SlideShare a Scribd company logo
1 of 6
Download to read offline
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
RESEARCH ARTICLE

OPEN ACCESS

Swarm Intelligence Based Ant Colony Optimization (ACO)
Approach for Maximizing the Lifetime of Heterogeneous Wireless
Sensor Networks
LingaRaj.K1, Nalavadi Srikantha 2, Khaja Moinuddin 3, Lokesh K.S 4
1

Dept. Of CSE, Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, Karnataka, India
Dept. Of ECE, Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, Karnataka, India

2,3,4

Abstract
This paper attempts to undertake the study of maximizing the lifetime of Heterogeneous wireless sensor
networks (WSNs). In wireless sensor networks, sensor nodes are typically power-constrained with limited
lifetime, and thus it is necessary to know how long the network sustains its networking operations.
Heterogeneous WSNs consists of different sensor devices with different capabilities. We can enhance
the quality of monitoring in wireless sensor networks by increasing the coverage area. One of major issue in
WSNs is finding maximum number of connected coverage. This paper proposed a Swarm Intelligence, Ant
Colony Optimization (ACO) based approach. Ant colony optimization algorithm provides a natural and
intrinsic way of exploration of search space of coverage area. Ants communicate with their nestmates using chemical scents known as pheromones, Based on Pheromone trail between sensor devices the
shortest path is found. The methodology is based on finding the maximum number of connected covers that
satisfy both sensing coverage and network connectivity. By finding the coverage area and sensing range,
the network lifetime maximized and reduces the energy consumption
Keywords— Wireless Sensor Networks (WSN’S), Ant Colony Optimization, Connective Coverage, Network
Lifetime.

I.

INTRODUCTION

The wireless sensor networks (WSNs)
technology have been widely applied in military[1],
industry, agriculture[2] and many other areas .In the
WSNs, a lot of nodes operate on limited batteries,
making energy resources the major bottleneck.
Therefore, an economical and frugal management
for improving the maximizing lifetime of wireless
sensor is important. Wireless sensor networks
(WSNs) consist of sensor nodes equipped with their
own battery having limited
lifetime,
which
makes the operations of network available only
within a limited amount of time. It is crucial to
examine and estimate how long the network is
properly functioning, or network lifetime, after
which the deployment of additional sensor nodes
is inevitable so as to ensure the network
connectivity and maintain the networking operations
of interest, but requires lots of cost and effort.
Hence, there has been much work on analyzing the
network lifetime under a certain consideration and
devising an algorithm or network protocol to
prolong the network lifetime.
The existing methods for prolonging the lifetime of
WSNs focus
on the issues
of device
placement[5],
data processing ,routing[6][7],
topology management[11], and device
control
Device placement is a fundamental factor in
www.ijera.com

determining the coverage, connectivity, cost
and lifetime of a Wireless Sensor Network (WSN).
In a WSN where devices are densely deployed, a
subset of the devices can address the coverage and
connectivity issues. The rest of the devices can be
switched to a sleep state for conserving energy.
Using device placement and routing techniques,
finding coverage is difficult, because device in the
sense sensors, when using heterogeneous WSNs
connectivity problem occurs. In routing as router
table increase finding coverage between the
sensors are difficult. Therefore, the lifetime of
a WSN can be prolonged by planning the active
intervals of devices. At every point during the
network lifetime, the active devices must form a
connected cover to fulfill sensing coverage and
network connectivity. But this also led to failure
result .Later introduced hub-spoke topology [11].
This also teds some problem.
A number of methods have been proposed for
finding one connected cover from a WSN. The
connected cover obtained may be optimal under
certain criteria, such as minimum size or minimum
energy consumption. Nevertheless, generating a
sequence of optimal connected covers by repeating
the above methods may not lead to lifetime
maximization. Maximizing the number of connected
167 | P a g e
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
covers is a more direct way to maximize the network
lifetime.
The problem of finding the maximum
number of connected covers is difficult because
each connected cover must fulfil sensing coverage
and network connectivity
simultaneously. Its
sub
problem
of maximizing the number of
subsets that fulfil sensing coverage is already in the
non-deterministic polynomial time (NP) complete
complexity
class. Many methods focus on
solving the above sub problem but ignore the
issue of connectivity .These methods are able to
maximize the lifetime of WSNs while maintaining
both sensing coverage and network connectivity
with a premise that the devices are identical and
have a transmission range that is at least twice the
sensing range. However, they cannot ensure the
network
connectivity
when
the
required
premise is not satisfied.
In existing system, it very difficult to use different
sensors
with
different
functionality
and
capabilities .All sensors sent monitored information
to single sink as shown in fig
1, Due to this there May overlapping, collision may
occur in networks. It’s also difficult to find the
maximize number of connected coverage and
sensing range. It uses the greedy algorithm [8],
which can be used for only in Homogenous
Wireless Sensor Network. Finding optimal path
between sensors and sink is difficult.

Fig 1: System Architecture of current
WSNs
The proposed ACO-based approach for maximizing
the number of connected covers (ACO-MNCC) first
transforms the search space of the problem
into a construction graph. Each vertex in the graph
denotes an assignment of a device in a subset.
Heuristic information is associated to each
assignment for measuring its utility in reducing
constraint violations. Pheromone is deposited
between every two devices to record the historical
desirability of assigning them to the same subset. In
each iteration, the number of subsets is adaptively
determined as one plus the number of connected
covers in the best-so-far solution. The ants thus
www.ijera.com

concentrate on finding one more connected cover
and avoid constructing subsets excessively. A local
search procedure is designed to refine the solutions
by reassigning redundant devices. The ACOMNCC is applied to 33 heterogeneous
WSNs with different characteristics. Experimental
results validate the effectiveness and efficiency of
the proposed approach.
II.

PROPOSED SYSTEM

This paper proposes first ACO-MNCC
based approach for maximizing the lifetime of
heterogeneous WSNs by finding the maximum
number of connected covers. Heterogeneous WSNs
means sensor with different capability, how it
works and how it maximizes the network
lifetime.
Ant Colony Optimization (ACO) technique is an
optimization technique to solve optimization
problem [38] [40]. It has been developed for
combinatorial optimization problems.
ACO are
multi-agent system in which the behavior of
each single agent, called ant, is inspired by the
behavior of real ants. In ACO, ants are
stochastic constructive procedures that build
solutions while walking on
a
construction
graph.
Such constructive
search behavior
makes ACO suitable for solving combinatorial
optimization problems [40]. Besides, ACO utilizes
search experiences (represented by pheromone) and
domain knowledge (represented by heuristic
information) to accelerate the search process. ACO
algorithms have been successfully applied to a
number of industrial and scientific problems
[11]-[17].
In the fields of WSNs, ACO-based
routing Algorithms have been used for
improving the power efficiency in unicasting,
broadcasting, and data gathering.
In This paper
I also presents
a new
communication protocol for WSN called energy
efficient ant-based routing algorithm (EEABR),
which is based on the Ant Colony Optimization
(ACO) met heuristic .EEABR uses a colony of
artificial ants that travel through the WSN looking
for paths between the sensor nodes and a
destination node, that are at the same time short in
length and energy-efficient, contributing in that way
to maximize the lifetime of the WSN. Each ant
chooses the next network node to go to with a
probability that is a function of the node energy and
of the amount of pheromone trail present on the
connections between the nodes. When an ant
reaches the destination
node, it travels
backwards trough the path constructed and
updates the pheromone trail by an amount that is
based on the energy quality and the number of nodes
of the path.

168 | P a g e
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
III.

PRELIMINARY AND RELATED
WORK

In this section, the problems of finding the
maximum number o f disjoint connected
c o v e r a g e b e t we e n sensors are defined.
3.1 Problem Definition
Let as consider Randomly deploy a set of
sensors (SE1,SE2,SE3…)
and a set of sinks
(SI1,SI2,SI3…) in an L × W area (| · | denotes
the size of a set). Suppose, the
Sensors have a sensing range si and a transmission
range rt. The sinks have a transmission range Rt
larger than rt.

types area coverage sensors cover an area, point
coverage. The sinks relay the monitoring results to
the
destination
(e.g.,
data
processing
centre).Therefore, a connected cover in the
heterogeneous WSNs must satisfy the following
three constraints: 1) The sensors form complete
coverage to the target, 2) all the monitoring
results obtained by the sensors are transmitted to
the sinks, and 3) the sinks compose
a
connected wireless network.
Once all the
information transmitted to sink
using
the
algorithm.
The
sink
finally
sent
all
information to destination by doing this the life
time of WSNs increases.

Fig 2: Illustration of complete coverage
The collection constraint, which requires the sinks
to collect all the monitoring results obtained by
the sensors in the same subset shown in fig 3.b.

Fig 4: Heterogeneous Wireless sensor Networks –
Proposed System Architecture

IV.

Fig 3: Two major types of coverage: area and
target coverage (the big square on left denotes the
covered area, the soldiers on the right denotes the
covered targets)
The routing constraint, which requires the sinks
to form a connected network for transmitting the
collected monitoring results to the destination.
3.2 Proposed System Architecture
The sensors monitor the target and
transmit the monitoring results to the sinks
which are nearer to it, based on ACO-MNCC.
Here I used more sinks to increase the sensor
lifetime, as the sensor chooses the shortest path
nearest to it as shown in Fig 4.The time of sending
monitoring results can be reduced.In existing they
used single sink, which lead to congestion between
sensors, due to this the network lifetime
decrease. The problems can be classified in the 3
www.ijera.com

MODULE DESCRIPTION

4.1 Ant Colony Optimization algorithm concepts
Many of the existing solutions to this
problem come from the field of Evolutionary
Computation .After analyzing them; we noticed
that these interesting developments are quite
similar to ACO algorithms [11], [12]. The relation
between ACO algorithms and evolutionary
algorithms provides a structural way of handling
constrained problems. They have in common the
use of a probabilistic mechanism for re-combination
of individuals. This leads to algorithms where the
population statistics are kept in a probability
vector.
These probabilities
are used to
generate new solutions in iterations. The new
solutions are then used to adapt the probability
vector.
Real ants foraging for food lay down
quantities of pheromone (chemical cues) marking
the path that they follow [14], [15]. An isolated
ant moves
essentially guided by a heuristic
function and an ant encountering a previously
laid pheromone will detect and decide to
follow it with high probability thus taking more
informed actions based on the experience of
previous ants (and thereby reinforce it with a
169 | P a g e
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
further quantity of pheromone). The repetition of
the above mechanism represents the auto-catalytic
behavior of real ant colony where the more the ants
follow a trail, the more attractive that trail becomes.
Ant colony optimization is a class of
optimization algorithms modeled on the actions of
an ant colony. Artificial 'ants' - simulation agents locate optimal solutions by moving through a
parameter space representing all possible solutions.
Real ants lay down pheromones directing each
other
to
resources
while exploring their
environment. The simulated 'ants' similarly record
their positions and the quality of their solutions, so
that in later simulation iterations more ants locate
better solutions as shown in fig 5. The technique
can be used for both Static and Dynamic
Combinatorial optimization problems. Convergence
is guaranteed, although the speed is unknown

2) Criterion for the Collection Constrain.
3) Criterion for the Routing Constraint
It can be observed that the objective function has
two components. The first component summarizes
the constraint violations of all the subsets. The
second component awards the objective value
based on the number of connected covers. Since
the goal of ACO- MNCC is to find a solution that
maximizes the number of connected covers.
5.2 Working conditions of Ants between sensors
and sink:
In ACO, an ant’s search behavior is mainly
influenced by three components: the construction
graph, the solution construction rule, and the
pheromone management. The following sections
describe the three components:
a.

Construction Graph with pictorial
representation:
Construction graph consist of different sensors
and sinks. Based on algorithm of ant colony
optimization the sensor finds shortest path
between sinks and destination.

Fig 5: Ant pheromone evaporations in path
4.2 Sensor components
The considered heterogeneous WSNs comprise two
types
of devices: sensors and sinks. Heterogeneous
WSNs place the sensors and sinks in area
coverage and checks the coverage to each sensor
which monitors, that information are transmitted
to sink.
4.3 Sink utility service
The sinks relay the monitoring results to the
destination (e.g., data processing center), based on
performance of ACO-MNCC routing. Finally routing
between sink and destinations are performed.

V.

Ant Colony Optimization- Based
Approach for Maximizing the
Number of Connected Covers

In this section, we introduce the ACOMNCC approach for maximizing the number of
connected covers in a heterogeneous WSN. First, the
objective function is formulated. The ants search
behavior is then described.

b. Construction Rule:
The construction rule of ACO guides the ants to
build their own solutions by selecting vertices from
the construction graph. In ACO-MNCC, the
construction rule guides an ant to assign each
device to a subset. The core of the construction rule,
as in other ACO algorithms, is the design of
pheromone and heuristic information. In ACOMNCC, the pheromone is deposited between every
two devices to record the historical desirability for
assigning them to the same subset. Heavier
pheromone indicates higher desirability, after an ant
has finished building its solution.
c. Pheromone Management:
The pheromone management in ACO-MNCC
comprises the local pheromone, which helps an ant
organize its coverage set with fewer sensors. The
global pheromones, one of which is used to
optimize the number of required sensors, and the
other is used to form a sensor set that has as
many sensors as an ant has selected the number of
active sensors by using the former pheromone.

VI.

PERFORMANCE EVALUATION

Various performance metrics are used for
comparing different routing strategies in WSNs. We
have used the following:
A. Average Energy: The metric give the average
of energy of all nodes at the end of simulation.

5.1 Objective Function
1) Criterion for the Coverage
Constraint.
www.ijera.com

B. Energy consumption: The metric gives the
energy consumption of nodes in the event area for
transmitting a data packet to sink.
170 | P a g e
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
C. Network lifetime: This metric gives the time
of the first node running out of its energy and How
to increase the lifetime.

VII.

EXPERIMENTS AND
SIMULATION DISCUSSIONS

This section of the paper discusses the
simulation of the proposed routing protocol and
evaluates its performance. To be able to evaluate the
implementation of the proposed ACO routing,
simulation was carried out in Java Agent
Development Framework (JADE-1.6), a scalable
discrete- event simulator Developed byJDK1.6. This
software provides a high fidelity simulation for
wireless communication with detailed link between
sensors and sink. We compare the ACO routing
protocol with sensor network. This demonstrates the
increased WSNs lifetime.
Based on a series of experiments are performed to
evaluate the performance of ACO-MNCC. Since the
proposed approach is the first algorithm for
maximizing the number of connected covers in
heterogeneous WSNs, a greedy algorithm that
applies the same heuristic information as ACOMNCC is used for comparison. The effectiveness of
pheromone, heuristic in- formation, and local search
procedure in the ACO-MNCC is also investigated.
In this project I used java swings to represent
graphical user interface(GUI) .GUI is used for
representing the area map and coverage, and JADE
frameworks is used for communication between
sensors and sinks. In JADE container all information
about the sensors can be stored. Finally
configurations are set for linking JADE and JAVA
as shown in fig 6

Fig 6. Technical architecture using Simulator- java
agent development framework (JADE).
C.
GUI
Event
Handlers
As we know that application has many
sensors, sinks & base station all of these network
may generate and receive various events like
sending/receiving messages, sending/receiving
pictures, etc., so separate event handling
mechanism has to be coded to cater the need as
shown in fig 8.
D. JADE Container Communication
Services
As a part of JADE integration, all GUI
events have to be delegated to JADE. So this module
acts an interface between GUI and JADE making it
possible to pass on all messages as shown in fig 8.

A. Graphic User Interface
(GUI)
Heterogeneous
Wireless
sensor
Network
application will be developed using Java Swing
application. GUI acts a governing module of entire
application and binds all other module intact as
shown in fig 7, fig 8.
B. GUI Application
areas
Application has several military areas collecting
various information right from text message,
pictures, videos, surveys, etc., GUI needs to provide
provision in terms of displaying these areas,
handle events specific to area and to perform ACO
mechanism as shown in fig 7.

www.ijera.com

Fig 7: Application of area map and coverage of
Sensor
E. Application Configuration Controllers
To place sensors, sink, base station & etc., several
data has to be collected from the user. To store/load
and update this information, a module will be
coded in a way it makes very convenient both
for application and for the user to use data as
shown in fig 8.

171 | P a g e
Linga Raj. K et al Int. Journal of Engineering Research and Application

www.ijera.com

ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172
[4] I. Dietrich and F. Dressler, “On the lifetime of

[5]

[6]

[7]

[8]

Fig 8: routing between sensors and sink
using ACO algorithm.

VIII.

CONCLUSION

In this paper, we presented a new
objective for maximizing the network lifetime using
ACO-MNCC algorithm to increase network
lifetime and balance the node power consumption
and as long as possible. The idea behind the
ACO-MNCC is simple using the lowest energy path
always is not necessarily best for the long- term
health of the network, because it would cause the
optimal path quickly get energy depleted. The
approach searches for the optimal solution by always
pursuing one more connected cover than the best-sofar solution. This way, the approach not only avoids
building excessive subsets but also improves the
search efficiency by setting an explicit goal for the
ants. Pheromone and heuristic information are also
designed to accelerate the search process for
prolonging the network lifetime. ACO-MNCC is a
promising method for prolonging the lifetime of
heterogeneous WSNs. Extensive simulation result
clearly shows that the proposed approach provides
more approximate, effective and efficient way for
maximizing the lifetime of heterogeneous wireless
sensor networks.

[9]

[10]

[11]

[12]

[13]

[14]

REFERENCES
[1] K. R¨ mer, F. Mattern, and E. Zurich, “The

design space of wireless sensor networks,”
IEEE Wireless Commun., vol. 11, no.6, pp. 54–
61, Dec. 2004.
[2] T. D. R¨ ty, “Survey on contemporary remote
surveillance systems fora public safety,” IEEE
Trans. Syst., Man, Cybern., Part C, vol.40, no. 5,
pp. 493–515, Sep. 2010.
[3] I. F. Akyildiz, T. Melodia, and K. R. Chowdury,
“Wireless multimediasensor network: A survey,”
IEEE Wireless Commun., vol. 14, no. 6, pp. 32–
39, Dec. 2007.

www.ijera.com

[15]

[16]
[17]

wireless sensor networks,”ACM Trans. Sensor
Networks, vol. 5, no. 1, Feb. 2009.
C.-Y. Chang, J.-P. Sheu, Y.-C. Chen, and S.-W.
Chang, “An obstacle-free and power-efficient
deployment
algorithm
for wireless sensor
networks,” IEEE Trans. Syst., Man, Cybern., Part
A, vol. 39, no. 4, pp. 795–806, Jul 2009.
F. Marcelloni and M. Vecchio, “A simple
algorithm for data compression in wireless sensor
networks,” IEEE Commun. Lett., vol. 12, no. 6,
pp. 411– 413, Jun. 2008.
S. Yang, H. Cheng, and F. Wang, “Genetic
algorithms with immigrants an Figure memory
schemes for dynamic shortest path routing
problems in mobile Ad Hoc networks,” IEEE
Trans. Syst., Man, Cyber., Part C, vol. 40, no. 1,
pp. 52–63, Jan. 2010.
Q. Zhao and M. Gurusamy, “Lifetime
maximization for connected target coverage in
wireless sensor networks,” IEEE/ACM Trans.
Networking, vol. 16, no. 6, pp. 1378–1391, Dec.
2008.
D. Martens, M. D. Backer, R. Haesen, J.
Vanthienen, M. Snoeck, and B. Baesens,
“Classification with ant colony.
H. Chen, C. K. Tse, and J. Feng, “Impact of
topology on performance and energy efficiency in
wireless
sensornetworks
for
source
extraction,”IEEE Trans. Parallel Distrib. Syst.,
vol. 20, no.6, pp. 886–897, Jun. 2009.
A. C. Zecchin, H. R. Maier, A. R. Simpson, and J.
B. Nixon, “Parametric study for an ant algorithm
applied to water distribution system optimization,”
IEEE Trans. Evol. Comput., vol. 9, no. 2, pp. 175–
191, Apr. 2005.
D. Martens, M. D. Backer, R. Haesen, J.
Vanthienen, M. Snoeck, and B.
Baesens,
“Classification with ant colony optimization,”
IEEE Trans. Evol. Compute. vol. 11, no. 5, pp.
651–665, Oct. 2007.
W.-N. Chen and J. Zhang, “An ant colony
optimization approach to a grid flow scheduling
problem with various QoS requirements,” IEEE
Trans. Syst., Man, Cybern., Part C, vol. 39, no. 1,
pp. 29–43, Jan. 2009.
X.-M. Hu, J. Zhang, H. S.-H. Chung, O. Liu, and
J. Xiao, “An intelligent testing system embedded
with an ant-colony- optimization-based test
composition method,” IEEE Trans. Syst., Man,
Cyber., Part C, vol. 39, no. 6, pp. 659–669, Nov.
2009.
J. Zhang, H. S.-H. Chung, A.W. Lo, and T.
Huang, “Extended ant colony optimization
algorithm for power electronic circuit design,”
IEEE Trans. Power Electron. vol. 24, no. 1, pp.
147–162, Jan.2009.
W.-N. Chen, J. Zhang, H. S.-H. Chung, R.-Z.
Huang, and O. Liu, “Optimizing discounted cash
flow in project scheduling: An ant colony
optimization approach,” IEEE Trans. Syst., Man,
Cybern., Part C, vol. 40, no. 1, pp. 64–77, Jan.
2010.

172 | P a g e

More Related Content

What's hot

DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksambitlick
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...IOSR Journals
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkIJARIIE JOURNAL
 

What's hot (18)

DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
 
F017544247
F017544247F017544247
F017544247
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor Network
 
Ba24345348
Ba24345348Ba24345348
Ba24345348
 
50120130406028 2
50120130406028 250120130406028 2
50120130406028 2
 

Viewers also liked (20)

Bg36347351
Bg36347351Bg36347351
Bg36347351
 
Af36188193
Af36188193Af36188193
Af36188193
 
Ah36200203
Ah36200203Ah36200203
Ah36200203
 
Ai36204209
Ai36204209Ai36204209
Ai36204209
 
A360105
A360105A360105
A360105
 
Ad36173175
Ad36173175Ad36173175
Ad36173175
 
Aa36155160
Aa36155160Aa36155160
Aa36155160
 
Scala #5
Scala #5Scala #5
Scala #5
 
Group 6 final 3
Group 6   final 3Group 6   final 3
Group 6 final 3
 
Pecha kucha
Pecha kuchaPecha kucha
Pecha kucha
 
[A31]AWS上でOracleを利用するためのはじめの一歩!by Masatoshi Yoshida
[A31]AWS上でOracleを利用するためのはじめの一歩!by Masatoshi Yoshida[A31]AWS上でOracleを利用するためのはじめの一歩!by Masatoshi Yoshida
[A31]AWS上でOracleを利用するためのはじめの一歩!by Masatoshi Yoshida
 
F41043841
F41043841F41043841
F41043841
 
If3614251429
If3614251429If3614251429
If3614251429
 
Gr3511821184
Gr3511821184Gr3511821184
Gr3511821184
 
Gf3511031106
Gf3511031106Gf3511031106
Gf3511031106
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
 
El tiempo es comounrio
El tiempo es comounrioEl tiempo es comounrio
El tiempo es comounrio
 
Dltv presentation by benjamin quansah
Dltv presentation by benjamin quansahDltv presentation by benjamin quansah
Dltv presentation by benjamin quansah
 
Slide grafico curso tic
Slide grafico curso ticSlide grafico curso tic
Slide grafico curso tic
 
Instructivo MIPCOM 2014
Instructivo MIPCOM 2014Instructivo MIPCOM 2014
Instructivo MIPCOM 2014
 

Similar to Ac36167172

AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...ijasuc
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networksijtsrd
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...IOSR Journals
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...eSAT Publishing House
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...IJECEIAES
 
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKSIJCNC
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 

Similar to Ac36167172 (20)

AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...Increasing the Network life Time by Simulated  Annealing Algorithm in WSN wit...
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
C0361011014
C0361011014C0361011014
C0361011014
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 

Recently uploaded

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Ac36167172

  • 1. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 RESEARCH ARTICLE OPEN ACCESS Swarm Intelligence Based Ant Colony Optimization (ACO) Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks LingaRaj.K1, Nalavadi Srikantha 2, Khaja Moinuddin 3, Lokesh K.S 4 1 Dept. Of CSE, Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, Karnataka, India Dept. Of ECE, Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, Karnataka, India 2,3,4 Abstract This paper attempts to undertake the study of maximizing the lifetime of Heterogeneous wireless sensor networks (WSNs). In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. Heterogeneous WSNs consists of different sensor devices with different capabilities. We can enhance the quality of monitoring in wireless sensor networks by increasing the coverage area. One of major issue in WSNs is finding maximum number of connected coverage. This paper proposed a Swarm Intelligence, Ant Colony Optimization (ACO) based approach. Ant colony optimization algorithm provides a natural and intrinsic way of exploration of search space of coverage area. Ants communicate with their nestmates using chemical scents known as pheromones, Based on Pheromone trail between sensor devices the shortest path is found. The methodology is based on finding the maximum number of connected covers that satisfy both sensing coverage and network connectivity. By finding the coverage area and sensing range, the network lifetime maximized and reduces the energy consumption Keywords— Wireless Sensor Networks (WSN’S), Ant Colony Optimization, Connective Coverage, Network Lifetime. I. INTRODUCTION The wireless sensor networks (WSNs) technology have been widely applied in military[1], industry, agriculture[2] and many other areas .In the WSNs, a lot of nodes operate on limited batteries, making energy resources the major bottleneck. Therefore, an economical and frugal management for improving the maximizing lifetime of wireless sensor is important. Wireless sensor networks (WSNs) consist of sensor nodes equipped with their own battery having limited lifetime, which makes the operations of network available only within a limited amount of time. It is crucial to examine and estimate how long the network is properly functioning, or network lifetime, after which the deployment of additional sensor nodes is inevitable so as to ensure the network connectivity and maintain the networking operations of interest, but requires lots of cost and effort. Hence, there has been much work on analyzing the network lifetime under a certain consideration and devising an algorithm or network protocol to prolong the network lifetime. The existing methods for prolonging the lifetime of WSNs focus on the issues of device placement[5], data processing ,routing[6][7], topology management[11], and device control Device placement is a fundamental factor in www.ijera.com determining the coverage, connectivity, cost and lifetime of a Wireless Sensor Network (WSN). In a WSN where devices are densely deployed, a subset of the devices can address the coverage and connectivity issues. The rest of the devices can be switched to a sleep state for conserving energy. Using device placement and routing techniques, finding coverage is difficult, because device in the sense sensors, when using heterogeneous WSNs connectivity problem occurs. In routing as router table increase finding coverage between the sensors are difficult. Therefore, the lifetime of a WSN can be prolonged by planning the active intervals of devices. At every point during the network lifetime, the active devices must form a connected cover to fulfill sensing coverage and network connectivity. But this also led to failure result .Later introduced hub-spoke topology [11]. This also teds some problem. A number of methods have been proposed for finding one connected cover from a WSN. The connected cover obtained may be optimal under certain criteria, such as minimum size or minimum energy consumption. Nevertheless, generating a sequence of optimal connected covers by repeating the above methods may not lead to lifetime maximization. Maximizing the number of connected 167 | P a g e
  • 2. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 covers is a more direct way to maximize the network lifetime. The problem of finding the maximum number of connected covers is difficult because each connected cover must fulfil sensing coverage and network connectivity simultaneously. Its sub problem of maximizing the number of subsets that fulfil sensing coverage is already in the non-deterministic polynomial time (NP) complete complexity class. Many methods focus on solving the above sub problem but ignore the issue of connectivity .These methods are able to maximize the lifetime of WSNs while maintaining both sensing coverage and network connectivity with a premise that the devices are identical and have a transmission range that is at least twice the sensing range. However, they cannot ensure the network connectivity when the required premise is not satisfied. In existing system, it very difficult to use different sensors with different functionality and capabilities .All sensors sent monitored information to single sink as shown in fig 1, Due to this there May overlapping, collision may occur in networks. It’s also difficult to find the maximize number of connected coverage and sensing range. It uses the greedy algorithm [8], which can be used for only in Homogenous Wireless Sensor Network. Finding optimal path between sensors and sink is difficult. Fig 1: System Architecture of current WSNs The proposed ACO-based approach for maximizing the number of connected covers (ACO-MNCC) first transforms the search space of the problem into a construction graph. Each vertex in the graph denotes an assignment of a device in a subset. Heuristic information is associated to each assignment for measuring its utility in reducing constraint violations. Pheromone is deposited between every two devices to record the historical desirability of assigning them to the same subset. In each iteration, the number of subsets is adaptively determined as one plus the number of connected covers in the best-so-far solution. The ants thus www.ijera.com concentrate on finding one more connected cover and avoid constructing subsets excessively. A local search procedure is designed to refine the solutions by reassigning redundant devices. The ACOMNCC is applied to 33 heterogeneous WSNs with different characteristics. Experimental results validate the effectiveness and efficiency of the proposed approach. II. PROPOSED SYSTEM This paper proposes first ACO-MNCC based approach for maximizing the lifetime of heterogeneous WSNs by finding the maximum number of connected covers. Heterogeneous WSNs means sensor with different capability, how it works and how it maximizes the network lifetime. Ant Colony Optimization (ACO) technique is an optimization technique to solve optimization problem [38] [40]. It has been developed for combinatorial optimization problems. ACO are multi-agent system in which the behavior of each single agent, called ant, is inspired by the behavior of real ants. In ACO, ants are stochastic constructive procedures that build solutions while walking on a construction graph. Such constructive search behavior makes ACO suitable for solving combinatorial optimization problems [40]. Besides, ACO utilizes search experiences (represented by pheromone) and domain knowledge (represented by heuristic information) to accelerate the search process. ACO algorithms have been successfully applied to a number of industrial and scientific problems [11]-[17]. In the fields of WSNs, ACO-based routing Algorithms have been used for improving the power efficiency in unicasting, broadcasting, and data gathering. In This paper I also presents a new communication protocol for WSN called energy efficient ant-based routing algorithm (EEABR), which is based on the Ant Colony Optimization (ACO) met heuristic .EEABR uses a colony of artificial ants that travel through the WSN looking for paths between the sensor nodes and a destination node, that are at the same time short in length and energy-efficient, contributing in that way to maximize the lifetime of the WSN. Each ant chooses the next network node to go to with a probability that is a function of the node energy and of the amount of pheromone trail present on the connections between the nodes. When an ant reaches the destination node, it travels backwards trough the path constructed and updates the pheromone trail by an amount that is based on the energy quality and the number of nodes of the path. 168 | P a g e
  • 3. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 III. PRELIMINARY AND RELATED WORK In this section, the problems of finding the maximum number o f disjoint connected c o v e r a g e b e t we e n sensors are defined. 3.1 Problem Definition Let as consider Randomly deploy a set of sensors (SE1,SE2,SE3…) and a set of sinks (SI1,SI2,SI3…) in an L × W area (| · | denotes the size of a set). Suppose, the Sensors have a sensing range si and a transmission range rt. The sinks have a transmission range Rt larger than rt. types area coverage sensors cover an area, point coverage. The sinks relay the monitoring results to the destination (e.g., data processing centre).Therefore, a connected cover in the heterogeneous WSNs must satisfy the following three constraints: 1) The sensors form complete coverage to the target, 2) all the monitoring results obtained by the sensors are transmitted to the sinks, and 3) the sinks compose a connected wireless network. Once all the information transmitted to sink using the algorithm. The sink finally sent all information to destination by doing this the life time of WSNs increases. Fig 2: Illustration of complete coverage The collection constraint, which requires the sinks to collect all the monitoring results obtained by the sensors in the same subset shown in fig 3.b. Fig 4: Heterogeneous Wireless sensor Networks – Proposed System Architecture IV. Fig 3: Two major types of coverage: area and target coverage (the big square on left denotes the covered area, the soldiers on the right denotes the covered targets) The routing constraint, which requires the sinks to form a connected network for transmitting the collected monitoring results to the destination. 3.2 Proposed System Architecture The sensors monitor the target and transmit the monitoring results to the sinks which are nearer to it, based on ACO-MNCC. Here I used more sinks to increase the sensor lifetime, as the sensor chooses the shortest path nearest to it as shown in Fig 4.The time of sending monitoring results can be reduced.In existing they used single sink, which lead to congestion between sensors, due to this the network lifetime decrease. The problems can be classified in the 3 www.ijera.com MODULE DESCRIPTION 4.1 Ant Colony Optimization algorithm concepts Many of the existing solutions to this problem come from the field of Evolutionary Computation .After analyzing them; we noticed that these interesting developments are quite similar to ACO algorithms [11], [12]. The relation between ACO algorithms and evolutionary algorithms provides a structural way of handling constrained problems. They have in common the use of a probabilistic mechanism for re-combination of individuals. This leads to algorithms where the population statistics are kept in a probability vector. These probabilities are used to generate new solutions in iterations. The new solutions are then used to adapt the probability vector. Real ants foraging for food lay down quantities of pheromone (chemical cues) marking the path that they follow [14], [15]. An isolated ant moves essentially guided by a heuristic function and an ant encountering a previously laid pheromone will detect and decide to follow it with high probability thus taking more informed actions based on the experience of previous ants (and thereby reinforce it with a 169 | P a g e
  • 4. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 further quantity of pheromone). The repetition of the above mechanism represents the auto-catalytic behavior of real ant colony where the more the ants follow a trail, the more attractive that trail becomes. Ant colony optimization is a class of optimization algorithms modeled on the actions of an ant colony. Artificial 'ants' - simulation agents locate optimal solutions by moving through a parameter space representing all possible solutions. Real ants lay down pheromones directing each other to resources while exploring their environment. The simulated 'ants' similarly record their positions and the quality of their solutions, so that in later simulation iterations more ants locate better solutions as shown in fig 5. The technique can be used for both Static and Dynamic Combinatorial optimization problems. Convergence is guaranteed, although the speed is unknown 2) Criterion for the Collection Constrain. 3) Criterion for the Routing Constraint It can be observed that the objective function has two components. The first component summarizes the constraint violations of all the subsets. The second component awards the objective value based on the number of connected covers. Since the goal of ACO- MNCC is to find a solution that maximizes the number of connected covers. 5.2 Working conditions of Ants between sensors and sink: In ACO, an ant’s search behavior is mainly influenced by three components: the construction graph, the solution construction rule, and the pheromone management. The following sections describe the three components: a. Construction Graph with pictorial representation: Construction graph consist of different sensors and sinks. Based on algorithm of ant colony optimization the sensor finds shortest path between sinks and destination. Fig 5: Ant pheromone evaporations in path 4.2 Sensor components The considered heterogeneous WSNs comprise two types of devices: sensors and sinks. Heterogeneous WSNs place the sensors and sinks in area coverage and checks the coverage to each sensor which monitors, that information are transmitted to sink. 4.3 Sink utility service The sinks relay the monitoring results to the destination (e.g., data processing center), based on performance of ACO-MNCC routing. Finally routing between sink and destinations are performed. V. Ant Colony Optimization- Based Approach for Maximizing the Number of Connected Covers In this section, we introduce the ACOMNCC approach for maximizing the number of connected covers in a heterogeneous WSN. First, the objective function is formulated. The ants search behavior is then described. b. Construction Rule: The construction rule of ACO guides the ants to build their own solutions by selecting vertices from the construction graph. In ACO-MNCC, the construction rule guides an ant to assign each device to a subset. The core of the construction rule, as in other ACO algorithms, is the design of pheromone and heuristic information. In ACOMNCC, the pheromone is deposited between every two devices to record the historical desirability for assigning them to the same subset. Heavier pheromone indicates higher desirability, after an ant has finished building its solution. c. Pheromone Management: The pheromone management in ACO-MNCC comprises the local pheromone, which helps an ant organize its coverage set with fewer sensors. The global pheromones, one of which is used to optimize the number of required sensors, and the other is used to form a sensor set that has as many sensors as an ant has selected the number of active sensors by using the former pheromone. VI. PERFORMANCE EVALUATION Various performance metrics are used for comparing different routing strategies in WSNs. We have used the following: A. Average Energy: The metric give the average of energy of all nodes at the end of simulation. 5.1 Objective Function 1) Criterion for the Coverage Constraint. www.ijera.com B. Energy consumption: The metric gives the energy consumption of nodes in the event area for transmitting a data packet to sink. 170 | P a g e
  • 5. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 C. Network lifetime: This metric gives the time of the first node running out of its energy and How to increase the lifetime. VII. EXPERIMENTS AND SIMULATION DISCUSSIONS This section of the paper discusses the simulation of the proposed routing protocol and evaluates its performance. To be able to evaluate the implementation of the proposed ACO routing, simulation was carried out in Java Agent Development Framework (JADE-1.6), a scalable discrete- event simulator Developed byJDK1.6. This software provides a high fidelity simulation for wireless communication with detailed link between sensors and sink. We compare the ACO routing protocol with sensor network. This demonstrates the increased WSNs lifetime. Based on a series of experiments are performed to evaluate the performance of ACO-MNCC. Since the proposed approach is the first algorithm for maximizing the number of connected covers in heterogeneous WSNs, a greedy algorithm that applies the same heuristic information as ACOMNCC is used for comparison. The effectiveness of pheromone, heuristic in- formation, and local search procedure in the ACO-MNCC is also investigated. In this project I used java swings to represent graphical user interface(GUI) .GUI is used for representing the area map and coverage, and JADE frameworks is used for communication between sensors and sinks. In JADE container all information about the sensors can be stored. Finally configurations are set for linking JADE and JAVA as shown in fig 6 Fig 6. Technical architecture using Simulator- java agent development framework (JADE). C. GUI Event Handlers As we know that application has many sensors, sinks & base station all of these network may generate and receive various events like sending/receiving messages, sending/receiving pictures, etc., so separate event handling mechanism has to be coded to cater the need as shown in fig 8. D. JADE Container Communication Services As a part of JADE integration, all GUI events have to be delegated to JADE. So this module acts an interface between GUI and JADE making it possible to pass on all messages as shown in fig 8. A. Graphic User Interface (GUI) Heterogeneous Wireless sensor Network application will be developed using Java Swing application. GUI acts a governing module of entire application and binds all other module intact as shown in fig 7, fig 8. B. GUI Application areas Application has several military areas collecting various information right from text message, pictures, videos, surveys, etc., GUI needs to provide provision in terms of displaying these areas, handle events specific to area and to perform ACO mechanism as shown in fig 7. www.ijera.com Fig 7: Application of area map and coverage of Sensor E. Application Configuration Controllers To place sensors, sink, base station & etc., several data has to be collected from the user. To store/load and update this information, a module will be coded in a way it makes very convenient both for application and for the user to use data as shown in fig 8. 171 | P a g e
  • 6. Linga Raj. K et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.167-172 [4] I. Dietrich and F. Dressler, “On the lifetime of [5] [6] [7] [8] Fig 8: routing between sensors and sink using ACO algorithm. VIII. CONCLUSION In this paper, we presented a new objective for maximizing the network lifetime using ACO-MNCC algorithm to increase network lifetime and balance the node power consumption and as long as possible. The idea behind the ACO-MNCC is simple using the lowest energy path always is not necessarily best for the long- term health of the network, because it would cause the optimal path quickly get energy depleted. The approach searches for the optimal solution by always pursuing one more connected cover than the best-sofar solution. This way, the approach not only avoids building excessive subsets but also improves the search efficiency by setting an explicit goal for the ants. Pheromone and heuristic information are also designed to accelerate the search process for prolonging the network lifetime. ACO-MNCC is a promising method for prolonging the lifetime of heterogeneous WSNs. Extensive simulation result clearly shows that the proposed approach provides more approximate, effective and efficient way for maximizing the lifetime of heterogeneous wireless sensor networks. [9] [10] [11] [12] [13] [14] REFERENCES [1] K. R¨ mer, F. Mattern, and E. Zurich, “The design space of wireless sensor networks,” IEEE Wireless Commun., vol. 11, no.6, pp. 54– 61, Dec. 2004. [2] T. D. R¨ ty, “Survey on contemporary remote surveillance systems fora public safety,” IEEE Trans. Syst., Man, Cybern., Part C, vol.40, no. 5, pp. 493–515, Sep. 2010. [3] I. F. Akyildiz, T. Melodia, and K. R. Chowdury, “Wireless multimediasensor network: A survey,” IEEE Wireless Commun., vol. 14, no. 6, pp. 32– 39, Dec. 2007. www.ijera.com [15] [16] [17] wireless sensor networks,”ACM Trans. Sensor Networks, vol. 5, no. 1, Feb. 2009. C.-Y. Chang, J.-P. Sheu, Y.-C. Chen, and S.-W. Chang, “An obstacle-free and power-efficient deployment algorithm for wireless sensor networks,” IEEE Trans. Syst., Man, Cybern., Part A, vol. 39, no. 4, pp. 795–806, Jul 2009. F. Marcelloni and M. Vecchio, “A simple algorithm for data compression in wireless sensor networks,” IEEE Commun. Lett., vol. 12, no. 6, pp. 411– 413, Jun. 2008. S. Yang, H. Cheng, and F. Wang, “Genetic algorithms with immigrants an Figure memory schemes for dynamic shortest path routing problems in mobile Ad Hoc networks,” IEEE Trans. Syst., Man, Cyber., Part C, vol. 40, no. 1, pp. 52–63, Jan. 2010. Q. Zhao and M. Gurusamy, “Lifetime maximization for connected target coverage in wireless sensor networks,” IEEE/ACM Trans. Networking, vol. 16, no. 6, pp. 1378–1391, Dec. 2008. D. Martens, M. D. Backer, R. Haesen, J. Vanthienen, M. Snoeck, and B. Baesens, “Classification with ant colony. H. Chen, C. K. Tse, and J. Feng, “Impact of topology on performance and energy efficiency in wireless sensornetworks for source extraction,”IEEE Trans. Parallel Distrib. Syst., vol. 20, no.6, pp. 886–897, Jun. 2009. A. C. Zecchin, H. R. Maier, A. R. Simpson, and J. B. Nixon, “Parametric study for an ant algorithm applied to water distribution system optimization,” IEEE Trans. Evol. Comput., vol. 9, no. 2, pp. 175– 191, Apr. 2005. D. Martens, M. D. Backer, R. Haesen, J. Vanthienen, M. Snoeck, and B. Baesens, “Classification with ant colony optimization,” IEEE Trans. Evol. Compute. vol. 11, no. 5, pp. 651–665, Oct. 2007. W.-N. Chen and J. Zhang, “An ant colony optimization approach to a grid flow scheduling problem with various QoS requirements,” IEEE Trans. Syst., Man, Cybern., Part C, vol. 39, no. 1, pp. 29–43, Jan. 2009. X.-M. Hu, J. Zhang, H. S.-H. Chung, O. Liu, and J. Xiao, “An intelligent testing system embedded with an ant-colony- optimization-based test composition method,” IEEE Trans. Syst., Man, Cyber., Part C, vol. 39, no. 6, pp. 659–669, Nov. 2009. J. Zhang, H. S.-H. Chung, A.W. Lo, and T. Huang, “Extended ant colony optimization algorithm for power electronic circuit design,” IEEE Trans. Power Electron. vol. 24, no. 1, pp. 147–162, Jan.2009. W.-N. Chen, J. Zhang, H. S.-H. Chung, R.-Z. Huang, and O. Liu, “Optimizing discounted cash flow in project scheduling: An ant colony optimization approach,” IEEE Trans. Syst., Man, Cybern., Part C, vol. 40, no. 1, pp. 64–77, Jan. 2010. 172 | P a g e