SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 7 (August 2012), PP. 62-68


    Strong Link Establishment in Wireless Ad hoc Network using
                  Position based Re-configuration
            Shradhananda Beura1, Gyanendra kumar Pallai2, Banshidhar Majhi3
      1,2
            Computer Science & Engineering, NM Institute of Engineering and Technology, Bhubaneswar-751019, India,
                  3
                    Computer Science & Engineerin, National Institute of Technology, Rourkela-769008, India



Abstract––In this paper, we analyze the nature of links among various sensor nodes which is subjected to dynamic
reconfiguration .This may arise due to occurrence of adverse constraints in the deployed environment. As a result the
communication frame-work gets influenced and needs to be modified from time to time. The suggested scheme deals with
finding the number of strong and weak links for each node to every other node. The network characteristic is studied over
a period of time and displacement of nodes assumed to be random. This information can be further utilized to modify the
routing table for transmission across the strong links so that the node saves energy and remain active for a longer period
of time.

Keywords–– dynamic WSN, ad hoc network, strong link, weak link, head node

                                              I.         INTRODUCTION
           Wireless Sensor Networks (WSN) is a new computing paradigm that is based from the combination of the
supervisory control and data acquisition systems and ad hoc network technologies. WSN are increasingly attractive system
to detect, monitor and control environmental conditions. Wireless sensor network consists of a large number of small
inexpensive disposable and autonomous nodes that are generally deployed in ad hoc manner in vast geographical for remote
operations. WSNs have a variety of applications of distributed wireless sensing including medical, home security, machine
diagnosis, military applications, vehicular movement, environmental monitoring, biological detections, soil makeup, noise
levels, mechanical stress levels on attached objects and the current characteristics such as speed, direction and size of the
objects.
           Support for very large numbers of autonomous mobile nodes, adaptability to environment and task dynamics are
fundamental problems of WSNs as they have limitations of dynamic network topology, limited battery power and
constrained wireless band width. The configuration of sensor nodes would frequently change in terms of position, reach
ability, power availability etc. As the nodes interact with physical environments they would experience a significance range
of task dynamics.
           Node mobility, node failures in establishing a link with neighbour node, environmental obstruction cause a high
degree of dynamics in WSNs. these include frequent network topology changes and network partitions. WSNs will exist
with the plenty of nodes per user. At such heavy quantity, nodes may be in accessible, since they are incorporated in
physically structures or thrown into hostile terrain. Thus for a effective system, it must provide self configuration
functionality.
           In this paper, we compute the Euclidian distance between pair of nodes and subsequently decided the link to be
weak or strong if the distance exceeds a threshold. Further the method find out the head node with maximum strong links in
the network. This information can be utilised to select a cluster head and to update the routing table for using the strong links
for transmission. This will enable the WSN to minimise the transmission failures and improve the stability and longevity of
the network.
           The paper is organised as follows. Section 2 outlines the related work and the system model. In Section 3 we
present the proposed algorithm for finding the strong and weak links. Section 4 deals with simulation and results. Finally,
Section 5 presents the concluding remarks.

                                              II.       RELATED WORK
          Woo et al [7] investigated reliable multi-hop routing in WSNs. Their recommendation includes the use of PRR as
link quality metric for link estimators, interpreting the minimum data transmission route as link availability indicator and
using the number of transmission from source to destination as a routing metric. in this they didn’t evaluate the number of
strong links required for transmission can be optimized in dynamic network configuration.
          Woo and D.Culler [8] examined their study for settling time for good and bad links among the nodes. it does not
perform for well links for intermediate quality[9].Sun et al[10]considers the WSN network is a homogenous network density
in terms of links is distributed uniformly throughout the area. But practically a dynamic WSN is ad hoc in nature can not be
homogenous rather is heterogeneous. So in a heterogeneous dynamic network density is not uniformly distributed which
leads the failure of transmission of packets from the differential part of the area where no maximum strong links are there.
That is why it needs to find out the more links per node to forward the message.



                                                              62
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration
                                                 III.          SYSTEM MODEL
           We model the wire-less ad hoc network of n nodes deployed in 2-D (x & y polar co-ordinate.) area, where no two
nodes are in the same position. We assume each node is aware of its own position through of GPS device. We further assume
the existence of location management services so that each node is aware of the positions of other nodes. Finally we assume
the nodes may be mobile i.e. positions of nodes may change over time in each reconfiguration as in a random work model.
           We assume the dimension of 2-D area as L×L where L is the length of the area. We consider the model in which
there are two types of links being established among nodes either strong link on weak links or strong and weak links both.
We assume two threshold range values as                RTH ( S ) , RTH ( w)   representing the ranges for strong link and weak link
respectively.
             We consider two nodes in 2-D plane, denoted by             N i , N j i, j  n i  j . In order to find out the distance
between any two consecutive nodes N i , N j , we take the parameter DIST which indicates the Euclidean distance between

any two consecutive node      Ni , N j   defined as,

DIST           xNi   xN j 2  yNi   yN j 2                                                            (1)

 xN i , y  N i  represents position coordinates of node N i and xN j , y N j  represents position coordinates of node
Nj.

                                   Algorithm 1: Finding the distance between the nodes

                                   Find_DIST ( N i , N j )
                                   For each node N i         i, n
                                   {
                                              x N i  =random value(1,n)*L
                                              y  N i  =random value(1,n)*L
                                   }
                                                       
                                    DIST  sqrt xN i   xN j   yN i   yN j 
                                                                                  2                          2
                                                                                                                 
                                   Return(DIST)

Next Comparing the distance value DIST to the threshold ranges                RTH ( S )   & RTH (w) .

Comparision-1:        For   DIST  RTH (S ) , link being established is strong one.
Comparision-2:        For   RTH ( S )  DIST  RTH (W ) , link being established is weak one.


Further if   DIST  RTH (w) , then no link should be there between nodes N i and N j .


                                                        Nj                                                   Nj
                                                                               RTH ( S )  DIST  RTH (W )
                            DIST  RTH (S )

                                            Strong link                                             Weak link



                             Ni                                                       Ni



                                  Fig. 1:                  Strong link and weak link between nodes

                                                                      63
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration
          We take two matrices as MSL and MWL for nodes having dtrong links and weak links respectively. The cells of
matrices are assigned to 1 if there is a link between the nodes   N i and N j . Otherwise it is infinite for no link.
                         MSL                                                                    MWL
                           Ni                                                                      Ni

                 N 1 N 2 N 3 ………..… N 100                                                N 1 N 2 N 3 ………..… N 100

       N1                                                                     N1
Nj     N2                                                             Nj      N2
       N3                                                                     N3
      .                                                                       .
      .                                                                       .
       N 100                                                                  N 100

                                   Fig. 2: Matrix representation of strong and weak links

                                       Algorithm 2:         Link establishment algorithm


                                     Link_establishment( N i , N j )
                                     For i=1 to n & j=1 to n ,i≠j
                                     {
                                     if DIST  RTH (S )
                                     MSL[i][j]=1;
                                     else
                                     MSL[i][j]=inf;

                                     if RTH ( S )  DIST  RTH (W )
                                     WSL[i][j]=1;
                                     else
                                     WSL[i][j]=inf;
                                     }


          Such an algorithm establishes the strong links and weak links among node           N i and N j . After establishment of
links, a fully ad hoc network is deployed.

          The total strong links are counted for each individual node in the network for a particular configuration. Further,
we take one array A contains the node indices having strong links. Then searching the node            N k , k  n in the matrix A
which has largest number of strong links. If k=1, then there is only one node N k , k     n    has maximum strong links in that
configuration. If k>1, then there are a number of nodes having maximum strong links. The node(s) are considered the head
in those ad hoc networks. These head nodes can collect the information from all other nodes and send it to the sink node, so
that at a particular round of network deployment these nodes may active for larger period having the sufficient energy
consideration without engaging the other nodes for trying to forwarding messages to the sink node.
           A total of five rounds are considered for the network simulation. These rounds are based on the time. As round m
is in time t, round m+1 in time t  t and round m+2 in time t  2t so on. Now our job is to find out the difference of
number of strong links in successive rounds should be incremental order so that we can find more head nodes. Therefore we
take the following parameters

TSL m : Total number of strong links in mth round.
TSLm1 : Total number of strong links in (m+1)th round.
SL : Difference of total number in strong links in mth and (m+1)th round.
                                                              64
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration

So   SL  TSL m 1  TSL m
Similarly
TWL m : Total number of weak links in mth round.
TWL m 1 : Total number of weak links in (m+1)th round.
WL : Difference of total number in weak links in mth and (m+1)th round.
So WL  TWL m 1  TWL m
For each round, if SL  WL , then the re-configuration of network is effective to establish more strong links.

                                           IV.       PROPOSED ALGORITHM
          We adopt an algorithm to find the maximum number of strong links in comparison to weak links. As a result head
nodes are selected and make an independent decision to forward the message to the sink node.
Particularly for two random nodes      N i , N j , i , j  n, i  j
     1.     Find_DIST ( N i , N j )

     2.     Accept two threshold range values     RTH ( S ) , RTH ( w)   for establishment of strong link and weak links.

     3      Establishing the links among the node through Link_ establishment ( N i , N j )
     4.     Create two matrices A & B contains the indices of nodes having strong links and weak links.
     5.     Find the node   Nk , k  n     in matrix A having highest number of strong links.

     6.     If k=1 then select   Nk   as the head node else if k>1 then take sets of nodes     N k1   ,
            N k 2 , N k 3 …and randomly select one from set as head.
     7.     Find total number of strong links and weak links as TSL and TWL.
     8.     Compute the percentage of difference in the number of strong links and weak
            links in the successive rounds.

                            V.          SIMULATION RESULTS AND DISCUSSIONS
           MATLAB 7.0 was used for evaluation of the performance of our approach. The simulation study modeled a
network of mobile nodes placed randomly with an area 700m×700m in which 100 nodes are placed. The mobility model is
random-way point where nodes are randomly selected for positioning. In each simulation round, each node chooses the
direction, speed and distance of move based on random distribution and also then computer its next position p(x,y) and time
instant t of reaching the position. Each node has some physical properties, radio ranges of 125m and 175m for establishing
strong links and weak links. A node computes its neighbour hood in each round thus generating the links.

Performance results
          We have simulated 100 mobile nodes for wireless ad hoc networks with respect to random mobility. The model
studies with respect to the following performance metrics
         Number of strong links and weak links
         Selection of head nodes
         Difference of number of strong links with respect to weak links in different rounds

          The Figures 3 & 4 present the different configuration of the deployed network in the random model in different
rounds. The Figure 5 describes more number of strong links achieved by the network in successive rounds. It is observed that
the network becomes more stable in terms of more strong links establishment. The Figure 6 describes the more percentage of
difference of strong links than the percentage of difference of weak links in several rounds.it is observed that in each re-
configuration of network after time duration t , the possibility of establishment of strong links can be more which leads
to maintain the stability of ad hoc network.




                                                                    65
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration

                        Deployment of wsn for 1st round(100 nodes)
            700                      49
                                 37                            73
                                  47                   82                                                      node
                        6 12 41           52           89 69
                                                   94              74    20                                    strong link
            600        46               100
                                           10                                                                  weak link
                          14                                 65           81
                  50      4363         45 98                          22
                                               83
                     90
            500               54                   53         80
                                                             27
                1188                                                       26
                             42                 97        92     35
                                      48                66       1    24                     57
            400            5    31                                                        29    25
in meter




                                                        19                                 17
                                             4           68                        36           58
                                                                  23
                                                       79           59 38        96
            300                                                      34 61
                                      91                15
                                             7                         55
                           51          18         84        28 33          56
            200                       95                     71                           3
                                                            78                          39
                           40                                   16               70
                                                                      44                            75
                                                                                                   30
                                        2                   87                                           8
            100                        93                                                     76
                                       62                                         86
                                                                                  67
                                13                          72         985              77
                                                                                                         60
                                                                                                         21
                      99
                                      64                         32
                  0
                      0         100         200        300     400              500      600         700
                                                        in meter

                                      Figure-3: Network reconfiguration after first round

                             Deployment of wsn for 2nd round(100 nodes)
                 700                    1 22
                                                68 30               66
                                           86               67            61 54
                                                                           21                                 node
                                       41 27       79
                              75                                    88                                        strong link
                                                     4058                            24
                 600                              20 19
                                                                  43                                          weak link
                            16                         63       65
                           69                                                  9
                                   39 33       42                 37
                 500              82 78
                                                          5        45
                                                                                  97 18
                               84 11                   50
                                                      32       14         72
                                            83
                 400                                            92
                                                60
      in meter




                            81
                       98       35 6       23       59                         1091
                                                                  31
                 300                      26
                                         80
                                       13                          55
                                 70         25                         64              85
                                                                                      46
                           2  99                          7                 73
                                   44                                                   34
                 200                12
                          38                  17         76                   4
                       53            100                                               15
                                                                       87             48
                                                                          56
                 100
                               8 29
                                 96                                   95
                           77 52       36
                                       57                                  28
                                     49 3                                           89
                                         93 51        71      94 47 62          90
                   0                                                                74
                     0      100       200      300        400       500      600       700
                                                 in meter

                                  Figure-4: Network reconfiguration after second round




                                                                      66
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration

                                                                                     Number of strong and weak links per different rounds
                                                                        420
                                                                                                                                                       strong link
                                                                        410                                                                            weak link

                                                                        400

                                                                        390
                                                 Links in the Network



                                                                        380

                                                                        370

                                                                        360

                                                                        350

                                                                        340

                                                                        330
                                                                              1       1.5       2    2.5      3      3.5       4    4.5         5
                                                                                                           Rounds

                                                                                  Figure-5: Strong and weak link characteristics at different rounds

                                                                              Change of percentage of links per different rounds
                                                       30
                                                                                                                                                    % of strong link
                                                                                                                                                    % of weak link
                                                       20
                 Change in percentage of links




                                                       10



                                                                    0



                                                 -10



                                                 -20



                                                 -30
                                                                        1                   2             3                4                5
                                                                                                       Rounds

                                                                                     Figure-6: Percentage of link variations at different rounds

                                                                                                    VI.       CONCLUSION
         In this paper, we have proposed a robust dynamic ad hoc wireless network with different configurations based on
dynamic environment in which specific nodes acquire largest strong links in the network. Which is further selected as head
nodes and these head nodes are responsible for sending the information collected from the network to the sink. In the future
work we will consider the energy consumption of the node and cost of transmission of message to achieve the QOS of the
network. Besides we try to involve our approach in real world.




                                                                                                                  67
Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration
                                                     REFERENCES
[1].    Paul Grace at-al-Dynamic reconfiguration in sensor middleware-midsens 06-Nov-27.
[2].    Sameer Tilak et-al-a taxonomy of wireless micro sensor network models-mobile computing and communication review, volume-
        6-number-2.
[3].    I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci , A survey Wireless sensor networks ,Computer Networks 38 (2002)
        393–422.
[4].    Raghavendra V. Kulkarni, Anna Förster, Member and Ganesh Kumar Venayagamoorthy- Computational Intelligence in
        Wireless Sensor Networks: A Survey-IEEE communications surveys & tutorials, vol. 13, no. 1, first quarter 2011
[5].    Biswanath Dey Sukumar Nandi. Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor
        Network[C]. In : Distributed Computing and Networking, 8th International Conference, ICDCN 2006. 534-54
[6].    Dayang Sun,Yanheng liu,Aimin wang, Bin Ge Research on Service-oriented Lifetime and Network Density in WSN In:IEEE 9th
        International Conference for Young Computer Scientists 2008, 439-444.
[7].    A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In SenSys
        ’03, 2003.
[8].    A.Woo and D. Culler. Evaluation of efficient link reliability estimators for low-power wireless networks. Technical Report
        UCB/CSD-03- 1270, EECS Department, University of California, Berkeley, 2003.
 [9].   A. Becher, O. Landsiedel, G. Kunz, and K. Wehrle. Towards shortterm link quality estimation. In Hot Emnets, 2008.
[10].   Dayang Sun,Yanheng liu,Aimin wang, Bin Ge Research on Service-oriented Lifetime andNetwork Density in WSN In:IEEE 9th
        International Conference for Young Computer Scientists 2008, 439-444




                                                              68

More Related Content

What's hot

Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Indraneel Pole
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
 
you see what you know
you see what you knowyou see what you know
you see what you knowDiana Frank
 
(Artificial) Neural Network
(Artificial) Neural Network(Artificial) Neural Network
(Artificial) Neural NetworkPutri Wikie
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementWei Tsang Ooi
 
Neural network
Neural networkNeural network
Neural networkSilicon
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
 
Deep learning presentation
Deep learning presentationDeep learning presentation
Deep learning presentationBaptiste Wicht
 
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?Gabriele D'Angelo
 
NeurSciACone
NeurSciAConeNeurSciACone
NeurSciAConeAdam Cone
 
NIPS2007: deep belief nets
NIPS2007: deep belief netsNIPS2007: deep belief nets
NIPS2007: deep belief netszukun
 
Cs782 presentation group7
Cs782 presentation group7Cs782 presentation group7
Cs782 presentation group7Mingliang Sun
 
Ireducible core and equal remaining obligations rule for mcst games
Ireducible core and equal remaining obligations rule for mcst gamesIreducible core and equal remaining obligations rule for mcst games
Ireducible core and equal remaining obligations rule for mcst gamesvinnief
 
Phoenix: A Weight-based Network Coordinate System Using Matrix Factorization
Phoenix: A Weight-based Network Coordinate System Using Matrix FactorizationPhoenix: A Weight-based Network Coordinate System Using Matrix Factorization
Phoenix: A Weight-based Network Coordinate System Using Matrix Factorizationyeung2000
 

What's hot (18)

Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
 
06075626 (1)
06075626 (1)06075626 (1)
06075626 (1)
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
 
you see what you know
you see what you knowyou see what you know
you see what you know
 
(Artificial) Neural Network
(Artificial) Neural Network(Artificial) Neural Network
(Artificial) Neural Network
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
 
Neural network
Neural networkNeural network
Neural network
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
Deep learning presentation
Deep learning presentationDeep learning presentation
Deep learning presentation
 
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
NeurSciACone
NeurSciAConeNeurSciACone
NeurSciACone
 
NIPS2007: deep belief nets
NIPS2007: deep belief netsNIPS2007: deep belief nets
NIPS2007: deep belief nets
 
Cs782 presentation group7
Cs782 presentation group7Cs782 presentation group7
Cs782 presentation group7
 
Ireducible core and equal remaining obligations rule for mcst games
Ireducible core and equal remaining obligations rule for mcst gamesIreducible core and equal remaining obligations rule for mcst games
Ireducible core and equal remaining obligations rule for mcst games
 
Bit commitment
Bit commitmentBit commitment
Bit commitment
 
Phoenix: A Weight-based Network Coordinate System Using Matrix Factorization
Phoenix: A Weight-based Network Coordinate System Using Matrix FactorizationPhoenix: A Weight-based Network Coordinate System Using Matrix Factorization
Phoenix: A Weight-based Network Coordinate System Using Matrix Factorization
 

Viewers also liked

Nobody tells all he knows.
Nobody tells all he knows.Nobody tells all he knows.
Nobody tells all he knows.Rhea Myers
 
Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Rhea Myers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
The truth is everywhere. If it wasn't it wouldn't be the truth.
The truth is everywhere. If it wasn't it wouldn't be the truth.The truth is everywhere. If it wasn't it wouldn't be the truth.
The truth is everywhere. If it wasn't it wouldn't be the truth.Rhea Myers
 
IBM SmartCloud Enterprise Pricing - Case no. 1
IBM SmartCloud Enterprise Pricing - Case no. 1IBM SmartCloud Enterprise Pricing - Case no. 1
IBM SmartCloud Enterprise Pricing - Case no. 1Indeo Oy
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetrics
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetricsGROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetrics
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetricsDealmaker Media
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Reach out and touch someone
Reach out and touch someoneReach out and touch someone
Reach out and touch someoneRhea Myers
 
A training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningA training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningGlobal Risk Forum GRFDavos
 
Every road does not lead to Rome.
Every road does not lead to Rome.Every road does not lead to Rome.
Every road does not lead to Rome.Rhea Myers
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazardsGlobal Risk Forum GRFDavos
 

Viewers also liked (18)

Nobody tells all he knows.
Nobody tells all he knows.Nobody tells all he knows.
Nobody tells all he knows.
 
PORTFOLIO WIN LINK
PORTFOLIO WIN LINKPORTFOLIO WIN LINK
PORTFOLIO WIN LINK
 
Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
The truth is everywhere. If it wasn't it wouldn't be the truth.
The truth is everywhere. If it wasn't it wouldn't be the truth.The truth is everywhere. If it wasn't it wouldn't be the truth.
The truth is everywhere. If it wasn't it wouldn't be the truth.
 
IBM SmartCloud Enterprise Pricing - Case no. 1
IBM SmartCloud Enterprise Pricing - Case no. 1IBM SmartCloud Enterprise Pricing - Case no. 1
IBM SmartCloud Enterprise Pricing - Case no. 1
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetrics
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetricsGROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetrics
GROWtalks - 10 Metrics You Need to be Tracking - Neil Patel KISSmetrics
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Nextel Monterrey
Nextel MonterreyNextel Monterrey
Nextel Monterrey
 
Reach out and touch someone
Reach out and touch someoneReach out and touch someone
Reach out and touch someone
 
Get Started with Marketing on Pinterest Workshop
Get Started with Marketing on Pinterest WorkshopGet Started with Marketing on Pinterest Workshop
Get Started with Marketing on Pinterest Workshop
 
A training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningA training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planning
 
Every road does not lead to Rome.
Every road does not lead to Rome.Every road does not lead to Rome.
Every road does not lead to Rome.
 
Copycat
Copycat Copycat
Copycat
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazards
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSijaia
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSgerogepatton
 
Arjun Visulaization of Computational Neural Networks
Arjun Visulaization of Computational Neural NetworksArjun Visulaization of Computational Neural Networks
Arjun Visulaization of Computational Neural NetworksArjun Shankar
 
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...IJNSA Journal
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
MULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODMULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODijwmn
 
Collective dynamics of ‘small-world’ networks
Collective dynamics of ‘small-world’ networksCollective dynamics of ‘small-world’ networks
Collective dynamics of ‘small-world’ networksTokyo Tech
 
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSN
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSNOPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSN
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSNijwmn
 
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...ijsrd.com
 
Medicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingMedicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingbGeniusLLC
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degreeIJCNCJournal
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
 
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKSA NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
A NEW GENERALIZATION OF EDGE OVERLAP TO WEIGHTED NETWORKS
 
Arjun Visulaization of Computational Neural Networks
Arjun Visulaization of Computational Neural NetworksArjun Visulaization of Computational Neural Networks
Arjun Visulaization of Computational Neural Networks
 
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Ad34186189
Ad34186189Ad34186189
Ad34186189
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
MULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHODMULTI-ANTENNA LOCALIZATION METHOD
MULTI-ANTENNA LOCALIZATION METHOD
 
Collective dynamics of ‘small-world’ networks
Collective dynamics of ‘small-world’ networksCollective dynamics of ‘small-world’ networks
Collective dynamics of ‘small-world’ networks
 
D031202018023
D031202018023D031202018023
D031202018023
 
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSN
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSNOPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSN
OPTIMAL DATA COLLECTION FOR A 2-LEVEL BALANCED WSN
 
Line
LineLine
Line
 
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for ...
 
Gaussian processes
Gaussian processesGaussian processes
Gaussian processes
 
Medicinal Applications of Quantum Computing
Medicinal Applications of Quantum ComputingMedicinal Applications of Quantum Computing
Medicinal Applications of Quantum Computing
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 7 (August 2012), PP. 62-68 Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration Shradhananda Beura1, Gyanendra kumar Pallai2, Banshidhar Majhi3 1,2 Computer Science & Engineering, NM Institute of Engineering and Technology, Bhubaneswar-751019, India, 3 Computer Science & Engineerin, National Institute of Technology, Rourkela-769008, India Abstract––In this paper, we analyze the nature of links among various sensor nodes which is subjected to dynamic reconfiguration .This may arise due to occurrence of adverse constraints in the deployed environment. As a result the communication frame-work gets influenced and needs to be modified from time to time. The suggested scheme deals with finding the number of strong and weak links for each node to every other node. The network characteristic is studied over a period of time and displacement of nodes assumed to be random. This information can be further utilized to modify the routing table for transmission across the strong links so that the node saves energy and remain active for a longer period of time. Keywords–– dynamic WSN, ad hoc network, strong link, weak link, head node I. INTRODUCTION Wireless Sensor Networks (WSN) is a new computing paradigm that is based from the combination of the supervisory control and data acquisition systems and ad hoc network technologies. WSN are increasingly attractive system to detect, monitor and control environmental conditions. Wireless sensor network consists of a large number of small inexpensive disposable and autonomous nodes that are generally deployed in ad hoc manner in vast geographical for remote operations. WSNs have a variety of applications of distributed wireless sensing including medical, home security, machine diagnosis, military applications, vehicular movement, environmental monitoring, biological detections, soil makeup, noise levels, mechanical stress levels on attached objects and the current characteristics such as speed, direction and size of the objects. Support for very large numbers of autonomous mobile nodes, adaptability to environment and task dynamics are fundamental problems of WSNs as they have limitations of dynamic network topology, limited battery power and constrained wireless band width. The configuration of sensor nodes would frequently change in terms of position, reach ability, power availability etc. As the nodes interact with physical environments they would experience a significance range of task dynamics. Node mobility, node failures in establishing a link with neighbour node, environmental obstruction cause a high degree of dynamics in WSNs. these include frequent network topology changes and network partitions. WSNs will exist with the plenty of nodes per user. At such heavy quantity, nodes may be in accessible, since they are incorporated in physically structures or thrown into hostile terrain. Thus for a effective system, it must provide self configuration functionality. In this paper, we compute the Euclidian distance between pair of nodes and subsequently decided the link to be weak or strong if the distance exceeds a threshold. Further the method find out the head node with maximum strong links in the network. This information can be utilised to select a cluster head and to update the routing table for using the strong links for transmission. This will enable the WSN to minimise the transmission failures and improve the stability and longevity of the network. The paper is organised as follows. Section 2 outlines the related work and the system model. In Section 3 we present the proposed algorithm for finding the strong and weak links. Section 4 deals with simulation and results. Finally, Section 5 presents the concluding remarks. II. RELATED WORK Woo et al [7] investigated reliable multi-hop routing in WSNs. Their recommendation includes the use of PRR as link quality metric for link estimators, interpreting the minimum data transmission route as link availability indicator and using the number of transmission from source to destination as a routing metric. in this they didn’t evaluate the number of strong links required for transmission can be optimized in dynamic network configuration. Woo and D.Culler [8] examined their study for settling time for good and bad links among the nodes. it does not perform for well links for intermediate quality[9].Sun et al[10]considers the WSN network is a homogenous network density in terms of links is distributed uniformly throughout the area. But practically a dynamic WSN is ad hoc in nature can not be homogenous rather is heterogeneous. So in a heterogeneous dynamic network density is not uniformly distributed which leads the failure of transmission of packets from the differential part of the area where no maximum strong links are there. That is why it needs to find out the more links per node to forward the message. 62
  • 2. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration III. SYSTEM MODEL We model the wire-less ad hoc network of n nodes deployed in 2-D (x & y polar co-ordinate.) area, where no two nodes are in the same position. We assume each node is aware of its own position through of GPS device. We further assume the existence of location management services so that each node is aware of the positions of other nodes. Finally we assume the nodes may be mobile i.e. positions of nodes may change over time in each reconfiguration as in a random work model. We assume the dimension of 2-D area as L×L where L is the length of the area. We consider the model in which there are two types of links being established among nodes either strong link on weak links or strong and weak links both. We assume two threshold range values as RTH ( S ) , RTH ( w) representing the ranges for strong link and weak link respectively. We consider two nodes in 2-D plane, denoted by N i , N j i, j  n i  j . In order to find out the distance between any two consecutive nodes N i , N j , we take the parameter DIST which indicates the Euclidean distance between any two consecutive node Ni , N j defined as, DIST  xNi   xN j 2  yNi   yN j 2 (1) xN i , y  N i  represents position coordinates of node N i and xN j , y N j  represents position coordinates of node Nj. Algorithm 1: Finding the distance between the nodes Find_DIST ( N i , N j ) For each node N i i, n { x N i  =random value(1,n)*L y  N i  =random value(1,n)*L }  DIST  sqrt xN i   xN j   yN i   yN j  2 2  Return(DIST) Next Comparing the distance value DIST to the threshold ranges RTH ( S ) & RTH (w) . Comparision-1: For DIST  RTH (S ) , link being established is strong one. Comparision-2: For RTH ( S )  DIST  RTH (W ) , link being established is weak one. Further if DIST  RTH (w) , then no link should be there between nodes N i and N j . Nj Nj RTH ( S )  DIST  RTH (W ) DIST  RTH (S ) Strong link Weak link Ni Ni Fig. 1: Strong link and weak link between nodes 63
  • 3. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration We take two matrices as MSL and MWL for nodes having dtrong links and weak links respectively. The cells of matrices are assigned to 1 if there is a link between the nodes N i and N j . Otherwise it is infinite for no link. MSL MWL Ni Ni N 1 N 2 N 3 ………..… N 100 N 1 N 2 N 3 ………..… N 100 N1 N1 Nj N2 Nj N2 N3 N3 . . . . N 100 N 100 Fig. 2: Matrix representation of strong and weak links Algorithm 2: Link establishment algorithm Link_establishment( N i , N j ) For i=1 to n & j=1 to n ,i≠j { if DIST  RTH (S ) MSL[i][j]=1; else MSL[i][j]=inf; if RTH ( S )  DIST  RTH (W ) WSL[i][j]=1; else WSL[i][j]=inf; } Such an algorithm establishes the strong links and weak links among node N i and N j . After establishment of links, a fully ad hoc network is deployed. The total strong links are counted for each individual node in the network for a particular configuration. Further, we take one array A contains the node indices having strong links. Then searching the node N k , k  n in the matrix A which has largest number of strong links. If k=1, then there is only one node N k , k n has maximum strong links in that configuration. If k>1, then there are a number of nodes having maximum strong links. The node(s) are considered the head in those ad hoc networks. These head nodes can collect the information from all other nodes and send it to the sink node, so that at a particular round of network deployment these nodes may active for larger period having the sufficient energy consideration without engaging the other nodes for trying to forwarding messages to the sink node. A total of five rounds are considered for the network simulation. These rounds are based on the time. As round m is in time t, round m+1 in time t  t and round m+2 in time t  2t so on. Now our job is to find out the difference of number of strong links in successive rounds should be incremental order so that we can find more head nodes. Therefore we take the following parameters TSL m : Total number of strong links in mth round. TSLm1 : Total number of strong links in (m+1)th round. SL : Difference of total number in strong links in mth and (m+1)th round. 64
  • 4. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration So SL  TSL m 1  TSL m Similarly TWL m : Total number of weak links in mth round. TWL m 1 : Total number of weak links in (m+1)th round. WL : Difference of total number in weak links in mth and (m+1)th round. So WL  TWL m 1  TWL m For each round, if SL  WL , then the re-configuration of network is effective to establish more strong links. IV. PROPOSED ALGORITHM We adopt an algorithm to find the maximum number of strong links in comparison to weak links. As a result head nodes are selected and make an independent decision to forward the message to the sink node. Particularly for two random nodes N i , N j , i , j  n, i  j 1. Find_DIST ( N i , N j ) 2. Accept two threshold range values RTH ( S ) , RTH ( w) for establishment of strong link and weak links. 3 Establishing the links among the node through Link_ establishment ( N i , N j ) 4. Create two matrices A & B contains the indices of nodes having strong links and weak links. 5. Find the node Nk , k  n in matrix A having highest number of strong links. 6. If k=1 then select Nk as the head node else if k>1 then take sets of nodes N k1 , N k 2 , N k 3 …and randomly select one from set as head. 7. Find total number of strong links and weak links as TSL and TWL. 8. Compute the percentage of difference in the number of strong links and weak links in the successive rounds. V. SIMULATION RESULTS AND DISCUSSIONS MATLAB 7.0 was used for evaluation of the performance of our approach. The simulation study modeled a network of mobile nodes placed randomly with an area 700m×700m in which 100 nodes are placed. The mobility model is random-way point where nodes are randomly selected for positioning. In each simulation round, each node chooses the direction, speed and distance of move based on random distribution and also then computer its next position p(x,y) and time instant t of reaching the position. Each node has some physical properties, radio ranges of 125m and 175m for establishing strong links and weak links. A node computes its neighbour hood in each round thus generating the links. Performance results We have simulated 100 mobile nodes for wireless ad hoc networks with respect to random mobility. The model studies with respect to the following performance metrics  Number of strong links and weak links  Selection of head nodes  Difference of number of strong links with respect to weak links in different rounds The Figures 3 & 4 present the different configuration of the deployed network in the random model in different rounds. The Figure 5 describes more number of strong links achieved by the network in successive rounds. It is observed that the network becomes more stable in terms of more strong links establishment. The Figure 6 describes the more percentage of difference of strong links than the percentage of difference of weak links in several rounds.it is observed that in each re- configuration of network after time duration t , the possibility of establishment of strong links can be more which leads to maintain the stability of ad hoc network. 65
  • 5. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration Deployment of wsn for 1st round(100 nodes) 700 49 37 73 47 82 node 6 12 41 52 89 69 94 74 20 strong link 600 46 100 10 weak link 14 65 81 50 4363 45 98 22 83 90 500 54 53 80 27 1188 26 42 97 92 35 48 66 1 24 57 400 5 31 29 25 in meter 19 17 4 68 36 58 23 79 59 38 96 300 34 61 91 15 7 55 51 18 84 28 33 56 200 95 71 3 78 39 40 16 70 44 75 30 2 87 8 100 93 76 62 86 67 13 72 985 77 60 21 99 64 32 0 0 100 200 300 400 500 600 700 in meter Figure-3: Network reconfiguration after first round Deployment of wsn for 2nd round(100 nodes) 700 1 22 68 30 66 86 67 61 54 21 node 41 27 79 75 88 strong link 4058 24 600 20 19 43 weak link 16 63 65 69 9 39 33 42 37 500 82 78 5 45 97 18 84 11 50 32 14 72 83 400 92 60 in meter 81 98 35 6 23 59 1091 31 300 26 80 13 55 70 25 64 85 46 2 99 7 73 44 34 200 12 38 17 76 4 53 100 15 87 48 56 100 8 29 96 95 77 52 36 57 28 49 3 89 93 51 71 94 47 62 90 0 74 0 100 200 300 400 500 600 700 in meter Figure-4: Network reconfiguration after second round 66
  • 6. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration Number of strong and weak links per different rounds 420 strong link 410 weak link 400 390 Links in the Network 380 370 360 350 340 330 1 1.5 2 2.5 3 3.5 4 4.5 5 Rounds Figure-5: Strong and weak link characteristics at different rounds Change of percentage of links per different rounds 30 % of strong link % of weak link 20 Change in percentage of links 10 0 -10 -20 -30 1 2 3 4 5 Rounds Figure-6: Percentage of link variations at different rounds VI. CONCLUSION In this paper, we have proposed a robust dynamic ad hoc wireless network with different configurations based on dynamic environment in which specific nodes acquire largest strong links in the network. Which is further selected as head nodes and these head nodes are responsible for sending the information collected from the network to the sink. In the future work we will consider the energy consumption of the node and cost of transmission of message to achieve the QOS of the network. Besides we try to involve our approach in real world. 67
  • 7. Strong Link Establishment in Wireless Ad hoc Network using Position based Re-configuration REFERENCES [1]. Paul Grace at-al-Dynamic reconfiguration in sensor middleware-midsens 06-Nov-27. [2]. Sameer Tilak et-al-a taxonomy of wireless micro sensor network models-mobile computing and communication review, volume- 6-number-2. [3]. I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci , A survey Wireless sensor networks ,Computer Networks 38 (2002) 393–422. [4]. Raghavendra V. Kulkarni, Anna Förster, Member and Ganesh Kumar Venayagamoorthy- Computational Intelligence in Wireless Sensor Networks: A Survey-IEEE communications surveys & tutorials, vol. 13, no. 1, first quarter 2011 [5]. Biswanath Dey Sukumar Nandi. Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network[C]. In : Distributed Computing and Networking, 8th International Conference, ICDCN 2006. 534-54 [6]. Dayang Sun,Yanheng liu,Aimin wang, Bin Ge Research on Service-oriented Lifetime and Network Density in WSN In:IEEE 9th International Conference for Young Computer Scientists 2008, 439-444. [7]. A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In SenSys ’03, 2003. [8]. A.Woo and D. Culler. Evaluation of efficient link reliability estimators for low-power wireless networks. Technical Report UCB/CSD-03- 1270, EECS Department, University of California, Berkeley, 2003. [9]. A. Becher, O. Landsiedel, G. Kunz, and K. Wehrle. Towards shortterm link quality estimation. In Hot Emnets, 2008. [10]. Dayang Sun,Yanheng liu,Aimin wang, Bin Ge Research on Service-oriented Lifetime andNetwork Density in WSN In:IEEE 9th International Conference for Young Computer Scientists 2008, 439-444 68