monitoring, disaster detection, and battlefield monitoring, location information is vital. Deployments of wireless sensor net-works can be roughly categorized into manual settings, GPS-based approaches, and localization algorithms. It is not © 2011 ACEEE 6 DOI: 01.IJCSI.02.01.42
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 practical to manually set sensor location, because it is too potential disadvantage of TOA method. The MDS has been time-consuming and expensive. proposed for wireless network based mobile location. Due For the GPS-based localization method, the current/ to the MDS needs distance measurement data between the existing GPS component is too big to fit into a tiny wireless MS and BSs, the MDS technique has been proposed for sensor node. Another drawback is that GPS cannot be used mobile location using the TOA method [18]. It improves the in indoors. Locations of sensor nodes can be computed with performance of mobile location estimation. the localization algorithm. A great deal of work over the past few years has focused on the sensor localization problem. A C. Algorithmic flow of MDS detailed survey of this area is provided in [6]. In the case It is shown in fig. 2. Proximities are the data for MDS when all pair-wise distances are known, the coordinates can analyses. It can show similarity vs. A-similarity and can be be derived by using a classical method known as symmetric vs. Asymmetric. MDS model can be metric/non multidimensional scaling (MDS) [7], [8]. Shang et al. metric with Euclidean distance or non Euclidean distance. proposed the MDS-MAP localization algorithm using Dimensions can be 1,2or more depending on the parameters multidimensional scaling. MDS-MAP introduced in [9] can that are to be surveyed. Analyses can be individual, be mentioned as a well known example of this class where it aggregated or weighted. computes the shortest paths between all pairs of nodes in Details are given ahead. Various softwares are used for order to approximate the missing entries of the distance MDS analyses that gives the final results of coordinates of matrix. Another algorithms that mainly consider the sensor data in the space. Most commonly used is ALSCAL localization as a non-convex optimization problem and developed by Forrest Young. directly estimate the coordinates of sensors is a relaxation to semi-definite programming (SDP) [10]. In [11] where they use matrix completion methods as a mean to reconstruct the distance matrix. Their analysis is based on a number of strong assumptions. First, they assume that even far away sensors have non-zero probability of detecting their distances. Second, the algorithm explicitly requires the knowledge of detection probabilities between all pairs. MDS MAP require weaker assumptions. It use shortest paths for the missing entries in the distance matrix and apply MDS to find the topology of the network. Here it is assumed that only neighbouring sensors have information about each other and that only connectivity information is known and the II. CHARACTERISTICS OF MDS knowledge of detection probabilities plays no role in this algorithm. MDS-MAP still has the following drawbacks: 1) There are four main characteristics that a researcher The time complexity is high. When there are a huge number must consider while using MDS:- of sensors, large bandwidth and computation are required to • The data : It is simply the data that is to be presented estimate locations. 2) In the case of a network area with non- for MDS analyses. It can be in the form of matrix. Distinction convex shape, the computed coordinates are often erroneous. between data can be made on ‘way of data’ and ‘modes of To resolve the drawbacks of MDS-MAP, a HMDS [12] is data’. proposed which has low time complexity and which can • Way of data : It simply represent the dimensionality operate in non-convex network environments. matrix like ‘One way data’ It is like a single column matrix Mobile locations could support many applications, such that can’t be scaled i.e. can’t apply MDS. ‘Two way data’ It as emergency services, roadside assistance, navigation, is represented in matrix form and can be scaled by MDS. tracking, and so on [13]. With the popularization of wireless • Modes of data : It tells about the kind of matrix the services, more and more people call for emergency services input data has like ‘One mode data’ has rows and columns by wireless phone, and the system operators want to provide refer to the same set of objects. The matrix is square and subscriber’s location information which conforms to the FCC symmetric. ‘Two mode data’ has rows and columns of matrix requirement. Location estimations can be done through many refers to different set of objects. The matrix is rectangular ways. The first is the Global Positioning System (GPS) [14], and asymmetric. which provides accurate positioning but fails when satellite The transformation technique : It rescales data in a matrix signals are blocked like indoor situations. The second is MS into an n –dimensional space. Two types:-monotonic and location based on RSS measurements [15]. This method is linear. ‘Monotonic’ preserves ordinal information of the data. has to measure the power of the signal at the receiver and It assumes rank order of entries in data matrix contain low accuracy is achieved in this way due to the complex significant information. ‘Linear’ are expressible in simple propagation mechanisms. The third way uses the angle-of- mathematical form and are simpler. Data dissimilarities are arrival (AOA) [16]. However, this method requires a complex direct estimate of distance between the points. antenna array system and suffers from NLOS propagation. The fourth method is the TOA [17]. NLOS propagation is a © 2011 ACEEE 7 DOI: 01.IJCSI.02.01.42
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 • The models The model represents data value as III.TYPES OF MDS distance between the points in n- dimensional space. Main model used in MDS is ‘Euclidean distance model’ the data MDS can be classified into various types:- in the matrix is represented as ‘distance like’. It can be • Classical MDS: - It takes only one input matrix unweighted and weighted. In ‘Unweighted model’,all giving dissimilarity between pair of items. It uses Euclidean dimensions are given equal importance. Distance between distance model to model the dissimilarities. Two types:- points i and j in dimension a is given by: Metric CMDS:- The data in the matrix represents quantitative similarities. Ratio and interval level of measurements are used. Transformation used is linear transformation i.e. where x ia specifies the position of point i in I{S}= D+E where I{S} is linear transformation of dimension a. In ‘Weighted model’, the importance of each similarities. D is Euclidean distance matrix. E is matrix of dimension is taken in form of weights. It gives the distance error. Data matrix is square and symmetric. between the points i and j as: Non metric CMDS: -. The data in matrix represents qualitative similarities. Ordinal level of measurement is used. Transformation is monotonic transformation. i.e. where wka is a diagonal matrix represented the M{S} = D+E where m{S} is monotonic transformation importance of each dimension to each individual. of similarities. The model is Euclidean distance model. Data • Scaling techniques: Here we categorize the data in is two mode i.e. Matrix is rectangular and asymmetric. such a way that the properties of original relations remain • Replicated MDS:- It permits the analyses of several unchanged. The number of topologies has been proposed matrices of similarity data simultaneously. It uses same but the most long lived classification is that of Stevens (1946). Euclidean distance model as in CMDS but on several input He disguised data in nominal, ordinal, interval and ratio level data matrix not on a single matrix. It is also of two types of measurement that are shown in fig.3. In MDS, mostly metric and non-metric. ordinal and ratio level are used. • Weighted MDS: In RMDS the difference in In ‘Ordinal level’ we categories the data on the basis responses of individuals is taken into account but in WMDS of ranks Then plotting in n-dimensional space on this rank the cause of difference in response of several individuals is basis is done. It is further of two types: partial i.e. Some consider To take it into account weight wk is included that objects while ranking can come at same level, often results represents the importance of each dimension to each from missing data, and complete i.e. no missing data. individual. So it is also called individual difference scaling In ‘Ratio level’ Numerical value of distance between objects (INDSCAL). between adjacent points is consider. It uses weighted Euclidean distance model. It is also of metric and non metric types. RMDS generates a single distance matrix D, while WMDS generates m unique distance matrices Dk, one for each data matrix Sk. IV.APPLICATIONS IN LOCALIZATION TECHNIQUES Applications of MDS are appearing at an increasing rate and at various disciplines such as ‘Marketing’ for taking the preferences and perceptions of respondents and ‘Data visualizations’ tuning a metric space, in which points correspond to descriptors values, so that the metric space represents a perceptive distance between images. Here main discussion will be on :- • localization in a wireless sensor network using MDS • Finding the location of a mobile station in an area of a cellular network using MDS A. Localization in a wireless sensor network Determining the physical position of sensor from a large number of sensors randomly and densely deployed in a certain area is important to use the data collected by the sensor. Two approaches are proposed for localization of wireless sensor network:- a) Centralized approach:- In centralization approach, the inter-node ranging and connectivity data is migrated to a central base station and then the resultinglocations are migrated back to respective nodes. MDS-MAP is centralized algorithm used for network sensor localization that uses © 2011 ACEEE 8 DOI: 01.IJCSI.02.01.42
  • 4. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 multidimensional scaling. It uses classic metric MDS. 1) Clustering phase:- Here the whole network is divided Let there are n sensors in a network, with positions into multiple clusters using various algorithms. Xi, i = 1 . . . n, and let matrix X = [X1, X2, . . . ,Xn]T . X is 2) Intra cluster localization phase:- Each cluster contains nxm, where m is the dimensionality of X. Consider m to be one cluster head, lots of gateways and many members. an unknown. Let D = [dij ] be the nxn matrix of pair-wise Cluster head collects distance measurements from all distance measurements. The distance measurements dij must members of the cluster and compute distances of all pairs of obey the triangular inequality: dij + dik >= djk for all (i, j, devices using the shortest path algorithm such as the Dijkstra k). algorithm, so form a distance matrix of cluster members. Classical metric MDS is derived from the ‘Law of Applying a MDS on a distance matrix computes the relative Cosines’, which states that given two sides of a triangle dij , coordinates of each cluster member and forms a local map. dik, and the angle between them _jik, the third side can be 3) Merge phase:- A gateway node participates in at least computed using the formula: two neighbouring clusters, exchanges information between two clusters. Each gateway is assigned at least two coordinates from each cluster the gateway participated in. Rewriting: Different coordinates in the same gateway node implies that the coordinate systems in neighbouring clusters are different, and this information can be used to merge two coordinate Similarly, dik = Xk-Xi, djk =Xk-Xi. So rewriting we get systems into a unified coordinate system. These merged clusters repeatedly broadcast merge requests to neighbouring clusters and calibrate coordinates To find the positions X we have to choose some X0 from X of the neighbouring clusters until the coordinates of all to be the origin of a coordinate system, and construct a matrix clusters are consistent and a global map is computed. Hence B that is known as the matrix of scalar products and the we get accurate positioning system. values as follows: Now, we get a new value of coordinates X’shifted according to origin X0. Where Xi’=Xi–X 0.................................. (1) Now B can also be written as: X’X’T=B We can solve for X0 by taking an eigen-decomposition of B into an orthonormal matrix of eigenvectors U and a diagonal matrix of matching eigenvalues V. B = X’X’T = UVUT X’= UV1/2 We need to find X in 2-D space or B. Finding the location of a mobile station in a cellular 3D-space. To do this, we throw away all but the two or three network using MDS largest eigenvalues from V, leaving a 2x2 or 3x3 diagonal Mobile locations estimation can support many matrix, and throw away the matching eigenvectors U. Then applications, such as emergency services, roadside assistance, X0 has the proper dimensionality. Now from (1) we can find navigation, tracking etc. Various techniques can be used like Xi’s. Hence we have determine the coordinates of sensors. GPS, RSS but these suffer from drawbacks like blockage of This approach of MDS has some drawbacks as signal and complex propagation path. mentioned. A single pass of multidimensional scaling cannot The MDS has been proposed for wireless network operate on a large topology, MDS MAP also does not use based mobile location. Due to the MDS needs distance anchor nodes very well as anchor density increases, measurement data between the MS and BSs, the MDS calculated positions are very near to actual value but don’t technique has been proposed for mobile location using the have exact values, This approach requires distance TOA (time of arrival) method. Using TOA method, the range measurement for all pairs of nodes but some nodes are very can be modelled as: ri= di+ni where ri is range measurement far away from a particular sensor and distance can’t be between MS and BSi. ni is range error that occurs due to measured. multipath fading and propagation losses that includes range To overcome these difficulties we use another delay. To estimate mobile location, a square distance matrix method based on distributed approach. is constructed as: b) Distributed approach:- This approach is also called hierarchical MDS-based localization algorithm (HMDS).In this architecture, a sensor node may take the a) roles of cluster head, cluster member or gateway node. It makes an assumption that whole network is connected i.e. two node have at least one path. Also, each device supports RSSI (Received signal strength indicator measurement). HMDS has three execution phase which are as follows: © 2011 ACEEE 9 DOI: 01.IJCSI.02.01.42
  • 5. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 distance between BSi and BSj. ht is matrix of range between [3] Cox, T.F., Cox, M.A.A., (2001), Multidimensional Scaling, BS and MS. From Dt we can obtain the scalar product matrix Chapman and Hall. Bt that gives the distance of all BSs and MS from a given [4] P. Bickel, P. Diggle, S. Fienberg, K. Krickeberg, I. Olkin, N. location that is consider as origin. But distance in matrix Dt Wermuth, S. Zeger, “Modern Multidimensional Scaling Theory is pair wise between either in BSs or BS and MS. Bt is and Applications,” Springer, 1997. obtained by double centring technique i.e. subtracting rows [5] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, “A survey on sensor networks,” IEEE and columns means from each element. Then add grand mean Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug 2002. to each element and multiplying by (-1/2). [6] G. B. J. Hightower, “Locations systems for ubiquitous When employing the classical MDS, the centroid computing,” IEEE Computer, vol. 34, pp. 57–66, 2001. of the all coordinates is assumed at the origin, so the scalar [7] Y. Shang, W. Ruml, Y. Zhang, and M. P. J. Fromherz, matrix, Bt can be express as : “Localization from connectivity in sensor networks,” IEEE Trans. Parallel Distrib.Syst., vol. 15, no. 11, pp. 961–974, 2004. [8] X. Ji and H. Zha, “Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling,” in Proc. IEEE INFOCOM, March 2004. [9] Sau Yee Wong, Joo Ghee Lim, SV Rao and Winston KG Seah, “Density-aware hop-count localization (DHL) in wireless sensor networks with variable density,” Proceedings of IEEE Wireless By eigenvalue decomposition Bt can be represented as : Communications and Networking Conference (WCNC2005), vol. BT=UVUT 3, pp. 1848-1853, Mar. 2005. Where V is diagonal matrix of eigenvalues of Bt. And U is a [10] P. Biswas and Y. Ye, “Semidefinite programming for ad hoc matrix having corresponding eigenvectors. wireless sensor network localization,” in IPSN ’04: Proceedings From this we can evaluate the value of X as of the 3rd international symposium on Information processing in sensor networks. New York, NY, USA: ACM, 2004, pp. 46–54. X= UV1/2 [11] P. Drineas, A. Javed, M. Magdon-Ismail, G. Pandurangant, R. Now if we know the value of X, also all BSs are Virrankoski, and A. Savvides, “Distance matrix reconstruction from fixed and hence we know the value of coordinates of BSs. incomplete distance information for sensor network localization,” Thus, from (2), we can find the value of XMS i.e. coordinates in Proceedings of Sensor and Ad-Hoc Communications and of MS. Networks Conference (SECON), vol. 2, Sept. 2006, pp. 536–544. Classical multidimensional scaling is sensitive to the [12] Gwo-Jong Yu and Shao Wang “A Hierarchical MDS-based range measurements error in the NLOS (non line of sight) Localization Algorithm for Wireless Sensor Networks”,Journal of scenario. Information Technology and Applications. [13] C. Drane, M. Macnaughtan, and C. Scott, “Positioning GSM telephones,” IEEE Commun. Mag., vol. 36, no. 4, pp. 46–55, Apr. CONCLUSION 1998 This paper gives an overview of multidimensional [14] E. Kapplan, “Understanding GPS: Principles and scaling algorithm and its current practical applications. It is Applications,” Artech House, 1996. an optimization algorithm that has very bright scope in future [15] G.D. Ott, “Vehicle Location in Cellular Mobile Radio Systems”, IEEE Trans. on Veh. Technol., vol. VT-26, pp. 43-46, and will help in understanding and solving large complex Feb. 1977. processes which seems to be very difficult in today’s scenario. [16] J. C. Liberti Jr. and T. S. Rappaport, “Smart Antennas for REFERENCES Wireless Communications: IS-95 and Third Generation CDMA Applications,”Prentice Hall, 1999. [1] Multidimensional Scaling, by Forrest W.Young, University [17] M. Pent, M.A. Spirito, and E. Turco, “Method for positioning ofNorth Californiahttp://forrest.psych.unc.edu/teaching/p208a/ GSM mobile stations using absolute time delay measurements,” mds/mds.html. Electronics Letters, vol. 33, pp. 2019-2020, Nov. 1997. [2] Borg, I. and Groenen, P.: “Modern Multidimensional [18] K. W. Cheung, H. C. So, “A multidimensional scaling Scaling: theory and applications” (2nd ed.), Springer-Verlag framework for mobile location using time-of-arrival New York, 2005. measurements,” IEEE Trans. Signal Process., vol. 53, pp. 460 – 470, Feb 2005. [19] R.-T. Juang, D.-B. Lin, and H.-P. Lin, “Hybrid SADOA/TDOA mobile positioning for cellular networks,” IET Communications, vol. 1, Issue 2,pp. 282-287, Apr. 2007. © 2011 ACEEE 10 DOI: 01.IJCSI.02.01.42