SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474
www.ijera.com 470 | P a g e
An Improved Energy-Efficient BBO-Based PEGASIS Protocol in
Wireless Sensors Network
Bipandeep Singh*, Er. Simranjit Kaur**
*(Student, M.Tech-E.C.E, Department of E.C.E, Ludhiana College of Engineering and Technology, Katani
Kalan, Ludhiana, PTU, Jallandhar , India )
**(Assistant Professor, Department of E.C.E, Ludhiana College of Engineering and Technology, Katani Kalan,
Ludhiana, PTU, Jallandhar , India)
ABSTRACT
The energy efficiency in the WSN is one of the very important Performance Indicator. Sensor network is a
distributed event-based system that differs from traditional communication network. Sensor webs consisting of
nodes with limited battery power and wireless communications are deployed to collect useful information from
the field. PEGASIS (Power-Efficient Gathering in Sensor Information System) is chain based protocol which is
used to construct chain of sensor nodes. In the proposed work BBO is implemented along with PEGASIS to get
the shortest chain for every round. Moreover to construct chain, energy of each sensor has been taken into
account to bring a balance of energy consumption between nodes. Compared with PEGASIS, this PEG-BBO
gives better results. Simulation results show that proposed protocol significantly prolongs the network lifetime.
Keywords- BBO, Chain-based, PEGASIS, Routing protocol, WSN.
I. INTRODUCTION
1.1 WSN
Wireless Sensor Networks [1] with the
characteristics of low energy consumption, low cost,
distributed and self organization, have brought a
revolution to the information perception. The
wireless sensor network is composed of hundreds of
thousands of the sensor nodes that can sense
conditions of surrounding environment such as
illumination, humidity, and temperature. Each sensor
node collects data such as illumination, humidity, and
temperature of the area. Each sensor node is deployed
and transmits data to base station (BS). The wireless
sensor network can be applied to variable fields. For
example, the wireless sensor network can be used to
monitor at the hostile environments for the use of
military applications, to detect forest fires for
prevention of disasters, or to study the phenomenon
of the typhoon for a variety of academic purposes.
These sensor nodes can self-organize to form a
network and can communicate with each other using
their wireless interfaces. Energy efficient self-
organization and initialization protocols are
developed. Each node has transmit power control and
an omni-directional antenna, and therefore can adjust
the area of coverage with its wireless transmission.
Typically, sensor nodes collect audio, seismic, and
other types of data and collaborate to perform a high-
level task in a sensor web. For example, a sensor
network can be used for detecting the presence of
potential threats in a military conflict. Most of battery
energy is consumed by receiving and transmitting
data. If all sensor nodes transmit data directly to the
BS, the furthest node from BS will die early [2]. On
the other hand, among sensor nodes transmitting data
through multiple hops, node closest to the BS tends
to die early, leaving some network areas completely
unmonitored and causing network partition. In order
to maximize the lifetime of WSN, it is necessary for
communication protocols to prolong sensor nodes’
lifetime by minimizing transmission energy
consumption, sending data via paths that can avoid
sensor nodes with low energy and minimizing the
total transmission power.
1.2 Architecture of WSN
After the initial deployment (typically ad
hoc), sensor nodes are responsible for self-organizing
an appropriate network infrastructure, often with
multi-hop connections between sensor nodes. The
onboard sensors then start collecting acoustic,
seismic, infrared or magnetic information about the
environment, using either continuous or event driven
working modes. Location and positioning
information can also be obtained through the global
positioning system (GPS) or local positioning
algorithms [3]. This information can be gathered
from across the network and appropriately processed
to construct a global view of the monitoring
phenomena or objects. In general, the wireless sensor
networks are deployed for monitoring at a large area
so the wireless sensor networks need many sensor
nodes. If the sensor node consumes all the energy, it
is wasted. We do not consider to recharge and to
RESEARCH ARTICLE OPEN ACCESS
Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474
www.ijera.com 471 | P a g e
reuse sensor node. Because of these reasons, the
value of the sensor nodes must be inexpensive to
practical use. Deployed in harsh and complicated
environments, the sensor nodes are difficult to
recharge or replace once their energy is drained.
Mean while the sensor nodes have limited
communication capacity and computing power. So
how to optimize the communication path, improve
the energy-efficiency as well as load balance and
prolong the network lifetime has become an
important issue of designing routing protocols for
WSN. Hierarchical-based routing protocols [4] are
widely used for their high energy-efficiency and good
expandability. The basic idea of them is to select
some nodes in charge of a certain region routing.
These selected nodes have greater responsibility
relative to other nodes which leads to the
incompletely equal relationship between sensor
nodes.
1.3 Routing techniques in WSN
Wireless sensor networks (WSN) consist of
small nodes with sensing, computation, and wireless
communications capabilities. Many routing, power
management, and data dissemination protocols have
been specifically designed for WSNs where energy
awareness is an essential design issue. Routing
protocols in WSNs might differ depending on the
application and network architecture. Overall, the
routing techniques [5] are classified into three
categories based on the underlying network structure:
flat, hierarchical, and location-based routing.
Furthermore, these protocols can be classified into
multipath-based, query-based, negotiation based,
QoS-based, and coherent based depending on the
protocol operation. In flat networks all nodes play the
same role, while hierarchical protocols aim to cluster
the nodes so that cluster heads can do some
aggregation and reduction of data in order to save
energy. Location-based protocols utilize position
information to relay the data to the desired regions
rather than the whole network. LEACH (Low Energy
Adaptive Clustering Hierarchy) and PEGASIS
(Power-Efficient Gathering in Sensor Information
System) are the typical hierarchical-based routing
protocols. As an enhancement algorithm of LEACH,
PEGASIS is a classical chain-based routing protocol.
It saves significant energy compared with the
LEACH protocol by improving the cluster
configuration and the delivery method of sensing
data. PEGASIS protocol is used in the proposed
chain building process.
II. PEGASIS
The PEGASIS algorithm is based on the
LEACH. The core conception in PEGASIS is to form
a chain among all the sensor nodes so that each node
can receive from and transmit to the closest neighbor.
Gathered data moves from node to node, get fused,
and eventually a designated node (cluster head)
transmits to the BS [6]. Nodes take turns transmitting
to the BS so that the average energy spent by each
node per round is reduced. The method of Building a
chain to minimize the total length is similar to the
traveling salesman problem, which is known to be
intractable. However, with the radio communication
energy parameters, a simple chain built with a greedy
approach performs quite well [7]. So, PEGASIS
algorithm has some advantages as follow:
• Normal nodes only communicated with it's
neighbor and every node will take data fusion in
order.
• The distance of the connect nodes with each
other have been shortened remarkably.
• Nodes take turns to be the cluster head, so it
takes no energy.
III. Biogeography-Based Optimization
As name suggests, BBO is a population
based global optimization technique developed on the
basis of the science of biogeography i.e. study of the
distribution of animals and plants among different
habitats over time and space [8]. BBO results
presented by researchers are better than other
optimization techniques like Ant Colony
Optimization, Particle Swarm Optimization, Genetic
Algorithm and Simulated Annealing.
Fig. 1 Linear migration relationships for an island.
The equilibrium number of species is S0, at which
point the immigration and emigration rates are equal.
Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474
www.ijera.com 472 | P a g e
Fig. 2 Illustration of two candidate solutions to some
problem using symmetric immigration and
emigration curves. ISI1 is a relatively poor solution
and ISI2 is a relatively good solution. ISI1 has a high
immigration and a low emigration rate, and ISI2 has a
low immigration and a high emigration rate.
Suppose that there is a problem and a
population of candidate solutions that are represented
as vectors. Further suppose that there is some way of
assessing the goodness of the solutions. Good
solutions are analogous to islands with a high ISI,
and poor solutions are analogous to islands with a
low ISI. Note that ISI is the same as “fitness” in other
population based optimization algorithms. In
biogeography, species migrate between islands.
However, in BBO solution features (SIVs) migrates
between islands. The migration probabilities are
based on a curve similar to that shown in Figure 1,
but for the sake of simplicity assume that all solutions
(islands) have identical migration curves with E = I.
Figure 2 illustrates the migration curves along with
two solutions. ISI1 represents a poor solution and ISI2
represents a good solution. The immigration rate for
ISI1 will therefore be higher than the immigration rate
for ISI2, and the emigration rate for ISI1 will be lower
than the emigration rate for ISI2. The migration rates
of each solution to probabilistically share features
between solutions is used. This can be implemented
in several different ways, but in this paper we use the
original BBO formulation, which is called partial
immigration-based BBO [9]. In this approach, for
each feature in each solution, we use the immigration
curve to probabilistically decide whether or not to
immigrate. If immigration is selected for a given
solution feature, then the emigrating island is selected
probabilistically. Fig. 3 is a conceptual description of
one generation of this approach, where the notation
yk(s) is used to denote the sth
feature of the kth
population member. Migration and mutation of the
entire population take place before any of the
solutions are replaced in the population, which
requires the use of the temporary population vector w
in Fig. 3.
Fig. 3 One generation of the partial immigration-
based BBO algorithm. Y is the entire population of
solutions, Yk is the kth solution, and yk(s) is the sth
feature of Yk.
IV. Proposed Methodology
Methodology used in PEG-BBO for energy
enhancement is described in the following steps:
Step 1: Initializing WSN parameter
Step 2: Deploying No. of Nodes
Step 3: Implementing PEGASIS Protocol
Step 4: Initialize BBO parameter for routing
Step 5: Defining Migration and
Emigration rate
Step 6: Routing update with each round
Step 7: Checking Lifetime and Data
Consumption
Step 8: Comparison with other methods
Table 1 System Parameters Value
Parameter Value
Network size 100×100 𝑚2
Number of nodes 100
Base Station (50,175)
Energy 0.5 J
Data packet 3000 bits
Transmission Energy 50*0.000000001 J
Receiving Energy 50*0.000000001 J
V. Results and Discussion
This paper uses Matlab as simulator to
evaluate the performance of existing PEGASIS
compared with PEG-BBO.
Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474
www.ijera.com 473 | P a g e
Fig. 4 Chain formed in PEG-BBO
Fig. 4 shows how chaining process in done
using PEG-BBO. For every round this process is
performed.
Fig. 5 Number of nodes alive over time
As shown in fig. 5 nodes alive in PEG-BBO
is larger than PEGASIS hence PEG-BBO makes the
system more energy efficient.
Fig. 6 Amount of data sent over time
As shown in fig. 6 as the no. of round
increases more data is sent in PEG-BBO than in
PEGASIS.
VI. Conclusion
In this paper, a routing protocol using BBO
is presented to construct the chain of the PEGASIS
protocol. BBO adopts a more reasonable method to
build the chain and keep energy consumption
balanced to further prolong the lifetime of WSN. The
simulation results shows that PEG-BBO gives higher
energy-efficiency and extending lifetime of network.
References
[1] Feng Sen, Qi Bing, Tang Liangrui, An
Improved Energy-Efficient PEGASIS-Based
Protocol in Wireless Sensor Networks,
International Conference on Fuzzy Systems
and Knowledge Discovery, vol.4, pp.2230-
2233, 2011.
[2] W. Guo, W. Zhang, G. Lu, PEGASIS
Protocol in Wireless Sensor Network Based
on an Improved Ant Colony Algorithm,
IEEE Second International Workshop on
Education Technology and Computer
Science, Wuhan, pp:64-67, March 2010.
[3] Sunita Rani, Tarun Gulati, An Improved
PEGASIS Protocol to Enhance Energy
Utilization in Wireless Sensor Network,
International Journal of Advanced Research
in Computer Science and Software
Engineering, vol.2, pp.248-253, November
2012.
[4] S. Jain, P. Kaushik and J. Singhai, Energy
Efficient Maximum Lifetime Routing For
Wireless Sensor Network, International
Journal Of Advanced Smart Sensor Network
Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474
www.ijera.com 474 | P a g e
Systems, Vol 2, Issue. 1, pp: 12-18, January
2012.
[5] Ravinder Kumar, P. S. Mundra, Improved
Data Gathering Protocol for WSN,
International Journal of Electronics and
Computer Science Engineering, vol.1, no.3,
pp.1208-1213, 2012.
[6] WANG Lin-ping, BI Wu, CAI Zhen and
WANG Zu-feng, Improved algorithm of
PEGASIS protocol introducing double
cluster heads in wireless sensor network,
International Conference on Computer,
Mechatronics, Control and Electronic
Engineering, pp.148-151, 2010.
[7] K. Padmanabhan and P. Kamalakkannan,
Energy-efficient Dynamic Clustering
Protocol for Wireless Sensor Networks,
International Journal of Computer
Applications, Vol. 38, Issue. 11, pp: 35-39,
January 2012.
[8] Dan Simon, Mehmet Ergezer, and Dawei
Du, Population Distributions in
Biogeography- Based Optimization
Algorithms with Elitism, IEEE International
Conference on Systems, Man and
Cybernetics, pp. 991 – 996, October 2009.
[9] D. Simon, Biogeography-based
optimization, IEEE Transactions on
Evolutionary Computation, vol. 12, pp. 702-
713, December 2008.

Weitere ähnliche Inhalte

Was ist angesagt?

LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...ijasuc
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.Sanjay Shelar
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...iosrjce
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networksijtsrd
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)IAESIJEECS
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNMulti-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNIRJET Journal
 

Was ist angesagt? (18)

LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNMulti-Objective Soft Computing Techniques for Dynamic Deployment in WSN
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSN
 
D010332935
D010332935D010332935
D010332935
 

Andere mochten auch

E Learning Workshop 9jan2009 Storrao
E Learning Workshop 9jan2009 StorraoE Learning Workshop 9jan2009 Storrao
E Learning Workshop 9jan2009 StorraoSofia Torrão
 
Возникновение Солнечной системы
Возникновение Солнечной системыВозникновение Солнечной системы
Возникновение Солнечной системыaleksa1987
 
Bje Lam Home Staging
Bje Lam Home StagingBje Lam Home Staging
Bje Lam Home Stagingedenbj
 
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...Interoperability in the eGovernment legal basis, the Spanish case, Session IS...
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...Miguel A. Amutio
 
Photo Collection
Photo CollectionPhoto Collection
Photo Collectionguest17d449
 
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri Yasar Tonta
 
Las Nuevas TecnologìAs Luz
Las Nuevas TecnologìAs LuzLas Nuevas TecnologìAs Luz
Las Nuevas TecnologìAs Luzguest3a2710
 

Andere mochten auch (20)

Aa04405152157
Aa04405152157Aa04405152157
Aa04405152157
 
E Learning Workshop 9jan2009 Storrao
E Learning Workshop 9jan2009 StorraoE Learning Workshop 9jan2009 Storrao
E Learning Workshop 9jan2009 Storrao
 
Возникновение Солнечной системы
Возникновение Солнечной системыВозникновение Солнечной системы
Возникновение Солнечной системы
 
Bje Lam Home Staging
Bje Lam Home StagingBje Lam Home Staging
Bje Lam Home Staging
 
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...Interoperability in the eGovernment legal basis, the Spanish case, Session IS...
Interoperability in the eGovernment legal basis, the Spanish case, Session IS...
 
I0444751
I0444751I0444751
I0444751
 
C0441216
C0441216C0441216
C0441216
 
Bh4301327332
Bh4301327332Bh4301327332
Bh4301327332
 
Z04408133137
Z04408133137Z04408133137
Z04408133137
 
Doc1
Doc1Doc1
Doc1
 
Photo Collection
Photo CollectionPhoto Collection
Photo Collection
 
G045063944
G045063944G045063944
G045063944
 
D45012128
D45012128D45012128
D45012128
 
J45025355
J45025355J45025355
J45025355
 
K045036871
K045036871K045036871
K045036871
 
Е-услуги без възраст и граници
Е-услуги без възраст и границиЕ-услуги без възраст и граници
Е-услуги без възраст и граници
 
Hendrix Page
Hendrix PageHendrix Page
Hendrix Page
 
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri
Web 2.0 ve Library 2.0: Dijital yerliler için bilgi hizmetleri
 
F045073136
F045073136F045073136
F045073136
 
Las Nuevas TecnologìAs Luz
Las Nuevas TecnologìAs LuzLas Nuevas TecnologìAs Luz
Las Nuevas TecnologìAs Luz
 

Ähnlich wie Cg4301470474

EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...IJMER
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...IOSR Journals
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networksijtsrd
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...ijtsrd
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocoleSAT Publishing House
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 

Ähnlich wie Cg4301470474 (20)

EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
C018141418
C018141418C018141418
C018141418
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Cg4301470474

  • 1. Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474 www.ijera.com 470 | P a g e An Improved Energy-Efficient BBO-Based PEGASIS Protocol in Wireless Sensors Network Bipandeep Singh*, Er. Simranjit Kaur** *(Student, M.Tech-E.C.E, Department of E.C.E, Ludhiana College of Engineering and Technology, Katani Kalan, Ludhiana, PTU, Jallandhar , India ) **(Assistant Professor, Department of E.C.E, Ludhiana College of Engineering and Technology, Katani Kalan, Ludhiana, PTU, Jallandhar , India) ABSTRACT The energy efficiency in the WSN is one of the very important Performance Indicator. Sensor network is a distributed event-based system that differs from traditional communication network. Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. PEGASIS (Power-Efficient Gathering in Sensor Information System) is chain based protocol which is used to construct chain of sensor nodes. In the proposed work BBO is implemented along with PEGASIS to get the shortest chain for every round. Moreover to construct chain, energy of each sensor has been taken into account to bring a balance of energy consumption between nodes. Compared with PEGASIS, this PEG-BBO gives better results. Simulation results show that proposed protocol significantly prolongs the network lifetime. Keywords- BBO, Chain-based, PEGASIS, Routing protocol, WSN. I. INTRODUCTION 1.1 WSN Wireless Sensor Networks [1] with the characteristics of low energy consumption, low cost, distributed and self organization, have brought a revolution to the information perception. The wireless sensor network is composed of hundreds of thousands of the sensor nodes that can sense conditions of surrounding environment such as illumination, humidity, and temperature. Each sensor node collects data such as illumination, humidity, and temperature of the area. Each sensor node is deployed and transmits data to base station (BS). The wireless sensor network can be applied to variable fields. For example, the wireless sensor network can be used to monitor at the hostile environments for the use of military applications, to detect forest fires for prevention of disasters, or to study the phenomenon of the typhoon for a variety of academic purposes. These sensor nodes can self-organize to form a network and can communicate with each other using their wireless interfaces. Energy efficient self- organization and initialization protocols are developed. Each node has transmit power control and an omni-directional antenna, and therefore can adjust the area of coverage with its wireless transmission. Typically, sensor nodes collect audio, seismic, and other types of data and collaborate to perform a high- level task in a sensor web. For example, a sensor network can be used for detecting the presence of potential threats in a military conflict. Most of battery energy is consumed by receiving and transmitting data. If all sensor nodes transmit data directly to the BS, the furthest node from BS will die early [2]. On the other hand, among sensor nodes transmitting data through multiple hops, node closest to the BS tends to die early, leaving some network areas completely unmonitored and causing network partition. In order to maximize the lifetime of WSN, it is necessary for communication protocols to prolong sensor nodes’ lifetime by minimizing transmission energy consumption, sending data via paths that can avoid sensor nodes with low energy and minimizing the total transmission power. 1.2 Architecture of WSN After the initial deployment (typically ad hoc), sensor nodes are responsible for self-organizing an appropriate network infrastructure, often with multi-hop connections between sensor nodes. The onboard sensors then start collecting acoustic, seismic, infrared or magnetic information about the environment, using either continuous or event driven working modes. Location and positioning information can also be obtained through the global positioning system (GPS) or local positioning algorithms [3]. This information can be gathered from across the network and appropriately processed to construct a global view of the monitoring phenomena or objects. In general, the wireless sensor networks are deployed for monitoring at a large area so the wireless sensor networks need many sensor nodes. If the sensor node consumes all the energy, it is wasted. We do not consider to recharge and to RESEARCH ARTICLE OPEN ACCESS
  • 2. Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474 www.ijera.com 471 | P a g e reuse sensor node. Because of these reasons, the value of the sensor nodes must be inexpensive to practical use. Deployed in harsh and complicated environments, the sensor nodes are difficult to recharge or replace once their energy is drained. Mean while the sensor nodes have limited communication capacity and computing power. So how to optimize the communication path, improve the energy-efficiency as well as load balance and prolong the network lifetime has become an important issue of designing routing protocols for WSN. Hierarchical-based routing protocols [4] are widely used for their high energy-efficiency and good expandability. The basic idea of them is to select some nodes in charge of a certain region routing. These selected nodes have greater responsibility relative to other nodes which leads to the incompletely equal relationship between sensor nodes. 1.3 Routing techniques in WSN Wireless sensor networks (WSN) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. Overall, the routing techniques [5] are classified into three categories based on the underlying network structure: flat, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation based, QoS-based, and coherent based depending on the protocol operation. In flat networks all nodes play the same role, while hierarchical protocols aim to cluster the nodes so that cluster heads can do some aggregation and reduction of data in order to save energy. Location-based protocols utilize position information to relay the data to the desired regions rather than the whole network. LEACH (Low Energy Adaptive Clustering Hierarchy) and PEGASIS (Power-Efficient Gathering in Sensor Information System) are the typical hierarchical-based routing protocols. As an enhancement algorithm of LEACH, PEGASIS is a classical chain-based routing protocol. It saves significant energy compared with the LEACH protocol by improving the cluster configuration and the delivery method of sensing data. PEGASIS protocol is used in the proposed chain building process. II. PEGASIS The PEGASIS algorithm is based on the LEACH. The core conception in PEGASIS is to form a chain among all the sensor nodes so that each node can receive from and transmit to the closest neighbor. Gathered data moves from node to node, get fused, and eventually a designated node (cluster head) transmits to the BS [6]. Nodes take turns transmitting to the BS so that the average energy spent by each node per round is reduced. The method of Building a chain to minimize the total length is similar to the traveling salesman problem, which is known to be intractable. However, with the radio communication energy parameters, a simple chain built with a greedy approach performs quite well [7]. So, PEGASIS algorithm has some advantages as follow: • Normal nodes only communicated with it's neighbor and every node will take data fusion in order. • The distance of the connect nodes with each other have been shortened remarkably. • Nodes take turns to be the cluster head, so it takes no energy. III. Biogeography-Based Optimization As name suggests, BBO is a population based global optimization technique developed on the basis of the science of biogeography i.e. study of the distribution of animals and plants among different habitats over time and space [8]. BBO results presented by researchers are better than other optimization techniques like Ant Colony Optimization, Particle Swarm Optimization, Genetic Algorithm and Simulated Annealing. Fig. 1 Linear migration relationships for an island. The equilibrium number of species is S0, at which point the immigration and emigration rates are equal.
  • 3. Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474 www.ijera.com 472 | P a g e Fig. 2 Illustration of two candidate solutions to some problem using symmetric immigration and emigration curves. ISI1 is a relatively poor solution and ISI2 is a relatively good solution. ISI1 has a high immigration and a low emigration rate, and ISI2 has a low immigration and a high emigration rate. Suppose that there is a problem and a population of candidate solutions that are represented as vectors. Further suppose that there is some way of assessing the goodness of the solutions. Good solutions are analogous to islands with a high ISI, and poor solutions are analogous to islands with a low ISI. Note that ISI is the same as “fitness” in other population based optimization algorithms. In biogeography, species migrate between islands. However, in BBO solution features (SIVs) migrates between islands. The migration probabilities are based on a curve similar to that shown in Figure 1, but for the sake of simplicity assume that all solutions (islands) have identical migration curves with E = I. Figure 2 illustrates the migration curves along with two solutions. ISI1 represents a poor solution and ISI2 represents a good solution. The immigration rate for ISI1 will therefore be higher than the immigration rate for ISI2, and the emigration rate for ISI1 will be lower than the emigration rate for ISI2. The migration rates of each solution to probabilistically share features between solutions is used. This can be implemented in several different ways, but in this paper we use the original BBO formulation, which is called partial immigration-based BBO [9]. In this approach, for each feature in each solution, we use the immigration curve to probabilistically decide whether or not to immigrate. If immigration is selected for a given solution feature, then the emigrating island is selected probabilistically. Fig. 3 is a conceptual description of one generation of this approach, where the notation yk(s) is used to denote the sth feature of the kth population member. Migration and mutation of the entire population take place before any of the solutions are replaced in the population, which requires the use of the temporary population vector w in Fig. 3. Fig. 3 One generation of the partial immigration- based BBO algorithm. Y is the entire population of solutions, Yk is the kth solution, and yk(s) is the sth feature of Yk. IV. Proposed Methodology Methodology used in PEG-BBO for energy enhancement is described in the following steps: Step 1: Initializing WSN parameter Step 2: Deploying No. of Nodes Step 3: Implementing PEGASIS Protocol Step 4: Initialize BBO parameter for routing Step 5: Defining Migration and Emigration rate Step 6: Routing update with each round Step 7: Checking Lifetime and Data Consumption Step 8: Comparison with other methods Table 1 System Parameters Value Parameter Value Network size 100×100 𝑚2 Number of nodes 100 Base Station (50,175) Energy 0.5 J Data packet 3000 bits Transmission Energy 50*0.000000001 J Receiving Energy 50*0.000000001 J V. Results and Discussion This paper uses Matlab as simulator to evaluate the performance of existing PEGASIS compared with PEG-BBO.
  • 4. Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474 www.ijera.com 473 | P a g e Fig. 4 Chain formed in PEG-BBO Fig. 4 shows how chaining process in done using PEG-BBO. For every round this process is performed. Fig. 5 Number of nodes alive over time As shown in fig. 5 nodes alive in PEG-BBO is larger than PEGASIS hence PEG-BBO makes the system more energy efficient. Fig. 6 Amount of data sent over time As shown in fig. 6 as the no. of round increases more data is sent in PEG-BBO than in PEGASIS. VI. Conclusion In this paper, a routing protocol using BBO is presented to construct the chain of the PEGASIS protocol. BBO adopts a more reasonable method to build the chain and keep energy consumption balanced to further prolong the lifetime of WSN. The simulation results shows that PEG-BBO gives higher energy-efficiency and extending lifetime of network. References [1] Feng Sen, Qi Bing, Tang Liangrui, An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks, International Conference on Fuzzy Systems and Knowledge Discovery, vol.4, pp.2230- 2233, 2011. [2] W. Guo, W. Zhang, G. Lu, PEGASIS Protocol in Wireless Sensor Network Based on an Improved Ant Colony Algorithm, IEEE Second International Workshop on Education Technology and Computer Science, Wuhan, pp:64-67, March 2010. [3] Sunita Rani, Tarun Gulati, An Improved PEGASIS Protocol to Enhance Energy Utilization in Wireless Sensor Network, International Journal of Advanced Research in Computer Science and Software Engineering, vol.2, pp.248-253, November 2012. [4] S. Jain, P. Kaushik and J. Singhai, Energy Efficient Maximum Lifetime Routing For Wireless Sensor Network, International Journal Of Advanced Smart Sensor Network
  • 5. Bipandeep Singh et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.470-474 www.ijera.com 474 | P a g e Systems, Vol 2, Issue. 1, pp: 12-18, January 2012. [5] Ravinder Kumar, P. S. Mundra, Improved Data Gathering Protocol for WSN, International Journal of Electronics and Computer Science Engineering, vol.1, no.3, pp.1208-1213, 2012. [6] WANG Lin-ping, BI Wu, CAI Zhen and WANG Zu-feng, Improved algorithm of PEGASIS protocol introducing double cluster heads in wireless sensor network, International Conference on Computer, Mechatronics, Control and Electronic Engineering, pp.148-151, 2010. [7] K. Padmanabhan and P. Kamalakkannan, Energy-efficient Dynamic Clustering Protocol for Wireless Sensor Networks, International Journal of Computer Applications, Vol. 38, Issue. 11, pp: 35-39, January 2012. [8] Dan Simon, Mehmet Ergezer, and Dawei Du, Population Distributions in Biogeography- Based Optimization Algorithms with Elitism, IEEE International Conference on Systems, Man and Cybernetics, pp. 991 – 996, October 2009. [9] D. Simon, Biogeography-based optimization, IEEE Transactions on Evolutionary Computation, vol. 12, pp. 702- 713, December 2008.