SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
254
ENERGY EFFICIENT K-TARGET COVERAGE IN WIRELESS
SENSOR NETWORK
Anurag1
1
(School of Computer Engineering, Kalinga Institute of Industrial Technology/ KIIT
University , KIIT Campus, Patia, Bhubaneshwar, India)
ABSTRACT
Sensing and monitoring a natural phenomenon or target by deploying the sensor
nodes with minimum consumption of energy is a quest for the researchers in designing the
topology of the wireless sensor network. Many proposals have illustrated in the literature,
which are specific in nature and are not optimally feasible, in developing a framework for the
design of appropriate clusters of sensing nodes by considering both their sensing capacity and
energy efficiency. For monitoring any inhospitable environment, sensors are being dropped
randomly from an aircraft and hence they do not fall on precise location. More sensors get
clusters at one location as compare to another. Sometimes the data sensed are being noisy and
the sensors are being vulnerable to failure, hence more number of sensors often required to
cover a particular target. In this paper, we have proposed an energy efficient method to cover
the target with less number of sensor nodes to limit their energy, in which each target has to
be covered by exactly k sensors out of a cluster of n sensor nodes. The collected data passes
to the supervisor node of the respected clusters and supervisor nodes cooperatively send the
data to the sink from there it is available to the user for its further utilization.
Keywords: Dijktra’s algorithm, Energy consumption formula, K-coverage, Relay Node,
Wireless Sensor Network.
1. INTRODUCTION
Wireless Sensor Network is an evolving research field. It has a numerous application
in varieties of fields like civil, military, industrial, agricultural, indoor environmental
monitoring, antique protection [1] and health application[2] to name a few .A WSN usually
consists of large number of sensor nodes for sensing and monitoring the information .This
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 254-259
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
255
sensor nodes after sensing sends the sensed information to the base station for processing and
from there, it is available to the internet for the end user [3].
One of an important task of the wireless sensor network is the coverage. Coverage deals with
how efficiently a specific region of interest is being covered by the sensors. The goal is to
have the region of interest being monitored by at least one sensor node. The coverage
problem is being broadly classified into the following three types.
1. Target coverage: the goal is to monitor the sets of targets in a region
2. Area coverage: the goal is to monitor the specific area[4].
3. Barrier coverage: the goal is to detect all intrusion in the barrier of the sensor network[5].
To monitor the sets of targets in an area, the sensors are being deployed randomly in
an area. The coverage of a target by a single sensor in not beneficial sometimes because the
sensor are more prone to failure due to harsh environmental condition, energy depletion or
malicious attack[6].Hence it required that a target must be covered by k no. of sensors in
which k≥1. In this paper, we will keep some sensors to sleep mode to save energy to some
extent and hence the target is being covered by exactly k-sensors. We then select a supervisor
node .This supervisor node passes the data to the nearest supervisor node successively, and
finally cooperatively, the data is being transferred to the sink.
Various researches have been done till now related to the target area coverage. In [7],
k-target coverage is being proposed in which a supervisor node is being selected such that it
has the responsibility to monitor the entire k-1 target in an area. This supervisor node
processes the data and sends the result cooperatively to the sink. In [8], the Greedy MSC
Heuristic is being proposed in which the critical target and critical sensor is being selected
which has the responsibility to monitor all the target. This Greedy –MSC proves to be NP-
Complete and has the complexity O(iM2
N), where there are M targets and N sensors. In
[4],an algorithm for the non-disjoint set cover is being proposed in which only those target is
being covered by the sensor which is more closer to the sensor to save the energy to some
considerable extent. In [9],TPISC algorithm is being proposed which works in three phase: In
the first phase, set cover is being constructed which has the responsibility to monitor all the
target. Connectivity to the set –cover is being maintained in the second phase and in the final
stage ,we remove the redundant sensor. In [10],a greedy based algorithm has been proposed
in which a critical target has been selected from the target sets and the unique route from the
sensor set to the sink is being determined by using the Shortest path Tree. This technique
proves to be NP-Complete. In [11], grid based strategies have been proposed in which each
point in a grid must be filled with probability at least T and which the no. of sensors at least
k. In [12],a heuristic algorithm has been proposed which deals with multiple target coverage
problem. There are large number of overlapped target in a region and their corresponding
overlapped sensors. For each overlapped sensor, we have to select the Responsible sensor.
This responsible sensor has the responsibility to transfer the data of overlapped target to the
sink node. RSSA algorithm will then executed in which the number of target observed by
each Overlapped sensor except Responsible sensor has been reduced by one. The complexity
of RSSA algorithm has been given by O(MN) while the complexity of heuristic algorithm has
been given by O(jM2
N) were M and N are targets and sensors respectively.
The rest of the paper is being organized as follows: Section 2 contains our problem
formulation. We describe our proposed work in Section 3 and pseudo code in section 4.
Finally, in section 5, we conclude our paper.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
256
2. PROBLEM FORMULATION
We considered the following scenario: large no. of sensors is being deployed in an
area with close proximity of the targets. The sensors are being densely deployed around the
targets. Each sensor has limited battery life and hence is not being rechargeable in most of the
cases. So, energy conservation is being a critical issue in these circumstances. We have the
assumption that the number of sensors deployed in the field is much greater that the optimal
number to perform the sensing tasks. The sensors have uniform sensing range. Each sensor is
aware of the location using localization technique.
A sensor which does the tasks of sensing and monitoring is called source sensor and
sensor which does not perform the sensing tasks and does the tasks of data forwarding are
called relay sensors. The sensor which does sensing and relaying tasks are the active sensors.
Rest of the sensors will be in sleep mode in order to conserve energy.
We assume that all the source sensors have the same data generation rate for a target
i.e. all the source sensors uses the same sampling frequency, quantization, modulation and
coding scheme for each target .Therefore a fixed amount of bit, denoted by β called coverage
rate, is generated by each source sensor for a target in a second.
2.1. Sensing Energy consumption model
The energy consumed in transmitting a bit of data from node i to node j is give by:
Where and b are constants and is the Euclidian distance between i and j.α is the path
loss factor , be the energy consumed in receiving a bit of data and be the energy
consumed in sensing a target for a bit of data. Let be the number of targets a sensor s
can monitors them for t seconds. If Coverage rate is β, the energy consumed in by the source
sensor for t second is the sum of sensing and transmission energy. So, the energy consumed
by the source sensor i which monitors target for t seconds to and transmits the
monitored information to the node j would be:
E(i,t)=β. (t) + i ϵ Ss and i Sr
A relay nodes receives the data from the sensors and transmits them to the other supervisor
nodes .For a given supervising nodes i, let denotes the number of target in which
supervising node i relay the data for seconds. The energy consumed by the sensing nodes is
the sum of sensing energy and transmitting energy. So, the energy consumed in the relay
node i which transfers the traffic to the other relay node j for t seconds would be
E(i,t)= i Ss and i ϵ Sr
A relay node receives data from one relay sensor and transmits them to the other relay sensor.
For a given relay node i, (t) denotes the number of targets which node i relay the data for t
second.
Our proposed model is based upon this method.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
257
3. PROPOSED WORK
There is large number of cluster-set for each target, in which each target is being
covered by set of power-constrained sensors. Our aim is to implement an energy–efficient
mechanism for k target coverage in which each targets must be covered by the set of sensors
for longer duration. The network lifetime is being defined as the time in which there exists
any one target which can’t be monitored by any sensor.
Our objective function is to maximize the lifetime of each cluster in the network.
Fig: A k-Target coverage scenario in which k=4
We have use Dijktra’s algorithm to calculate the all pair-shortest path between each
relay node with the complexity of O(|E|).
.It is mainly applicable for the dense network and is
the faster than any other algorithm with the shortest time complexity. The edge between them
represents the energy consumed in transferring the data from one relay node to the other.
A directed graph between the relay sensors pair is being formed in which each edge
represents the energy consumed in transmitting the data.
Our proposed method work as follows: Initially, all the sensors are in sleep mode .We
starts activating all the sensors and the sensors starts covering the target. Large number of
clusters formation takes place for each target. A target is being covered by more than k-
sensors .To save the energy of the sensor; we have to put some of the sensors of lower energy
to the sleep mode in order to conserve energy such that each target is being covered by
exactly k-sensors. The source sensors are already sensing and sending the sensed data by
each source sensor nodes consumes lots of energy, so a sensor called relay sensor is being
selected, this has the responsibility to send the data to the nearest relay sensor of another
cluster. Out of this k -active sensor nodes, we select the sensor with the highest energy as
relay node to save the power to some considerable extent. The Dijktra’s algorithm is being
executed between each relay nodes and the shortest path between each relay nodes gets
obtained. This route has the responsibility to send the data to the sink.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
258
When the any of the sensor in the cluster dies, we check the nearest sensor which is in sleep
mode and have higher energy. That sensor will be added to that cluster. Finally, we record the
network-lifetime, target covered and the cluster set C1, C2,, …. , CN.
4. PSEUDO-CODE
1.% Initialization%
2.set l=0;
3.set Ss=S,j=0
4.set l=1;
5.while each target is being covered by at least k-sensor in Ss do
6. % make a cluster set Cj
7.Set j=j+1;Cj=φ and St=T
8. for each tϵSt
9. b(t)≥k
10. for each Si ϵ Cj
11.we keep only the nearest k sensor of higher value of E(i,t) to be in active mode until
b(t)=k;
12.dijktra’s algorithm is executed between each of the k sensors
13.for each cluster Ci, we select the relay node RN which has higher energy
14.compute dijktra’s algorithm between each RN ϵC and find the shortest route between each
relay sensor.
15.for every si ϵCj ,
16. lifetime_si=lifetime_si-w
17. if lifetime_si≤0
18. Cj=Cj-{si}
19. we add the nearest sensor of sleep mode which is of higher value of Energy
20. Cj=Cj U si
21. end if
22 end for
23 end for
24 end for
25 end for
26. end while
27. Return cluster set C1,C2,…,CN and the target covered
Here, b(t) denotes no. of sensors covering a single target . RN is the set of relay
nodes.
5. CONCLUSION
In this paper, we have addressed the k-target coverage problem. It increases the
lifetime of the sensor network to some extent by selecting a supervisor node and transmitting
the sensed data to the nearest supervising node to save energy to considerable extent .We will
implement our proposed work by MATLAB in the next section. We may also apply genetic
algorithm to for its further modification. However, more work has to be done in this field so
that global solution can be achieved.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
259
REFERENCES
[1] Yunyue Lin and Qishi Wu,” Approximate Algorithms for Sensor Deployment with k-
coverage in Constrained 3D Space”, in 16th International Conference on Parallel and
Distributed Systems”, 2010
[2] Nahar Sultana, Ki-moon Choi and Eui-nam Huh,” Mobility Support Secure Coverage
Protocol for Monitoring Applications using Wireless Sensor Networks”,in International
Conference on Computational Sciences and Its Applications ICCSA 2008,2008
[3] Purnima Khuntia and Prasant Kumar Pattnaik,” Some Target Coverage Issues of
Wireless Sensor Network”, International Journal of Instrumentation, Control & Automation
(IJICA), Volume 1, Issue 1, 2011
[4] PURNIMA KHUNTIA, PRASANT KUMAR PATTNAIK,” TARGET COVERAGE
MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORK”, Journal of
Theoretical and Applied Information Technology” 15th January 2012. Vol. 35 No.1
[5] Ehsan Saradar Torshizi, Saleh Yousefi and Jamshid Bagherzadeh,” Life Time
Maximization for Connected Target Coverage in Wireless Sensor Networks with Sink
Mobility, in 6'th International Symposium on Telecommunications, 2012
[6] Gao Jun Fan, Feng Liang and ShiYao Jin,” An Efficient Approach for Point Coverage
Problem of Sensor Network”,in International Symposium on Electronic Commerce and
Security, 2008
[7] S.Omid Melli,” K-Target Coverage & Connectivity in Wireless Sensor Network
Considering the angle coverage”,IEEE,2011.
[8] Mihaela Cardei ,My T. Thai ,Yingshu Li and Weili Wu,” Energy-Efficient Target
Coverage in Wireless Sensor Networks”, IEEE INFOCOM 2005
[9]Mohammad ali Jamali, Navid Bakhshivand, Mohammad Easmaeilpour and Davood
Salami,” AN ENERGY –EFFICIENT ALGORITHM FOR CONNECTED TARGET
COVERAGE PROBLEM IN WIRELESS SENSOR NETWORKS”,IEEE,2010.
[10] Yong-hwan Kim,Youn-Hee Han, Chang-min Mun,Chan Yeol Park and Doo-Soon, Park
,”Lifetime Maximization Considering Connectivity and Overlapped Targets in Wireless
Sensor Networks”,IEEE,2010
[11] Wenzheng Zhang and Chuanlin Zhang,” Sensor Placement for Grid Coverage with
Probability Mode” ,IEEE,2010
[12] Sung-Yeop Pyun and Dong-Ho Cho,” Power-Saving Scheduling for Multiple-Target
Coverage in Wireless Sensor Networks”, IEEE COMMUNICATIONS LETTERS, VOL. 13,
NO. 2, FEBRUARY 2009
[13] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network
and its Implications”, International Journal of Electrical Engineering & Technology (IJEET),
Volume 4, Issue 2, 2013, pp. 105 - 111, ISSN Print : 0976-6545, ISSN Online: 0976-6553.
[14] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks:
Limitation, Layerwise Security Threats, Intruder Detection”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2,
2012, pp. 22 - 31, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[15] Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao,
“Implementation of Authentication and Confidentiality in Wireless Sensor Network”,
International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2,
2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkIJARIIE JOURNAL
 
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...IDES Editor
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...IJECEIAES
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...ijasuc
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor NetworksIJMER
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Editor IJMTER
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...IAEME Publication
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...ijdmtaiir
 

What's hot (16)

Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor Network
 
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NE...
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
 
F33022028
F33022028F33022028
F33022028
 

Similar to Energy efficient k target coverage in wireless sensor net-2

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxpraveena06
 
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...CrimsonpublishersTTEH
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 

Similar to Energy efficient k target coverage in wireless sensor net-2 (20)

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
 
C011131925
C011131925C011131925
C011131925
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docx
 
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
50120140506010
5012014050601050120140506010
50120140506010
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Energy efficient k target coverage in wireless sensor net-2

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 254 ENERGY EFFICIENT K-TARGET COVERAGE IN WIRELESS SENSOR NETWORK Anurag1 1 (School of Computer Engineering, Kalinga Institute of Industrial Technology/ KIIT University , KIIT Campus, Patia, Bhubaneshwar, India) ABSTRACT Sensing and monitoring a natural phenomenon or target by deploying the sensor nodes with minimum consumption of energy is a quest for the researchers in designing the topology of the wireless sensor network. Many proposals have illustrated in the literature, which are specific in nature and are not optimally feasible, in developing a framework for the design of appropriate clusters of sensing nodes by considering both their sensing capacity and energy efficiency. For monitoring any inhospitable environment, sensors are being dropped randomly from an aircraft and hence they do not fall on precise location. More sensors get clusters at one location as compare to another. Sometimes the data sensed are being noisy and the sensors are being vulnerable to failure, hence more number of sensors often required to cover a particular target. In this paper, we have proposed an energy efficient method to cover the target with less number of sensor nodes to limit their energy, in which each target has to be covered by exactly k sensors out of a cluster of n sensor nodes. The collected data passes to the supervisor node of the respected clusters and supervisor nodes cooperatively send the data to the sink from there it is available to the user for its further utilization. Keywords: Dijktra’s algorithm, Energy consumption formula, K-coverage, Relay Node, Wireless Sensor Network. 1. INTRODUCTION Wireless Sensor Network is an evolving research field. It has a numerous application in varieties of fields like civil, military, industrial, agricultural, indoor environmental monitoring, antique protection [1] and health application[2] to name a few .A WSN usually consists of large number of sensor nodes for sensing and monitoring the information .This INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 254-259 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 255 sensor nodes after sensing sends the sensed information to the base station for processing and from there, it is available to the internet for the end user [3]. One of an important task of the wireless sensor network is the coverage. Coverage deals with how efficiently a specific region of interest is being covered by the sensors. The goal is to have the region of interest being monitored by at least one sensor node. The coverage problem is being broadly classified into the following three types. 1. Target coverage: the goal is to monitor the sets of targets in a region 2. Area coverage: the goal is to monitor the specific area[4]. 3. Barrier coverage: the goal is to detect all intrusion in the barrier of the sensor network[5]. To monitor the sets of targets in an area, the sensors are being deployed randomly in an area. The coverage of a target by a single sensor in not beneficial sometimes because the sensor are more prone to failure due to harsh environmental condition, energy depletion or malicious attack[6].Hence it required that a target must be covered by k no. of sensors in which k≥1. In this paper, we will keep some sensors to sleep mode to save energy to some extent and hence the target is being covered by exactly k-sensors. We then select a supervisor node .This supervisor node passes the data to the nearest supervisor node successively, and finally cooperatively, the data is being transferred to the sink. Various researches have been done till now related to the target area coverage. In [7], k-target coverage is being proposed in which a supervisor node is being selected such that it has the responsibility to monitor the entire k-1 target in an area. This supervisor node processes the data and sends the result cooperatively to the sink. In [8], the Greedy MSC Heuristic is being proposed in which the critical target and critical sensor is being selected which has the responsibility to monitor all the target. This Greedy –MSC proves to be NP- Complete and has the complexity O(iM2 N), where there are M targets and N sensors. In [4],an algorithm for the non-disjoint set cover is being proposed in which only those target is being covered by the sensor which is more closer to the sensor to save the energy to some considerable extent. In [9],TPISC algorithm is being proposed which works in three phase: In the first phase, set cover is being constructed which has the responsibility to monitor all the target. Connectivity to the set –cover is being maintained in the second phase and in the final stage ,we remove the redundant sensor. In [10],a greedy based algorithm has been proposed in which a critical target has been selected from the target sets and the unique route from the sensor set to the sink is being determined by using the Shortest path Tree. This technique proves to be NP-Complete. In [11], grid based strategies have been proposed in which each point in a grid must be filled with probability at least T and which the no. of sensors at least k. In [12],a heuristic algorithm has been proposed which deals with multiple target coverage problem. There are large number of overlapped target in a region and their corresponding overlapped sensors. For each overlapped sensor, we have to select the Responsible sensor. This responsible sensor has the responsibility to transfer the data of overlapped target to the sink node. RSSA algorithm will then executed in which the number of target observed by each Overlapped sensor except Responsible sensor has been reduced by one. The complexity of RSSA algorithm has been given by O(MN) while the complexity of heuristic algorithm has been given by O(jM2 N) were M and N are targets and sensors respectively. The rest of the paper is being organized as follows: Section 2 contains our problem formulation. We describe our proposed work in Section 3 and pseudo code in section 4. Finally, in section 5, we conclude our paper.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 256 2. PROBLEM FORMULATION We considered the following scenario: large no. of sensors is being deployed in an area with close proximity of the targets. The sensors are being densely deployed around the targets. Each sensor has limited battery life and hence is not being rechargeable in most of the cases. So, energy conservation is being a critical issue in these circumstances. We have the assumption that the number of sensors deployed in the field is much greater that the optimal number to perform the sensing tasks. The sensors have uniform sensing range. Each sensor is aware of the location using localization technique. A sensor which does the tasks of sensing and monitoring is called source sensor and sensor which does not perform the sensing tasks and does the tasks of data forwarding are called relay sensors. The sensor which does sensing and relaying tasks are the active sensors. Rest of the sensors will be in sleep mode in order to conserve energy. We assume that all the source sensors have the same data generation rate for a target i.e. all the source sensors uses the same sampling frequency, quantization, modulation and coding scheme for each target .Therefore a fixed amount of bit, denoted by β called coverage rate, is generated by each source sensor for a target in a second. 2.1. Sensing Energy consumption model The energy consumed in transmitting a bit of data from node i to node j is give by: Where and b are constants and is the Euclidian distance between i and j.α is the path loss factor , be the energy consumed in receiving a bit of data and be the energy consumed in sensing a target for a bit of data. Let be the number of targets a sensor s can monitors them for t seconds. If Coverage rate is β, the energy consumed in by the source sensor for t second is the sum of sensing and transmission energy. So, the energy consumed by the source sensor i which monitors target for t seconds to and transmits the monitored information to the node j would be: E(i,t)=β. (t) + i ϵ Ss and i Sr A relay nodes receives the data from the sensors and transmits them to the other supervisor nodes .For a given supervising nodes i, let denotes the number of target in which supervising node i relay the data for seconds. The energy consumed by the sensing nodes is the sum of sensing energy and transmitting energy. So, the energy consumed in the relay node i which transfers the traffic to the other relay node j for t seconds would be E(i,t)= i Ss and i ϵ Sr A relay node receives data from one relay sensor and transmits them to the other relay sensor. For a given relay node i, (t) denotes the number of targets which node i relay the data for t second. Our proposed model is based upon this method.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 257 3. PROPOSED WORK There is large number of cluster-set for each target, in which each target is being covered by set of power-constrained sensors. Our aim is to implement an energy–efficient mechanism for k target coverage in which each targets must be covered by the set of sensors for longer duration. The network lifetime is being defined as the time in which there exists any one target which can’t be monitored by any sensor. Our objective function is to maximize the lifetime of each cluster in the network. Fig: A k-Target coverage scenario in which k=4 We have use Dijktra’s algorithm to calculate the all pair-shortest path between each relay node with the complexity of O(|E|). .It is mainly applicable for the dense network and is the faster than any other algorithm with the shortest time complexity. The edge between them represents the energy consumed in transferring the data from one relay node to the other. A directed graph between the relay sensors pair is being formed in which each edge represents the energy consumed in transmitting the data. Our proposed method work as follows: Initially, all the sensors are in sleep mode .We starts activating all the sensors and the sensors starts covering the target. Large number of clusters formation takes place for each target. A target is being covered by more than k- sensors .To save the energy of the sensor; we have to put some of the sensors of lower energy to the sleep mode in order to conserve energy such that each target is being covered by exactly k-sensors. The source sensors are already sensing and sending the sensed data by each source sensor nodes consumes lots of energy, so a sensor called relay sensor is being selected, this has the responsibility to send the data to the nearest relay sensor of another cluster. Out of this k -active sensor nodes, we select the sensor with the highest energy as relay node to save the power to some considerable extent. The Dijktra’s algorithm is being executed between each relay nodes and the shortest path between each relay nodes gets obtained. This route has the responsibility to send the data to the sink.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 258 When the any of the sensor in the cluster dies, we check the nearest sensor which is in sleep mode and have higher energy. That sensor will be added to that cluster. Finally, we record the network-lifetime, target covered and the cluster set C1, C2,, …. , CN. 4. PSEUDO-CODE 1.% Initialization% 2.set l=0; 3.set Ss=S,j=0 4.set l=1; 5.while each target is being covered by at least k-sensor in Ss do 6. % make a cluster set Cj 7.Set j=j+1;Cj=φ and St=T 8. for each tϵSt 9. b(t)≥k 10. for each Si ϵ Cj 11.we keep only the nearest k sensor of higher value of E(i,t) to be in active mode until b(t)=k; 12.dijktra’s algorithm is executed between each of the k sensors 13.for each cluster Ci, we select the relay node RN which has higher energy 14.compute dijktra’s algorithm between each RN ϵC and find the shortest route between each relay sensor. 15.for every si ϵCj , 16. lifetime_si=lifetime_si-w 17. if lifetime_si≤0 18. Cj=Cj-{si} 19. we add the nearest sensor of sleep mode which is of higher value of Energy 20. Cj=Cj U si 21. end if 22 end for 23 end for 24 end for 25 end for 26. end while 27. Return cluster set C1,C2,…,CN and the target covered Here, b(t) denotes no. of sensors covering a single target . RN is the set of relay nodes. 5. CONCLUSION In this paper, we have addressed the k-target coverage problem. It increases the lifetime of the sensor network to some extent by selecting a supervisor node and transmitting the sensed data to the nearest supervising node to save energy to considerable extent .We will implement our proposed work by MATLAB in the next section. We may also apply genetic algorithm to for its further modification. However, more work has to be done in this field so that global solution can be achieved.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 259 REFERENCES [1] Yunyue Lin and Qishi Wu,” Approximate Algorithms for Sensor Deployment with k- coverage in Constrained 3D Space”, in 16th International Conference on Parallel and Distributed Systems”, 2010 [2] Nahar Sultana, Ki-moon Choi and Eui-nam Huh,” Mobility Support Secure Coverage Protocol for Monitoring Applications using Wireless Sensor Networks”,in International Conference on Computational Sciences and Its Applications ICCSA 2008,2008 [3] Purnima Khuntia and Prasant Kumar Pattnaik,” Some Target Coverage Issues of Wireless Sensor Network”, International Journal of Instrumentation, Control & Automation (IJICA), Volume 1, Issue 1, 2011 [4] PURNIMA KHUNTIA, PRASANT KUMAR PATTNAIK,” TARGET COVERAGE MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORK”, Journal of Theoretical and Applied Information Technology” 15th January 2012. Vol. 35 No.1 [5] Ehsan Saradar Torshizi, Saleh Yousefi and Jamshid Bagherzadeh,” Life Time Maximization for Connected Target Coverage in Wireless Sensor Networks with Sink Mobility, in 6'th International Symposium on Telecommunications, 2012 [6] Gao Jun Fan, Feng Liang and ShiYao Jin,” An Efficient Approach for Point Coverage Problem of Sensor Network”,in International Symposium on Electronic Commerce and Security, 2008 [7] S.Omid Melli,” K-Target Coverage & Connectivity in Wireless Sensor Network Considering the angle coverage”,IEEE,2011. [8] Mihaela Cardei ,My T. Thai ,Yingshu Li and Weili Wu,” Energy-Efficient Target Coverage in Wireless Sensor Networks”, IEEE INFOCOM 2005 [9]Mohammad ali Jamali, Navid Bakhshivand, Mohammad Easmaeilpour and Davood Salami,” AN ENERGY –EFFICIENT ALGORITHM FOR CONNECTED TARGET COVERAGE PROBLEM IN WIRELESS SENSOR NETWORKS”,IEEE,2010. [10] Yong-hwan Kim,Youn-Hee Han, Chang-min Mun,Chan Yeol Park and Doo-Soon, Park ,”Lifetime Maximization Considering Connectivity and Overlapped Targets in Wireless Sensor Networks”,IEEE,2010 [11] Wenzheng Zhang and Chuanlin Zhang,” Sensor Placement for Grid Coverage with Probability Mode” ,IEEE,2010 [12] Sung-Yeop Pyun and Dong-Ho Cho,” Power-Saving Scheduling for Multiple-Target Coverage in Wireless Sensor Networks”, IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 2, FEBRUARY 2009 [13] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network and its Implications”, International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 2, 2013, pp. 105 - 111, ISSN Print : 0976-6545, ISSN Online: 0976-6553. [14] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 22 - 31, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [15] Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.