SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 
DATA COLLECTION SCHEME FOR WIRELESS 
SENSOR NETWORK WITH MOBILE COLLECTOR 
Khaled A. Almi’ani, Muder Almi’ani, Ali Al_ghonmein and Khaldun Al- 
Moghrabi 
Al-Hussein Bin Talal University, Ma‘an, Jordan 
ABSTRACT 
In this paper, we investigate the problem of designing the minimum number of required mobile elements 
tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the 
tour to be bounded by pre-determined value L. To address this problem, we propose heuristic-based 
solution. This solution works by directing the mobile element tour towards the highly dense area in the 
network. The experiment results show that our scheme outperform the benchmark scheme by 10% in most 
scenarios. 
1. INTRODUCTION 
Typically, in multi-hop data communication scenario, the sensors closed to the sink are the first to 
run out energy. This is due to fact that these sensors are required to forward all other nodes data. 
Once these nodes are disconnected, the operational lifetime of the networks ends, since the entire 
network become unable to communicate with the sink. This raise reducing the energy 
consumption as a major challenge. 
To address this problem, many proposals [1][2][3] in the literature, have investigated the use of 
the Mobile Elements (MEs). A Mobile Element serves as a data carrier and travel the entire 
network to collect the data of each sensor via single-hop communication. By using Mobile 
Elements, we can avoid the energy consumption due to multi-hop communication. However, the 
speed of the mobile element is typically low[4][5], and therefore reducing the data gathering 
latency is important to ensure the efficiency of such approach. 
In this paper, we assume that are given more than one mobile element and the objective is to 
design minimum number of required tours to cover the network. Such that each sensor node is 
either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined 
value L. We term this problem as the Length-constrained Tours Minimization. To 
address the presented problems we present heuristic-based solution, which uses cluster-based 
mechanism to build it solutions. 
The rest of the paper is organized as follows. Section 2 presents the related work in this area. 
Section 3 provides formal definitions of the problem presented in this work. Section 4 presents 
the heuristic solution of the presented problem. In Section 5 the evaluation for the proposed 
heuristics is presented. Finally, Section 6 concludes the paper. 
2. RELATED WORK. 
In the literature, several proposals [6][7] have investigated the use mobile sink(or mobile 
elements) to increase the lifetime of the network. By varying the data gathering path, the residual 
DOI : 10.5121/ijwmn.2014.6402 19
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 
energy in the nodes becomes more evenly balanced throughout the network, leading to a higher 
network lifetime. 
Zhao et al. [8][9] investigated the problem of maximizing the overall network utility. 
Accordingly, they proposed two algorithmic-based solutions, where the mobile element visit each 
gathering point for a period of time and gather the data from nearby sensors via multi-hop 
communications. They considered the cases where the sojourn time is fixed as well as variable. 
Guney et al. [10]formulated finding the optimal sink trajectory and the data flow routs problem as 
mixed integer programming formulations. Accordingly, they presented several heuristic to 
address the presented problem. 
The problem presented in this work share some similarities with the problem proposed by Xu et 
al. [14]. In their problem, the objective is to plan the mobile element tour to visit set of nodes in 
the network named gathering points. The upper-bound of the obtained tour must be also bounded 
by pre-determined time-deadline. In addition, they also restrict the depth of the routing trees. 
The problems presented in this paper inherits some characteristic from the well-known Vehicle 
Routing Problem (VRP) [15]. In this problem, given a group of vehicles assigned to an initial 
point, the goal is to determine routes for these vehicles from the initial point to the customers to 
deliver goods while minimizing the travelling time for these vehicles. Also, our problem can be 
recognized as variation of the Deadline Travelling Salesman Problem (Deadline-TSP) [16]. In 
this problem the objective is determine the shortest tour for a salesman to visit a set of cities, 
where each city must be visited before a time deadline. 
The single hope data gathering problem proposed by Ma et al. [18] can be recognized as an 
extended version of the problems presented in this work. In[18] , the authors investigated the 
problem of designing the mobile element tour(s), such that each node is either on the tour or one 
hop away from the tour. The only difference between this problem and the problems presented in 
this is the introduction of the “polling points” by the authors. Ma et al.[18] defines the polling 
point as a point in the network, where the mobile element can communicate with one or more 
sensor node via a single hop transmission. In situations, where the network is spars, where the 
polling points are the sensor nodes, the problems presented in this work become exactly similar to 
the problem presented by Ma et. al.[18]. 
20 
3. PROBLEMS DEFINITIONS 
In the Length-constrained Tours Minimization problem, we are given an undirected complete 
graph    . V is the set that represents the sensor nodes in the network (	 
 , 	 in the 
sink node ) .  is the set of edges that represents the travelling time between the node in the 
network, i.e.
is the time that the mobile element takes to travel between nodes
and 
 
Also we are given  and . M is the set that represents the available mobile elements, and L is 
the time-deadline constraint. 
A solution for this problem consists of multiple tours, where the objective is to minimize the 
number of obtained tours, such that the travelling time for each tour is less than or equal to L, and 
each node is on one of the tours or one-hop away from a node included in one of the tours. 
4. ALGORITHMIC SOLUTION 
To address the Length-constrained Tours Minimization problem, the proposed heuristic works by 
partitioning the network, then in each partition, a mobile element will be assigned. This 
partitioning takes into consideration the distribution of the nodes, to avoid long distance travelling
International Journal of Wireless  Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 
by the mobile element. Finally in each partition, the tour for the assigned mobile element will be 
constructed. 
In this problem, the goal is to design the minimum number of required mobile elements tour to 
cover the network; such that the length of each tour is bounded by L, and each node is either 
included in a tour, or one-hop away from one of the tours. In this case, only one mobile element 
will be required to visit the sink. In order to deliver their data to the sink, each mobile element 
transmit its data to a nearby mobile element that is closer to the sink, than itself. 
In this section, we present the Partition-Based (PB) algorithm. This algorithm aims to partition 
the network area, based on the distribution of the nodes. The objective of the partitioning step is 
to obtain partitions such that distance between the same partition nodes is relatively small. Once 
these partitions are obtained, the algorithm proceed to construct the tour for each mobile element 
partition. In situations where the obtained tour for a mobile element partition violates the time-deadline 
constraint, this partition will be divided into two partitions. The process of partitioning 
stops when the obtained tours satisfy the transit constraint. Figure 2 outlines the steps of the 
partition-based algorithm. 
This algorithms start by identify the set of the nodes that will be used in the process of 
constructing the tours. This identification process is exactly the same process used in the set-based 
algorithm. Once this set is identified, the algorithm proceed to partition the network into 
two partitions. The partitioning step uses the k-mean algorithm (k=2) to partition the network. In 
the first iteration, the partitioning step takes as an input complete graph   , where  is 
the set that represents the selected nodes, and  represents the travelling time between these 
nodes. At each iteration, G’ is altered to represent the tour’s nodes for the partition under 
processing. Once these two partitioned are obtained, the tour construction step will be triggered to 
create a tour in each partition. These tours are obtained using Christofides algorithm. If the tour 
that is obtained for a partition satisfies the time-deadline constraint, this tour will be assign to a 
mobile element. In situations, where the obtained tour a partition doesnot satisfy the time-deadline 
constraint, this partition will be divided into two partitions and the tour construction step 
will be retriggered. 
The k-mean algorithm aims to partition the network graph into  number of clusters such that the 
distance between the nodes inside each clusters is minimized. At first,  number of nodes are 
selected at random as the initial center nodes of the clusters. Then, in each iteration, each node is 
assigned to its nearest cluster (center node). Once all nodes have been thus assigned, the center 
node for each cluster is recalculated, and the process is repeated from the beginning based on the 
identity of the new center nodes. The clustering step stops when the obtained centre nodes still the 
same in two consecutive iterations. 
21 
Input:    , 	 , and  
Output: Ts (set of tours) 
1    !#$%  
2    '(% 
3 For each
4 #   )#*
5 If # +  Then 
6 Add # to Ts 
7 Remove

Weitere ähnliche Inhalte

Was ist angesagt?

Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...tsysglobalsolutions
 
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsProximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsGabriele D'Angelo
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...IDES Editor
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs networkeSAT Journals
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networIAEME Publication
 

Was ist angesagt? (16)

F0963440
F0963440F0963440
F0963440
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsProximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs network
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networ
 
eeca
eecaeeca
eeca
 

Andere mochten auch

Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYijwmn
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qosijwmn
 
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...ijwmn
 
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...ijwmn
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
 
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...ijwmn
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission ijwmn
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 

Andere mochten auch (16)

Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qos
 
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
 
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 

Ähnlich wie Data collection scheme for wireless sensor network with mobile collector

Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsijwmn
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 

Ähnlich wie Data collection scheme for wireless sensor network with mobile collector (20)

Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elements
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Data collection scheme for wireless sensor network with mobile collector

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR Khaled A. Almi’ani, Muder Almi’ani, Ali Al_ghonmein and Khaldun Al- Moghrabi Al-Hussein Bin Talal University, Ma‘an, Jordan ABSTRACT In this paper, we investigate the problem of designing the minimum number of required mobile elements tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. To address this problem, we propose heuristic-based solution. This solution works by directing the mobile element tour towards the highly dense area in the network. The experiment results show that our scheme outperform the benchmark scheme by 10% in most scenarios. 1. INTRODUCTION Typically, in multi-hop data communication scenario, the sensors closed to the sink are the first to run out energy. This is due to fact that these sensors are required to forward all other nodes data. Once these nodes are disconnected, the operational lifetime of the networks ends, since the entire network become unable to communicate with the sink. This raise reducing the energy consumption as a major challenge. To address this problem, many proposals [1][2][3] in the literature, have investigated the use of the Mobile Elements (MEs). A Mobile Element serves as a data carrier and travel the entire network to collect the data of each sensor via single-hop communication. By using Mobile Elements, we can avoid the energy consumption due to multi-hop communication. However, the speed of the mobile element is typically low[4][5], and therefore reducing the data gathering latency is important to ensure the efficiency of such approach. In this paper, we assume that are given more than one mobile element and the objective is to design minimum number of required tours to cover the network. Such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. We term this problem as the Length-constrained Tours Minimization. To address the presented problems we present heuristic-based solution, which uses cluster-based mechanism to build it solutions. The rest of the paper is organized as follows. Section 2 presents the related work in this area. Section 3 provides formal definitions of the problem presented in this work. Section 4 presents the heuristic solution of the presented problem. In Section 5 the evaluation for the proposed heuristics is presented. Finally, Section 6 concludes the paper. 2. RELATED WORK. In the literature, several proposals [6][7] have investigated the use mobile sink(or mobile elements) to increase the lifetime of the network. By varying the data gathering path, the residual DOI : 10.5121/ijwmn.2014.6402 19
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 energy in the nodes becomes more evenly balanced throughout the network, leading to a higher network lifetime. Zhao et al. [8][9] investigated the problem of maximizing the overall network utility. Accordingly, they proposed two algorithmic-based solutions, where the mobile element visit each gathering point for a period of time and gather the data from nearby sensors via multi-hop communications. They considered the cases where the sojourn time is fixed as well as variable. Guney et al. [10]formulated finding the optimal sink trajectory and the data flow routs problem as mixed integer programming formulations. Accordingly, they presented several heuristic to address the presented problem. The problem presented in this work share some similarities with the problem proposed by Xu et al. [14]. In their problem, the objective is to plan the mobile element tour to visit set of nodes in the network named gathering points. The upper-bound of the obtained tour must be also bounded by pre-determined time-deadline. In addition, they also restrict the depth of the routing trees. The problems presented in this paper inherits some characteristic from the well-known Vehicle Routing Problem (VRP) [15]. In this problem, given a group of vehicles assigned to an initial point, the goal is to determine routes for these vehicles from the initial point to the customers to deliver goods while minimizing the travelling time for these vehicles. Also, our problem can be recognized as variation of the Deadline Travelling Salesman Problem (Deadline-TSP) [16]. In this problem the objective is determine the shortest tour for a salesman to visit a set of cities, where each city must be visited before a time deadline. The single hope data gathering problem proposed by Ma et al. [18] can be recognized as an extended version of the problems presented in this work. In[18] , the authors investigated the problem of designing the mobile element tour(s), such that each node is either on the tour or one hop away from the tour. The only difference between this problem and the problems presented in this is the introduction of the “polling points” by the authors. Ma et al.[18] defines the polling point as a point in the network, where the mobile element can communicate with one or more sensor node via a single hop transmission. In situations, where the network is spars, where the polling points are the sensor nodes, the problems presented in this work become exactly similar to the problem presented by Ma et. al.[18]. 20 3. PROBLEMS DEFINITIONS In the Length-constrained Tours Minimization problem, we are given an undirected complete graph . V is the set that represents the sensor nodes in the network ( , in the sink node ) . is the set of edges that represents the travelling time between the node in the network, i.e.
  • 3. is the time that the mobile element takes to travel between nodes
  • 4. and Also we are given and . M is the set that represents the available mobile elements, and L is the time-deadline constraint. A solution for this problem consists of multiple tours, where the objective is to minimize the number of obtained tours, such that the travelling time for each tour is less than or equal to L, and each node is on one of the tours or one-hop away from a node included in one of the tours. 4. ALGORITHMIC SOLUTION To address the Length-constrained Tours Minimization problem, the proposed heuristic works by partitioning the network, then in each partition, a mobile element will be assigned. This partitioning takes into consideration the distribution of the nodes, to avoid long distance travelling
  • 5. International Journal of Wireless Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 by the mobile element. Finally in each partition, the tour for the assigned mobile element will be constructed. In this problem, the goal is to design the minimum number of required mobile elements tour to cover the network; such that the length of each tour is bounded by L, and each node is either included in a tour, or one-hop away from one of the tours. In this case, only one mobile element will be required to visit the sink. In order to deliver their data to the sink, each mobile element transmit its data to a nearby mobile element that is closer to the sink, than itself. In this section, we present the Partition-Based (PB) algorithm. This algorithm aims to partition the network area, based on the distribution of the nodes. The objective of the partitioning step is to obtain partitions such that distance between the same partition nodes is relatively small. Once these partitions are obtained, the algorithm proceed to construct the tour for each mobile element partition. In situations where the obtained tour for a mobile element partition violates the time-deadline constraint, this partition will be divided into two partitions. The process of partitioning stops when the obtained tours satisfy the transit constraint. Figure 2 outlines the steps of the partition-based algorithm. This algorithms start by identify the set of the nodes that will be used in the process of constructing the tours. This identification process is exactly the same process used in the set-based algorithm. Once this set is identified, the algorithm proceed to partition the network into two partitions. The partitioning step uses the k-mean algorithm (k=2) to partition the network. In the first iteration, the partitioning step takes as an input complete graph , where is the set that represents the selected nodes, and represents the travelling time between these nodes. At each iteration, G’ is altered to represent the tour’s nodes for the partition under processing. Once these two partitioned are obtained, the tour construction step will be triggered to create a tour in each partition. These tours are obtained using Christofides algorithm. If the tour that is obtained for a partition satisfies the time-deadline constraint, this tour will be assign to a mobile element. In situations, where the obtained tour a partition doesnot satisfy the time-deadline constraint, this partition will be divided into two partitions and the tour construction step will be retriggered. The k-mean algorithm aims to partition the network graph into number of clusters such that the distance between the nodes inside each clusters is minimized. At first, number of nodes are selected at random as the initial center nodes of the clusters. Then, in each iteration, each node is assigned to its nearest cluster (center node). Once all nodes have been thus assigned, the center node for each cluster is recalculated, and the process is repeated from the beginning based on the identity of the new center nodes. The clustering step stops when the obtained centre nodes still the same in two consecutive iterations. 21 Input: , , and Output: Ts (set of tours) 1 !#$% 2 '(% 3 For each
  • 6. 4 # )#*
  • 7. 5 If # + Then 6 Add # to Ts 7 Remove
  • 8. from S 8 else 9 '(%
  • 10. from S 11 Return Ts the Partition-Based (PB) algorithm
  • 11. International Journal of Wireless Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 22 5. EXPERIMENT RESULTS. To validate the performance of the Partition-Based algorithms, we have conducted an extensive set of experiments. We aim to investigate the performance of the presented heuristic in terms of the number of obtained tours and length of the tours. We consider varying the following parameters in our experiments: (1) varying the number of nodes in the network and (2) varying the value of the tour length constraint. Each of the presented experiment is an average of 10 different random topologies. We consider the following deployment scenarios: • Uniform density deployment: the nodes are uniformly deployed in a square area of ,-- . ,-- (/. • Variable density deployment: the area of the network is divided into 25 square, where the size of each square is 0- . 0-(/. Then, ten of these squares are selected randomly, and the density of the selected squares are set be 5 times the density in the remaining squares. To benchmark the presented algorithms performances, we compare the Partition-Based algorithm against the Data Gathering Algorithm with Multiple M-collector, which also proposed by Ma et al.[18], we will refer to this algorithm as the M-Covering algorithm. In the M-Covering algorithm, given the polling points and the transit constraint, this algorithm starts by constructing a minimum spanning tree that connects all polling points. Then, for each node in the tree we calculate the total calculate the summation of the lengths of the edges in the sub-tree rooted at this node. Then, in each iteration, we extract the deepest, heaviest sub-tree, where the total edges weight of this sub-tree is less than or equal to L/2. Once a sub-tree is extracted, the weight value for each node left in the original tree is re-calculated. This process stops when the tree become empty. The tour for each extracted sub-tree is calculated by using a TSP-solver. The bound is used because the authors employed a 2-approximation algorithm [22] to obtain the tour. In this section, to ensure the fairness of the evaluation, we employed Christofides algorithm as a TSP-solver in the M-Covering algorithm. Also we replace the condition =L/2, by continuously validate that the length of the obtained tour is L. In this section, we compare the Partition-Based (PB) algorithm against the M-Covering algorithm. We are particularly interested in investigating the performance of the algorithms, while varying the number of nodes and the time deadline constraint (). Unless mentioned otherwise the value of . 1(2, where is the distance between the sink and the farthest node in the network. Now, we move to investigate the relationship between the number of nodes and the number of tours obtained by each algorithms. Figures 7 and 8 show the results for the uniform density and the variable density deployment scenarios; respectively. From the figures, we can see that the Partition-Based algorithm always obtains lower number of tours, compared to the M-Covering algorithm. Also, from the figures we can see that in the variable density deployment scenario, the M-Covering algorithm obtains more tours compared to the uniform deployment scenario. The factors behind this behavior are main the process of selecting the tours’ nodes, and the partitioning step. The M-Covering algorithm uses the process employed by the T-Covering algorithm to identify the nodes involved in the mobile elements tours. In addition, the Partition- Based algorithm uses the same process used by the Set-Based algorithm to identify the nodes included in the mobile elements tours. In this direction, we expected that number of nodes selected to be included in the tours to be significantly bigger in the M-Covering algorithm,
  • 12. International Journal of Wireless Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 compared to the Partition-based algorithm. The partitioning process employed by the M-Covering algorithm works by cutting the minimum spanning tree, which connect the identified nodes, from bottom to top into smaller trees that satisfy the time deadline constraint. Such cutting mechanism works without considering the distance between the nodes, which are packed into one tour. This is expected to reduce performance of such a mechanism; especially when the distances between neighboring nodes vary frequently, since in this situation, traversing the minimum spanning tree may result in having a few nodes in each tour, which very far from each other. In the Partition-based algorithm, the obtained tours’ nodes are partitioned using the k-mean algorithm, and this algorithm has the advantage of partitioning the nodes into clusters (groups of nodes) such that the distances among the same cluster nodes are relatively small. This gives the Partition-based algorithm the advantage, since any tour’s nodes are not expected to be far from each other. Now, we study the impact of the time deadline constraint () on the number of tours obtained by each algorithm. Figures 7 and 8 show the results for both deployment scenarios, for 500-nodes networks. Here, the horizontal axis shows the value of normalized as a fraction of . 1(2. We observe that, reducing the value of reduces the gap between the presented algorithms performances. This is expected, since reducing the value of reduces the solution space and therefore reduces the effect of each algorithm main advantages. 45 40 35 30 25 20 15 10 5 Figure 5: Number of nodes against total the average number of tours, for the uniform density deployment 23 scenario. 60 50 40 30 20 10 M-Covering PB Figure 5: Number of nodes against total the average number of tours, for the variable density deployment scenario. 0 600 700 800 900 1000 AVG number of tours Number of nodes M-Covering PB 0 600 700 800 900 1000 AVG number of tours Number of nodes
  • 13. International Journal of Wireless Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 90 80 70 60 50 40 30 20 10 0 M-Covering PB L 0.8L 0.6L 0.4L 0.3L AVG number of tours Number of nodes Figure 5: Normalized value of against the average number of tours, for the uniform density deployment 24 scenario. 90 80 70 60 50 40 30 20 10 M-Covering PB L 0.8L 0.6L 0.4L 0.3L AVG number of tours Number of nodes Figure 5: Normalized value of against the average number of tours, for the variable density deployment scenario. 6. CONCLUSION In this paper, we consider the problem of designing the mobile elements tours such that total size of the routing trees is minimized. In this work, we present an algorithmic solution that creates its solution by partitioning the network, then in each partition; a caching node is selected based on the distribution of the nodes. The algorithms presented here are based only on the static network topology. All nodes are considered to be identical in terms of energy consumption and communication capabilities. In order to further maximize the network lifetime, our algorithms could be extended to take into account the residual energy of individual nodes, during the design of the tours.
  • 14. International Journal of Wireless Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014 25 REFERENCES [1] Y. Gu, D. Bozdag, E. Ekici, F. Ozguner, and C. G. Lee, “Partitioning based mobile element scheduling in wireless sensor networks,” in Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005. 2005 Second Annual IEEE Communications Society Conference on, 2005, pp. 386–395. [2] G. Xing, T. Wang, Z. Xie, and W. Jia, “Rendezvous planning in wireless sensor networks with mobile elements,” IEEE Trans. Mob. Comput., vol. 7, no. 12, pp. 1430–1443, Dec. 2008. [3] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. S. Sukhatme, “Robomote: enabling mobility in sensor networks,” in Proceedings of the 4th international symposium on Information processing in sensor networks (IPSN), 2005, pp. 404 – 409. [4] R. Pon, M. A. Batalin, J. Gordon, A. Kansal, D. Liu, M. Rahimi, L. Shirachi, Y. Yu, M. Hansen, W. J. Kaiser, and others, “Networked infomechanical systems: a mobile embedded networked sensor platform,” in Proceedings of the 4th international symposium on Information processing in sensor networks, 2005, pp. 376 – 381. [5] S. R. Gandham, M. Dawande, R. Prakash, and S. Venkatesan, “Energy efficient schemes for wireless sensor networks with multiple mobile base stations,” in Proceedings of IEEE Globecom, 2003, vol. 1, pp. 377–381. [6] Z. M. Wang, S. Basagni, E. Melachrinoudis, and C. Petrioli, “Exploiting sink mobility for maximizing sensor networks lifetime,” in Proceedings ofthe 38th Annual Hawaii International Conference on System Sciences (HICSS), 2005, vol. 9, pp. 03–06. [7] M. Zhao and Y. Yang, “Optimization-Based Distributed Algorithms for Mobile Data Gathering in Wireless Sensor Networks,” IEEE Trans. Mob. Comput., vol. 11, no. 10, pp. 1464–1477, 2012. [8] M. Zhao and Y. Yang, “efficient data gathering with mobile collectors and space-division multiple access technique in wireless sensor networks,” IEEE Trans. Comput., vol. 60, no. 3, pp. 400–417, 2011. [9] E. Güney, I. K. Altmel, N. Aras, and C. Ersoy, “Efficient integer programming formulations for optimum sink location and routing in wireless sensor networks,” in Proceedings of the 23rd International Symposium on Computer and Information Sciences, 2008, pp. 1–6. [10] W. Liang, J. Luo, and X. Xu, “Prolonging Network Lifetime via a Controlled Mobile Sink in Wireless Sensor Networks,” in Proceedings of Global Telecommunications Conference (GLOBECOM 2010), 2010, pp. 1–6. [11] A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava, “Mobile element scheduling with dynamic deadlines,” IEEE Trans. Mob. Comput., vol. 6, no. 4, pp. 395–410, 2007. [12] Z. Xu, W. Liang, and Y. Xu, “Network Lifetime Maximization in Delay-Tolerant Sensor Networks With a Mobile Sink,” in Proceedings of the 8th IEEE International Conference on Distributed Computing in Sensor Systems, 2012, pp. 9–16. [13] P. Toth and D. Vigo, “The Vehicle Routing Problem,” Soc. Ind. Appl. Math., 2001. [14] N. Bansal, A. Blum, S. Chawla, and A. Meyerson, “Approximation algorithms for deadline-TSP and vehicle routing with time-windows,” in Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (STOC), 2004, pp. 166 – 174. [15] B. Golden, L. Levy, and R. Vohra, “The orienteering problem,” Nav. Res. Logist., vol. 34, no. 3, pp. 307–318, 2006. [16] M. Ma, Y. Yang, and M. Zhao, “Tour Planning for Mobile Data-Gathering Mechanisms in Wireless Sensor Networks,” IEEE Trans. Veh. Technol., 2013. [17] N. Christofides, “Worst-case analysis of a new heuristic for the traveling salesman problem,” 1976. [18] S. S. Skiena, “Traveling Salesman Problem,” Algorithm Des. Man., pp. 319–322, 1997.