This document summarizes and compares various hole healing techniques in wireless sensor networks. It discusses hole selection methods such as random, maximum size, nearest distance, travelling salesman problem, and weighted. The weighted method considers hole angle, distance, and depth to assign priority. It then reviews hole healing processes including Voronoi diagram based, Delaunay's triangulation, and direction adjustment approaches. Experimental results show the weighted method improves both coverage and connectivity while the travelling salesman method achieves near complete coverage with additional nodes.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Hybrid Filtering Technique for Random Valued Impulse Noise Elimination on D...IDES Editor
This document summarizes a research paper that proposes a hybrid filtering technique combining an Asymmetric Trimmed Median Filter (ATMF) and an Adaptive Neuro-Fuzzy Inference System (ANFIS) to remove random valued impulse noise from digital images. The technique performs noise removal in two steps: first using ATMF, then combining the ATMF output with the original noisy image as inputs to an ANFIS network to further refine the image. The ANFIS network is trained on three test images to optimize its parameters for improved noise removal while preserving edges and details. Simulation results showed the proposed hybrid filter performed better than other filters in terms of image denoising and detail preservation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
This document summarizes research on coverage problems in wireless sensor networks in the presence of obstacles. It begins with definitions of key concepts related to sensor network coverage, including different types of coverage problems (point, area, barrier), deployment strategies (deterministic, random), coverage degrees, sensing models, and obstacles. It then reviews several approaches that have been proposed to address coverage problems when obstacles are present in the sensor field, including using computational geometry concepts to handle obstacles. The document concludes by noting that more work is still needed to fully address coverage problems in realistic environments with obstacles.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document describes a new methodology for improving the accuracy of fingerprint verification systems. It proposes detecting singular points like core and delta points, and indexing templates based on the occurrence of delta points relative to the core point. Experiments on the FVC2006 database show the proposed method achieves higher recognition rates and lower false acceptance and rejection rates compared to existing minutiae-based matching techniques, especially for distorted images. It provides a concise way to represent templates and allows for faster matching by first comparing singular point information before minutiae points.
Localization in wireless sensor networks (WSNs) is one of the most important fundamental requisite that needs to be resolved efficiently as it plays a significant role in many applications namely environmental monitoring, routing and target tracking which is all location dependent. The main idea of localization is that some deployed nodes with known coordinates termed as anchor nodes transmit beacons with their coordinates in order to help the other nodes in the sensing field to localize themselves. Broadly there are two types of localization methods used for calculating positions namely the range-based and range-free methods. Initially, a range-free localization algorithm namely, Mobile Anchor Positioning - Mobile Anchor & Neighbor (MAP-M&N) is applied. In this algorithm, the sensor nodes use the location information of beacon packets of mobile anchor nodes as well as the location packets of neighboring nodes to improve the accuracy in localization of the sensor nodes. In this paper, the proposed optimization approach is Artificial Bee Colony (ABC) algorithm which is incorporated with MAP-M&N to further improve the accuracy in positioning the sensor nodes. The objective of this work is to compare the performance of MAP-ABC approach with regard to MAP-M&N algorithm. Root Mean Square Error (RMSE) is the performance metric to compare between the two approaches namely, MAP-M&N and MAP-ABC algorithms. A study on average localization error and comparison between the two approaches namely, MAP-M&N and MAP-ABC has been done. Simulation results reveal that Artificial Bee Colony approach used along with MAP-M&N outperforms by minimizing error in when compared to using only MAP-M&N approach for localization.
Segmentation and Classification of MRI Brain TumorIRJET Journal
This document presents a study comparing two techniques for detecting brain tumors in MRI images: level set segmentation and K-means segmentation. Features are extracted from the segmented tumors using discrete wavelet transform and gray level co-occurrence matrix. The features are then classified as benign or malignant using a support vector machine. The level set method and K-means method are evaluated based on accuracy, sensitivity, and specificity on a dataset of 41 MRI brain images. The level set method achieved slightly higher accuracy of 94.12% compared to the K-means method.
This document presents a new approach for fingerprint matching called the Minutia Cylindrical Code (MCC) approach. It involves extracting minutia points from fingerprint images, then generating a code for each fingerprint based on the local structure and spatial relationships of minutia points within a cylindrical neighborhood. MCC codes make the fingerprints invariant to scale and rotation. The approach is tested on a database of 200 fingerprints and achieves false acceptance ratios between 6-13% and false rejection ratios below 0.12% depending on the threshold used. The MCC approach performs fingerprint matching efficiently while maintaining accuracy even when fingerprints are rotated or scaled.
Signal classification of second order cyclostationarity signals using bt scld...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Automatic image slice marking propagation on segmentation of dental CBCTTELKOMNIKA JOURNAL
Cone Beam Computed Tomography (CBCT) is a radiographic technique that has been commonly
used to help doctors provide more detailed information for further examination. Teeth segmentation on
CBCT image has many challenges such as low contrast, blurred teeth boundary and irregular contour of
the teeth. In addition, because the CBCT produces a lot of slices, in which the neighboring slices have
related information, the semi-automatic image segmentation method, that needs manual marking from
the user, becomes exhaustive and inefficient. In this research, we propose an automatic image slice
marking propagation on segmentation of dental CBCT. The segmentation result of the first slice will
be propagated as the marker for the segmentation of the next slices. The experimental results show that
the proposed method is successful in segmenting the teeth on CBCT images with the value of
Misclassification Error (ME) and Relative Foreground Area Error (RAE) of 0.112 and 0.478, respectively.
Utilization of Super Pixel Based Microarray Image Segmentationijtsrd
In the division of PC vision pictures, Super pixels are go probably as key part from 10 years prior. There are various counts and methodology to separate the Super pixels anyway whole all of them the best super pixel looking at strategy is Simple Linear Iterative Clustering SLIC have come to pivot continuously recently. The concentrating of small scale group quality verbalization from MRI imaging is more useful to perceive tumors or some other dangerous development contaminations, so the fundamental DNA cDNA microarray is a grounded device for analyzing the same. The division of microarray pictures is the essential development in a microarray assessment. In this paper, we proposed a figuring to dividing the cDNA small show picture using Simple Linear Iterative Clustering SLIC based Self Organizing Maps SOM method. In any case, the proposed figuring is taken up a moving task to look at the bad quality of pictures in addition. There are two phases to separate the image, introductory, a pre setting up the applied picture to diminish fuss levels and second, to piece the image using SLIC based SOM approach. Mr. Davu Manikanta | Mr. Parasurama N | K Keerthi "Utilization of Super Pixel Based Microarray Image Segmentation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46274.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/46274/utilization-of-super-pixel-based-microarray-image-segmentation/mr-davu-manikanta
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNijasuc
Ensuring connectivity in Wireless Sensor Networks (WSN) is a challenging issue, especially in hazardous
areas (like battlefield). Many applications of WSN require an important level of connectivity in the network
to detect a given event (like detection Intrusion) and forward it to the ”sink” node in order to alert users.
For these risky areas the deterministic deployment is not usually guaranteed and the network is composed
by a set of disconnected Islands. We present in our work two strategies to relocate sensors in order to
improve the connectivity using mobile Robots. These two solutions are called Multi-Robot Island-based
Relocation (MRIBR) and Multi-Robot Grid-Based Island-based Relocation (MRGIR). Through several
simulations, we show that MRGIR outperforms MRIBR. Our study can be used especially to make a tradeoff
between the number of deployed sensors and the numbers of the used mobile robots, according to the
quality needed for the application.
Modeling the Adaption Rule in Contextaware Systemsijasuc
Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing
systems. Each context-aware application has its own set of behaviors to react to context modifications. This
paper is concerned with the context modeling and the development methodology for context-aware systems.
We proposed a rule-based approach and use the adaption tree to model the adaption rule of context-aware
systems. We illustrate this idea in an arithmetic game application.
Introducing ENMAT V2 Beta
ENMAT (Energy Monitoring & Targeting) is a web based Energy Monitoring and Targeting system. It presents energy management data in a way that is relevant, meaningful and useful to users.
ORGANIC USER INTERFACES: FRAMEWORK, INTERACTION MODEL AND DESIGN GUIDELINESijasuc
The document proposes an organic user interface (OUI) framework and interaction model called SMaG (Speech Manipulation air-Gesture).
It divides the control module of the tangible user interface framework into tangible and intangible controls. Tangible controls involve direct contact like touch, while intangible controls include speech and gestures.
The paper then introduces the SMaG model, which categorizes OUI input techniques. Based on this model, the paper provides design guidelines for OUIs with principles for look, feel, and design. The guidelines consider the best and worst uses of each SMaG technique.
This document analyzes the impacts of various structural factors on energy consumption in cluster-based wireless sensor networks through extensive simulations. It finds that the best performance for prolonging network lifetime is achieved by locating a sufficient number of sinks around the network area rather than having a single sink located at the edge of the topology. The document discusses clustering approaches for wireless sensor networks and three models for electing cluster heads. It also outlines the experimental architecture and parameters used in the simulations.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
Impact of the temperature and humidity variations on link quality of xm1000 m...ijasuc
The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
A W ARNING S YSTEM F OR O VERSPEED A T T HE C ORNER U SING V ISIBLE L...ijasuc
When a car enters a
corner
with
over speed,
it rise
s
the accident risk higher
.
To warn the risk and urging
the caution to drivers, many of the accident
-
prone corners have warning rights. The driver can decelerate
the car smoothly and pass through the
corner safety by those
devices.
However
, appropriate speed for each
corner is differ
ent by curvature of the corner and characteristics of the vehicle.
The driver
has
to suppose
the safe speed for every corner only by experience,
usually. Of
co
urse too much slow causes traffic jam.
Especially at the first road in the first place for the dr
iver, it is difficult to suppose the curvatures of the
corners. Then
, we propose a visible light communication system so that the warning lights in the corner
send appropriate warning information. V
isible light communication transmits
a signal by blinking the light.
One of the characteristics of
visible light communication is that it can use
existing
lighting equipment as a
transmitter.
In our system, we
can distribute the
warning
information to the driver using the visible light
commun
ication.
Though
the curvature(R:radious) of the corner does not change, the speed of each vehicle
to approach the corner always to different.
Focusing the distance from the corner to the car, we consider a
communication system to send different kind of inf
ormation according to that
distance.
If
the distance is
enough long, the driver has a plenty of time to decelerate the
vehicle. The
more the distance becomes short,
the more the driver is required rapid
deceleration. Therefore
, to distribute the appropriat
e warning
information to the driver, dividing the distance from the corner into some areas, we make the system to send
different information in each
area. Generally
in communication system, modulation primarily changes the
amplitude, phase or
frequency. In
visible light communication, change of the amplitude changes the
brightness, which causes flickering that burdens the
drivers. Therefore
we cannot use amplitude based
modulation.
Next
we consider the varying the
phase.
Unfortunately
, it is difficult for t
he receiver using
photodiode or phototransistor to read the difference of the phase of the signals, because the frequency of
the light is very high
in visible light communication.
Then we employ 'symbol length' with the Pulse
Position
Modulation (
PPM).In our method, brightness does not change when the symbol length is
changed.
We
investigate the system performance by changing the communication
speed. Short
symbol length in high
frequency is sensitive and vulnerable to noise, instead of low frequenc
y with strong against
noise.
Using
this characteristic of symbol length modulation, dif
Ambiences on the-fly usage of available resources through personal devicesijasuc
In smart spaces such as smart homes, computation is
embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provid
e a pool of available resources which the user can
take
advantage, interacting and creating a friendly envi
ronment. The inherent composability of these system
s
and other unique characteristics such as low-cost e
nergy, simplicity in module programming, and even
their small size, make them a suitable candidate fo
r dynamic and adaptive ambient systems. This resear
ch
work focuses on what is defined as an “ambience”, a
space with a user-defined set of computational
devices. A smart-home is modeled as a collection of
ambiences, where every ambience is capable of
providing a pool of available resources to the user
. In turn, the user is supposed to carry one or sev
eral
personal devices able to interact with the ambience
s, taking advantage of his inherent mobility. In th
is way,
the whole system can benefit from resources discove
red in the spatial proximity. A software architectu
re is
designed, which is based on the implementation of l
ow-cost algorithms able to detect and update the sy
stem
when changes in an ambience occur. Ambience middlew
are implementation works in a wide range of
architectures and OSs, while showing a negligible o
verhead in the time to perform the basic output
operations.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
A new approach for area coverage problem in wireless sensor networks with hyb...ijmnct
One of the most important and basic problems in Wireless Sensor Networks (WSNs) is the coverage
problem. The coverage problem in WSNs causes the security environments is supervised by the existing
sensors in the networks suitably. The importance of coverage in WSNs is so important that is one of the
quality of service parameters. If the sensors do not suitably cover the physical environments they will not
be enough efficient n supervision and controlling. The coverage in WSNs must be in a way that the energy
of the sensors would be the least to increase the lifetime of the network. The other reasons which had
increase the importance of the problem are the topologic changes of the network which are done by the
damage or deletion of some of the sensors and in some cases the network must not lose its coverage. SO, in
this paper we have hybrid the Particle Swarm Optimization (PSO) and Differential Evolution (DE)
algorithms which are the Meta-Heuristic algorithms and have analyzed the area coverage problem in
WSNs. Also a PSO algorithm is implemented to compare the efficiency of the hybrid model in the same
situation. The results of the experiments show that the hybrid algorithm has made more increase in the
lifetime of the network and more optimized use of the energy of the sensors by optimizing the coverage of
the sensors in comparison to PSO.
WSN performance based on node placement by genetic algorithm at smart home en...TELKOMNIKA JOURNAL
Wireless sensor connectivity is one of several factors that determines the communication reliability of each node. The placement of the node depends on the area that covered by wireless coverage area, so the node placement should be optimally placed. But the other aspect is the sensor coverage area. Sensor coverage area sometimes could be different with wireless sensor coverage area. Based on that situation, it needs to optimize that situation. Genetic Algorithm is an algorithm that utilizes a heuristic approach that uses biological mechanism evolution. It used to evolution the best position of Sensor Node based on Wireless and Sensor coverage area. After the position of each node generated by Genetic Algorithm, it still needs to evaluate the wireless sensor node performance. The performance indicates that the genetic algorithm can be used to determine sensor node placement in the smart home environment. The smart home environment used to monitor event at the house such as wildfire. In this research used Quality of Services (QoS) to measure wireless sensor performance. The experimental testing scenario will be used to place several nodes that generated. The QoS performed systems reliability that produced based on 3, 4 and 5 testing nodes, the minimum and maximum of each: delay is 6.21 and 8.74 milliseconds, jitter is 0.11 and 1.59 Hz and throughput is 68.83 and 90.49 bps. Based on ETSI classification, the performance of sensor node placement is Good and acceptable in real-time systems.
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Estimating coverage holes and enhancing coverage in mixed sensor networks ormarwaeng
The document presents a collaborative algorithm (COVEN) for enhancing area coverage in mixed static and mobile sensor networks. It is a two-step process: 1) Using Voronoi diagrams, the static nodes deterministically estimate the exact amount of coverage holes after random deployment. 2) The static nodes then collaborate to estimate the number and optimal positions of additional mobile nodes needed to maximize coverage. Through simulation, COVEN aims to achieve a tradeoff between deployment cost and percentage of area covered.
The document introduces a technique for joint neighbor discovery and time-of-arrival estimation in wireless sensor networks using orthogonal frequency-division multiple access (OFDMA). Each sensor node is allocated at least one orthogonal sub-carrier as its signature to respond to requests from target nodes. The target node can detect the transmitted signatures and their corresponding delays using the orthogonality across sub-carriers. This avoids multiple transmissions required by traditional techniques, improving energy efficiency. The performance of neighbor discovery and time-of-arrival estimation are analyzed theoretically and through simulations over different channel conditions.
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous NetworkIJCNCJournal
Nowadays, there is a rapid increase in the population throughout the globe and causing more urbanization in the landscape. Advanced medical monitoring and disaster relief require more reliable, long-range communication, feasible, and high connectivity with increased accuracy. The Internet of Things (IoT) has revolutionized the way we interact with technology and has led to the emergence of a new class of interconnected devices. These devices rely on efficient and reliable networking to communicate with each other and
with the outside world. The proposed work presents an IoT-based mobile adaptive routing algorithm (IOT-MARA) that is designed to work in a ubiquitous network, where a large number of devices are connected and can move around. The proposed algorithm is an adaptive algorithm that can adjust its routing decisions based on the current state of the network and the devices that are connected to it. The algorithm considers the mobility of devices and the dynamic nature of the network to select the most efficient path for data to travel. It also aims to minimize network congestion and improve overall network performance. Simulations are used to evaluate the IOT-MARA algorithm and the results show
that it outperforms existing routing algorithms in terms of network throughput, delay, and energy consumption. The proposed algorithm is helpful in the field of ubiquitous
networking because it addresses the challenges of mobility and dynamic network conditions during a fire mishap scenario. This research has implications for the design and
deployment of Ubiquitous Networks for the development of future communication systems.
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORKIJCNCJournal
Nowadays, there is a rapid increase in the population throughout the globe and causing more urbanization
in the landscape. Advanced medical monitoring and disaster relief require more reliable, long-range
communication, feasible, and high connectivity with increased accuracy. The Internet of Things (IoT) has
revolutionized the way we interact with technology and has led to the emergence of a new class of
interconnected devices. These devices rely on efficient and reliable networking to communicate with each
other and with the outside world. The proposed work presents an IoT-based mobile adaptive routing
algorithm (IOT-MARA) that is designed to work in a ubiquitous network, where a large number of devices
are connected and can move around. The proposed algorithm is an adaptive algorithm that can adjust its
routing decisions based on the current state of the network and the devices that are connected to it. The
algorithm considers the mobility of devices and the dynamic nature of the network to select the most
efficient path for data to travel. It also aims to minimize network congestion and improve overall network
performance. Simulations are used to evaluate the IOT-MARA algorithm and the results show that it
outperforms existing routing algorithms in terms of network throughput, delay, and energy consumption.
The proposed algorithm is helpful in the field of ubiquitous networking because it addresses the challenges
of mobility and dynamic network conditions during a fire mishap scenario. This research has implications
for the design and deployment of Ubiquitous Networks for the development of future communication
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
This document summarizes cooperative spectrum sensing using energy detection in cognitive radio networks. It discusses how cooperative sensing can improve detection performance by exploiting spatial diversity among cognitive radio users. The key points are:
1. Cooperative sensing allows cognitive radio users to share sensing information to make a combined decision that is more accurate than individual decisions. This mitigates issues like multipath fading and shadowing.
2. Energy detection is commonly used for cooperative sensing due to its simplicity. However, its performance depends on noise power uncertainty. Cooperative sensing addresses this by fusing observations from multiple spatially distributed users.
3. The document also discusses challenges in spectrum sensing like hardware requirements, hidden primary users, and detecting spread spectrum
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
This document summarizes cooperative spectrum sensing using energy detection in cognitive radio networks. It discusses how cooperative sensing can improve detection performance by exploiting spatial diversity among cognitive radio users. The key points are:
1. Cooperative sensing allows cognitive radio users to share sensing information to make a combined decision that is more accurate than individual decisions. This mitigates issues like multipath fading and shadowing.
2. Energy detection is commonly used for cooperative spectrum sensing due to its simplicity. However, its performance depends on noise power uncertainty.
3. Cooperative sensing involves local sensing by each cognitive radio, reporting results to a fusion center, and data fusion to make a combined decision. Centralized, distributed, and relay-
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
In wireless sensor and actor networks (WSAN), the
sensor nodes have a limitation on lifetime as they are equipped
with non-chargeable batteries. The failure probability of the
sensor node is influenced by factors like electrical dynamism,
hardware disasters, communication inaccuracy and undesired
environment situations, etc. Thus, fault tolerant is a very
important and critical factor in such networks. Fault tolerance
also ensures that a system is available for use without any
interruption in the presence of faults. In this paper an
improved fault tolerance scheme is proposed to find the
probability of correctly identifying a faulty node for three
different types of faults based on normal bias. The nodes fault
status is declared based on its confidence score that depends
on the threshold valve. The aim is to find the Correct
Recognition Rate (CRR) and the False Fear Rate (FFR) with
respect to the different error probability (pe) introduced. The
techniques, neighboring nodes, fault calculations, range and
CRR for existing algorithm and proposed algorithm is also
presented.
1) The document proposes a new network construction method called k-SBCCS Protocol for strong k-barrier coverage using wireless sensor nodes for border security systems.
2) It aims to prolong network lifetime by establishing a balanced energy usage across nodes. The k-SBCCS Protocol uses a divide-and-conquer approach to construct local barriers in segmented regions and coordinate barrier coverage across segments.
3) Simulation results show that the k-SBCCS Protocol can reduce communication overhead and computation costs compared to centralized algorithms, and strengthens local barrier coverage through coordinated barriers across segments.
This document describes a simulation program that models and analyzes the performance of local area networks (LANs) using different topologies, including ring, star, double ring, and standby ring. The simulation uses a technique called register insertion to model message transmission between stations on the network. It tracks various statistical metrics like message throughput, errors, and delays. The goal is to evaluate which topology performs best under different traffic loads and noise conditions. The simulation is implemented as a web application to allow users to configure and run trials of the model.
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
This document summarizes different spectrum sensing techniques for cognitive radio networks. It discusses cooperative detection techniques which involve multiple cognitive radios sharing sensing information, and non-cooperative detection where radios act independently. Specific techniques covered include centralized, distributed, and relay-assisted cooperative sensing as well as blind sensing, energy detection, and eigenvalue-based sensing. The document concludes that cooperative sensing performs better than non-cooperative sensing, especially for low signal-to-noise ratio primary user signals.
1) The document discusses implementing mobile target detection in wireless sensor networks. It focuses on using techniques like Tabu Search heuristics and Sequential Probability Ratio Tests to detect mobile targets and replicas.
2) A key challenge discussed is detecting when a mobile node has been replicated, which the proposed approach attempts to do using SPRT to analyze node speeds and determine if two nodes with the same identity are present.
3) The paper also examines using game theory approaches to maximize network lifetime and weighted intrusion detection in wireless sensor networks for mobile target detection. Experimental results show the SPRT-based replica detection works rapidly with no false positives or negatives.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASijassn
Wireless sensor network localization plays an important role in mobile computing. Moreover, Sensor
nodes are often deployed non-uniformly in anisotropic WSNs with holes in various applications such as
monitoring area terrain. The existence of holes will invariably affect the Euclidean distances between
nodes and result in low accuracy of node localization. The proposed algorithm is suitable for four different
topologies, including the semi-C-shape topology, the O-shape topology, the multiple O-shape topology and
the concave-shape topology and is exceedingly accurate and efficient comparing with state-of-the-art
methods in anisotropic WSNs with holes. Our results show that the error in horizontal plane is less than
0.25 m while in the Z-axis is less than 0.5 m.
This document proposes an improved method for detecting sensor node failures in wireless sensor networks. It begins by discussing how sensor node failures can degrade network quality of service and the need to identify and replace faulty nodes. It then reviews existing methods for fault detection and identifies issues with those approaches. The document proposes measuring the round-trip time of data traveling round-trip paths through the network and comparing it to a threshold. Nodes common to paths with delays exceeding the threshold would be identified as faulty. Details of implementing this round-trip time and path based approach are provided. Related works applying other fault detection methods are also summarized.
This document summarizes a research paper that proposes using a genetic algorithm to efficiently cluster wireless sensor nodes. The genetic algorithm aims to minimize the total communication distance between sensors and the base station in order to prolong the network lifetime. Simulation results showed that the genetic algorithm can quickly find good clustering solutions that reduce energy consumption compared to previous clustering methods. The full paper provides details on wireless sensor networks, related clustering algorithms, genetic algorithms, and the proposed genetic algorithm-based clustering method.
Similar to REVIEW OVER HOLE HEALING TECHNIQUES IN WIRELESS SENSOR NETWORKS (20)
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc
Six months into 2024, and it is clear the privacy ecosystem takes no days off!! Regulators continue to implement and enforce new regulations, businesses strive to meet requirements, and technology advances like AI have privacy professionals scratching their heads about managing risk.
What can we learn about the first six months of data privacy trends and events in 2024? How should this inform your privacy program management for the rest of the year?
Join TrustArc, Goodwin, and Snyk privacy experts as they discuss the changes we’ve seen in the first half of 2024 and gain insight into the concrete, actionable steps you can take to up-level your privacy program in the second half of the year.
This webinar will review:
- Key changes to privacy regulations in 2024
- Key themes in privacy and data governance in 2024
- How to maximize your privacy program in the second half of 2024
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
REVIEW OVER HOLE HEALING TECHNIQUES IN WIRELESS SENSOR NETWORKS
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
DOI : 10.5121/ijasuc.2016.7101 1
REVIEW OVER HOLE HEALING TECHNIQUES
IN WIRELESS SENSOR NETWORKS
Latesh Mehta and Manik Gupta
Department of Computer Science,
Chitkara University, Himachal Pradesh, India
ABSTRACT
Improving coverage and connectivity is a very important issue in wireless sensor networks. The unattended
or uncovered region in a sensing field is called a coverage hole. A coverage hole impacts the performance
of the wireless sensor network, disconnects the network topology and causes delay in data transmission.
These coverage holes can be healed randomly or each hole can be assigned a priority value for healing. In
this paper we will discuss about various hole healing strategies and their mechanisms.
KEYWORDS
Connectivity, Coverage, Coverage Holes, Hole Healing, Wireless Sensor Network.
1. INTRODUCTION
A wireless sensor consists of a sensing component, on-board processing, communication, and
storage unit. Many sensors cooperatively monitoring a large physical environment, form a
wireless sensor network (WSN)[7]. The wireless sensor networks have different usage in various
fields and applications like monitor and protect civil infrastructure, underwater monitoring[16],
monitor large geographic areas, volcano monitoring, collecting structural health information etc.
In [10] these applications are classified into monitoring and tracking applications e.g. health and
wellness monitoring, power monitoring, inventory location monitoring, tracking objects, animals,
humans, and vehicles. Sometimes, sensors are deployed in very remote and inaccessible areas;
therefore the task of maintaining the coverage and connectivity becomes a major issue in WSN.
The uncovered region in the target sensing field is considered as a coverage hole. Coverage holes
can be introduced as a result of a node failure or initial deployment. Fig.1(a) shows a 2-
dimentional image of a field which shows coverage holes introduced as a result of initial
deployment. Fig. 1(b) shows coverage holes in a field introduced as a result of node failure.
(a) (b)
Figure 1. An example of coverage holes in a target sensing field. (a) 2-dimentional image showing
coverage holes as a result of initial deployment. The white area in the graph shows the uncovered region in
the field.[4] (b) Coverage holes as a result of node failure. Hi represents coverage holes in the field.[6]
Sensor nodes must be self-managing[7] and should discover, identify, and react to network
disruptions. To improve the coverage and maintain the network connectivity various strategies are
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
2
proposed in recent years. In energy-constrained sensor networks, these solutions must be
implemented in such a way that they do not incur excessive energy overheads. In [9] coverage
problem is classified into three categories i.e. area coverage, point coverage and barrier coverage.
In PEAS mechanism[11], based on node density detection, duty cycling is used where some
nodes are allowed to sleep and nodes are awakened at random time interval. In [12] unnecessary
sensing work is avoided by detecting redundant nodes and sending them to a sleep state. The
work in [13] compares energy efficiency of the sensor network with fixed sensing range and the
network consisting of nodes with adjustable sensing range. G-MSC [14], a target coverage
algorithm, constructs continuous node sets to cover as many targets in the network. The coverage
algorithm in [15] relies only on 3 hop neighbors for its information. In[17], holes are classified
into 5 types, namely, coverage hole, routing hole, jamming hole, sink/black hole and worm hole.
The study in[17] also discuss detection of hole using voronoi and triangular diagram approach.
All these studies focuses mainly on the hole detection, but we must not forget after hole detection
the next phase i.e. hole healing is also very important. Healing a coverage hole not only improves
coverage but it also improves the connectivity of the network. The complete hole healing process
can be divided into two parts:Hole Selection and Healing Process.
Figure 2. Classification of Hole Selection and Healing Process.
The hole selection process decides which hole should be selected first for healing and the healing
process tells how the selected hole should be healed to ensure maximum coverage and
connectivity. Fig. 2 shows various types of hole selection methods and healing process. In the rest
of the paper section 2 will give details about various hole selection methods, section 3 will
discuss about healing techniques and section 4 will conclude the paper.
2. HOLE SELECTION METHODS
The hole selection process is very important during the network maintenance process. Coverage
holes in a network are of different shape and size. The effect of their presence in the network is
also different and it depends on various factors such as shape and size of the hole, shape and size
of the target sensing field, location of the hole and the sink etc. Based on these factors some holes
affect the coverage, some affects the connectivity and most of them affect both. The hole which is
disturbing network the most, should be selected for healing at the first place. Based on their effect
on coverage and connectivity, holes should be assigned a priority value for healing. In recent
years, researchers have adopted different methods for hole selection. These methods are as
follows:
Hole Healing
Hole Selection Healing Process
Voronoi Diagram Based
Approach
Random
Weighted Method
Travelling Salesman Problem
Method
Maximum Size
Equally Divided Path
Selection
Delaunay’s Triangulation
Triangular Diagram Based
Approach
Direction Adjustment
Sensor Movement with
Direction Adjustment
Nearest Distance
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
3
2.1. Random
The coverage holes are selected on a random basis. This method increases the coverage but it
does not optimize the results. It is not a good method for hole selection.
2.2. Maximum Size
In this method coverage holes are selected based on the size of the hole. The hole larger in size
will have maximum effect on the coverage of the network. Therefore hole with maximum size is
selected for healing process. This method improves coverage but has better impact on
connectivity than random method.
2.3. Nearest Distance
In a wireless sensor network, nodes communicate with the sink through a multihop network. Each
node passes message coming from other node towards the sink. Fig. 3 shows data flow towards
the sink in a wireless sensor network. Here, nodes closer to the sink will have more data to relay
towards the sink. Hence they are more likely to lose their energy as compared to other nodes in
the network and if the hole occurs near the sink due to node energy depletion it will induce a
delay in data transmission because the messages will have to re-route now to reach the sink.
Therefore, the nearest distance method selects holes closer to the sink for healing, to balance the
traffic load and to reduce the delay in data transmission.
Figure 3. The multi-to-one data flow concept.[6]
2.4. Travelling Salesman Problem
There can be different number of holes at different position of time in a wireless sensor network.
The hole healing strategy always aim to cover all the holes present in the network for a given
interval of time. Therefore, in some hole healing techniques the hole selection procedure is
transformed into travelling salesman problem[4]. If the network is using an external source to
deploy nodes such as mobile robot, unmanned aerial vehicle(UAV) or other kind of resource,
then its path is computed using travelling salesman problem in which a shortest path is computed
where every hole is covered only once starting from an origin and returns to its initial position at
last. Fig. 4(a) shows the center coordinates of coverage holes in a target sensing field and fig. 4(b)
shows the optimal path obtained. This method ensures that every hole is covered once within less
time.
(a) Center Coordinates of hole[4] (b) Optimal Path Trajectory[4]
Figure 4. Hole Selection Procedure converted into Travelling Salesman Problem.[4]
2.5. Weighted Method
This is the most effective hole selection methods available so far. This method not only improves
coverage but it also improves the connectivity. Holes present in the network are given some
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
4
priority for healing and their priority is based on three properties of the coverage hole. These
three properties are as follows[6]:
• Hole Angle Metric: Hole angle tells about the width of the hole. In a wireless sensor
network data is relayed from all sides towards the sink as shown earlier in fig. 3. A wider hole
will hinder data flow towards the sink. The effect on the data transmission is directly proportional
to the width of the hole. Therefore, a hole with greater hole angle will have more effect on data
transmission. Fig. 5 shows how to calculate hole angle. In fig. 5 Hi represents hole, Bj represents
the hole border node, Lj is a ray starting at sink and extends towards Bj. The ray Lj is obtained for
every hole border node Bj and its slope is calculated. The hole border node Bj with maximum
slope is represented by Bu and Bj with minimum slope in represented by Bd. The angle between
these two rays [SINK,Bu) and [Sink,Bd), represented by Θ(Hi) is called the hole angle and it is
calculated as[6]:
Here, [SINK,Hi) represents ray starting at sink and extends towards the center of hole.
Figure 5. Calculation of Hole Angle.[6]
Now, the metric of hole angle is given by[6]:
W(Θ(Hi)) = Θ(Hi) / 180o
;
• Distance Metric: This property is similar to the nearest distance method. As discussed in
nearest distance method, nodes closer to the sink have more data to relay. Hence hole closer to the
sink will have greater influence on the data transmission than the same hole located far away
from the sink. Healing a hole located at a greater distance or located at the edge of the field will
only improve coverage and will have very less effect on the connectivity. Therefore, we can say
that the influence on the data transmission is inversely proportional to the distance of the hole
from the sink. The distance of hole from sink is calculated as[6]:
Where di is the distance of the hole from the sink, Hi.x and Hi.y are the x and y coordinates of the
center of the hole, S0.x and S0.y are the x and y coordinates of the sink. Fig. 6 shows different
holes with their distance from the sink.
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
5
Figure 6. Distance between hole and the sink.[6]
Now the distance metric is given by[6]:
W(len(Hi)) = 1 / di ;
• Depth Metric: If a hole area is very large, it will greatly reduce the coverage ratio and
might result in network topology disconnection. To avoid this, the depth metric is considered. It is
defined as the distance between nearest hole boundary node Bnear and farthest hole boundary node
Bfar, as shown in fig. 7.
Figure 7. Calculation of Depth.[6]
To calculate Bnear and Bfar an angle bisector Lc of the hole angle Θ(Hi) is obtained. This angle
bisector Lc makes contact with the hole at two hole boundary nodes i.e. it passes through the
transmission range of these two nodes. Out of these two nodes, the node near to the sink is called
Bnear and the node far from the sink is called Bfar. The calculation for Bnear, Bfar and the depth
metric W(deep(Hi)) is given as[6]:
Here, Bj represents set of hole boundary nodes, Hi represents the hole, R is the transmission
radius of sensor nodes, d(a,b) gives the distance between a and b.
• These three properties are combined to assign weight to every hole as[6]:
W(Hi) = αW(Θ(Hi)) * βW(len(Hi)) * γW(deep(Hi)) ;
where α, β, γ are positive harmonic coefficients and their value may vary according to the
requirement of the application. These coefficients are defined as: α + β + γ = 1; Hole with
maximum value for weight i.e. W(Hi) will be selected for healing process.
2.6. Comparative Study
The experimental results for Random, Maximum Size, Nearest Distance and Weighted method is
given in fig 8, which shows that weighted method performs better than others in terms of average
delivery hops. Note that in this graph the results are obtained when weighted method is
implemented with equally divided path selection method[6] which will be discussed in section 3
i.e. healing process section. Average Delivery hops is defined as the average number of hops a
message has to go through to reach the sink in a wireless sensor network. A decrease in average
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
6
delivery hops means better connectivity, message will take less time to reach sink and it will also
reduce energy consumption of the network.
Figure 8. Graph for average delivery hops.[6]
The performance of travelling salesman method is evaluated on the basis of coverage rate[4].
Coverage rate means the percentage of area covered when additional nodes are deployed to cover
holes as shown in fig 9. We can see that as we increase the value of additional nodes used for
redeployment, the coverage almost reaches 100%. Here[4], Travelling Salesman method is
implemented with Delaunay’s triangulation method which will be discussed in section 3 i.e.
healing process section.
Figure 9. Graph of increase in coverage rate for Travelling Salesman method implemented with
Delaunay’s triangulation.[4]
The Hole Selection Methods discussed above are compared in table 1 based on their mechanisms
and results.
Table 1. Comparative study for hole selection methods.
Hole Selection
Method
Mechanism Result
Random Hole is selected randomly for healing Does not optimizes results
Maximum Size Hole with maximum size is selected first Improves coverage
Nearest Distance Hole closer to the sink is selected first Improves connectivity
Travelling Salesman
Problem Method
Hole selection is converted into travelling
salesman problem
Covers each and every hole once
within less time.
Weighted Method Hole is selected based on its three
properties i.e. hole angle, distance and
depth.
Improves both connectivity and
coverage.
3. HEALING PROCESS
After hole selection, next step is to carry out the healing process. Healing process should aim to
maximize the coverage as well as maintain the network topology and connectivity. To heal a
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
7
coverage hole, failed nodes are patched or new nodes are redeployed at the location where
coverage is lost. Some healing techniques also aim to maintain the network connectivity by
deploying nodes in such a way that the average delivery hops for the messages travelling in the
network can be reduced. These healing techniques are discussed as follows:
3.1. Voronoi Diagram Based Approach
In wireless sensor networks, voronoi diagram[8][18] is mainly used to detect coverage holes. In
this section we will discuss the healing technique using voronoi diagrams for directional sensor
networks. A voronoi diagram is constructed by the perpendicular bisectors of the line joining
adjacent sensor nodes. These perpendicular bisectors intersect with each other to form a voronoi
cell, see fig 10. The voronoi diagram has some properties:
• One voronoi cell will contain exactly one sensor node.
• Any point inside a voronoi cell will be closer to the sensor node of the given voronoi cell
than any other sensor node in the network, see fig 10, p is a point inside the voronoi cell of sensor
s1 and the distance between p and s1 is shorter than the distance of the point from any other
sensor node.
• For a given set of sensor nodes the voronoi diagram generated will be unique[20].
Figure 10. Voronoi Diagram.[2]
Based on these properties, we can say that, for homogeneous sensor nodes with equal sensing
range, if a point inside a voronoi cell is not covered by the sensor node of the cell than this point
cannot be covered by any other sensor node in the network. Hence, voronoi diagram is also used
to detect coverage holes. In [1][2], the redeployment strategy for homogeneous directional sensor
nodes using voronoi diagram, to improve the coverage ratio is proposed. The sensing model of
directional sensors is shown in fig 11.
Figure 11. Sensing model of directional sensor.[2]
Here, s(xs,ys) is the sensor, Fs(Field of View, FoV) is the area covered by the sensor, α is called
angle of view of the sensor, θ is the working direction of the sensor and it is measured relative to
positive x-axis, r is the sensing radius, ^
w is the unit vector for working direction of the sensor,
p(x,y) is a point covered by the sensor ‘s’. δ is the angle between the vector sp->
and unit vector
^
w.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
8
Based on this sensing model, to cover the point p(x,y), the sensor s(xs,ys) has to satisfy the
following conditions:
• Distance between ‘p’ and ‘s’ should be less than or equals to ‘r’.
i.e. √( (x-xs)2
+ (y-ys)2
) ≤ r; (1)
• The angle ‘δ’ should be less than or equals to half of ‘α’.
i.e. δ ≤ α/2;
Considering: ⃗ݏ ⋅ ^
ݓ = ||.||⃗ݏǁ^
ݓǁ cos ߜ;
⇒ (ݔ−ݔݏ) cosߠ + (ݕ − ݕݏ) sin ߠ ≥ √(ݔ − ݔݏ)2
+ (ݕ − ݕݏ)2
cos (ߙ/2) ; (2)
So far we have discussed the voronoi diagram and the sensing model for directional sensors. Due
to the limited sensing range of the directional sensors and random deployment, the target sensing
field is not fully covered and it leaves coverage holes in the field as shown in fig 12. Now we will
discuss the hole healing techniques to improve the coverage ratio for directional sensors using
voronoi diagram.
Figure 12. Random deployment of sensor nodes with their voronoi cells.[1]
3.1.1. Direction Adjustment
This technique is used for direction rotatable sensors. This means the directional sensors can
rotate 360o
and their working direction θ can be changed. In [1], three algorithms are proposed to
adjust the working direction of the sensors such that the overall coverage ratio of the network is
improved. Initially the sensor nodes are deployed randomly as shown in fig 12, then each node
starts constructing its voronoi cell with the information of its neighbor nodes. After the
construction of voronoi cell the three step algorithm works as follows:
• The sensor nodes calculate the area covered by them within their voronoi cell, when they
are allowed to face each vertex of the voronoi cell as shown in fig 13. The vertex with maximum
coverage area is selected and the working direction of the sensor is rotated towards that vertex.
Figure 13. Result of different vertex selection.[1]
During the calculation of the covered area, cases shown in fig 14 can arise. In fig 14a the covered
area is equal to the field of view of the sensor and can be calculated as:
As = (α/2)r2
; where As is called Intra-Cell Coverage Area.
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
9
Now the intra-cell coverage area for other cases where field of view of the sensor extends through
the cell edges of the voronoi cell as shown in fig 14b,14c,14d, is calculated by dividing this area
into several triangles. The area of these triangles is summed up to get the final result.
Figure 14. Different cases of Intra-Cell Coverage Area.[1]
To calculate the area of different triangles, first the vertices of triangles are determined. The
vertices of triangles include those vertices of voronoi cell which comes inside the range or field of
view of the sensor node i.e. those voronoi cell vertices which satisfies eq1 and eq2. Also it
includes those points where voronoi cell edges intersect with the sector sideline or sector arc of
the field of view of sensor. The equation for the 2 sector sidelines is given as[1]:
(x-xs) cos θ + (y-ys) sin θ = √(x-xs)2
+ (y-ys)2
cos (α/2) ;
where √(x-xs)2
+ (y-ys)2
≤ r ;
The equation for the sector arc is given as[1]:
√(x-xs)2
+ (y-ys)2
= r ;
where x∈ [r cos (θ + α/2) + xs , r cos (θ – α/2) + xs] and y∈ [r cos (θ – α/2) + ys , r cos (θ + α/2) +
ys] ;
The equation for the voronoi cell edge is given as[1]:
x(ya - yb) = y(xa - xb);
√(x - xa)2
+ (y - ya)2
+ √(x - xb)2
+ (y - yb)2
= √(xa - xb)2
+ (ya - yb)2
;
where (xa,ya) and (xb,yb) are two vertices of the voronoi cell edge.
From these equations the intersecting points are obtained. After getting the vertices for triangles,
length of the three sides of each triangle is obtained and area of each triangle is calculated as[1]:
d=(e1 + e2 + e3)/2 ;
Area of triangle = √d(d-e1) (d-e2) (d-e3) ; where e1,e2,e3 are the three sides of the triangle. Now
this area for each triangle is summed up to get the intra-cell coverage area when a given voronoi
cell vertex is selected. The vertex with maximum value of intra-cell coverage area is selected as
the working direction of the sensor. This can be written mathematically as[1]:
Here ev
ij represents the jth
side of the ith
triangle when vertex v of the voronoi cell is selected, kv is
the total number of triangles for the vertex v, Vs is the set of vertices of the given voronoi cell and
vD is the vertex with maximum intra-cell coverage area. The working direction θ is calculated
as[1]:
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
10
• The next step is to avoid coverage overlap, which can happen if multiple neighboring
sensor nodes selects the same common vertex as their working direction as shown in fig 15. Here,
sensor node with smaller intra cell coverage area can change its working direction. The condition
for this is given as[1]:
Here, Ns is the set of neighboring nodes who are adjacent to the voronoi cell of node s, vs
D is the
vertex selected as working direction for s, RvD
s is the coverage area or field of view of s when
vertex v is selected and AvD
s is the intra-cell coverage area of s when vertex v is selected. Now a
new set Us of vertices is defined as[1]:
Us = Vs – {vs
D} ; and to avoid overlap the new vertex selected as working direction for s is given
as[1]:
v’
D = argmaxvϵUs Av
s ;
Figure 15. Change in working direction to avoid common vertex and coverage overlap.[1]
In fig 15, we can see that sensor sj changes its working direction from v1 to v2 but still there is
some overlap. To avoid this a new set of vertices U`
s is defined as[1]:
This set of vertices includes those vertices which have smaller overlap than vD. Here, SvD is the
set of those sensor nodes except s whose working direction is vD and UsiϵSvD RvD
si is the union of
their coverage area or field of view. Now from set U`
s overlapped region is subtracted from intra-
cell coverage area of each vertex and the vertex with maximum value is selected for working
direction as[1]:
Here, Cv
s is the intra cell coverage region. As shown in fig 15 working direction is again turned to
vertex v6 to avoid the coverage overlap. If every vertex of the voronoi cell is selected by different
sensors as working direction, then the vertex with maximum coverage and minimum overlap is
selected as[1]:
Here sv is the other node which has selected vertex v as working direction.
• The third and last step is to avoid nodes from sensing outside the boundary of the field.
Nodes close to the boundary of the field may face towards the boundary which should be avoided.
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
11
If the distance between the boundary of the field and the sensor τ is less than ωr where ω is the
coefficient between 0 to 1 then the working direction of the sensor is controlled between the two
limits θ1 and θ2 as shown in fig 16.
i.e. if τ < ωr; then 0≤θ≤θ1 and θ2≤θ≤2π ;
where θ1 and θ2 is calculated as[1]:
θ1 = [(π-α)/2] + sin-1
(τ/r);
θ2 = [(3π+α)/2] - sin-1
(τ/r);
Hence in fig 16 the choice for the working direction will be vertex vb and vc.
Figure 16. Avoiding coverage outside the boundary.[1]
3.1.2. Sensor Movement with Direction Adjustment
As the name suggest this technique is meant for the directional sensor nodes which have been
provided mobility. The sensor nodes can change their position and choose an optimal location,
from where coverage can be maximized. After getting the right location for movement, the
direction of the sensor can be adjusted. Initially sensor nodes are deployed randomly and they
start constructing their voronoi cell. Then the sensor node selects one of the voronoi cell vertex as
its new location as shown in fig 17.
Figure 17. Result of choosing different vertex as location.[2]
The vertex whose angle is greater than angle of view of the sensor and whose edges are greater
than sensing radius of the sensor is selected as new location for sensor movement. The angle β of
the vertex v is calculated by using the information about its left adjacent vertex vL and right
adjacent vertex vR as shown in fig 18. The coordinates of these adjacent vertices are (xL,yL) and
(xR,xR) respectively and angle β is calculated as[2]:
12. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
12
Figure 18. Calculation of the angle β.[2]
Now a set of vertices T, which contains all those vertices of the cell whose angle β is greater than
or equals to angle of view α and whose edge length is also greater than or equals to sensing radius
r, is defined as[2]:
From this set T, a target vertex t is selected with maximum value for β as[2]:
If the set T is empty, then the target vertex is selected among all those vertices having β greater
than or equals to α and only one edge length greater than or equals to r. If we cannot find any
vertex satisfying these conditions then the vertex with largest value for β is selected.
Once the sensor is moved to the selected vertex, the working direction θ of the sensor is adjusted
within the limits θ1 and θ2 as shown in fig 19.
Figure 19. Calculation of the limits θ1 and θ2.[2]
To decide these limits θL and θR [2] are calculated which are defined as the angle of the vector
vvL
->
and vvR
->
with the positive x-axis respectively. θ1, θ2, θL, θR, [2] all lies between 0 and +-π.
13. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
13
If the sensor is rotated towards the right side edge eR of the vertex v then θ1 will be the working
direction of the sensor and if sensor is rotated towards left side edge eL of the vertex v then θ2 will
be the working direction.
To improve the coverage ratio, sensor will be rotated towards the longest edge as shown in fig 20.
Figure 20. Cases of rotation of sensor.[2]
Let θ0 is the initial working direction of the sensor when it is moved to the vertex v, then the
extent or range φ to which θ0 should be rotated in either clockwise or anticlockwise direction
within the limits θ1 and θ2 is given as[2]:
3.2. Triangular Diagram Based Approach
In this technique every hole is healed by a single sensor node. A new node is deployed in the
region where hole is detected. In this process first the hole is detected then area of that hole is
calculated and thereafter the healing process starts. To heal a hole the area of the hole is required.
Area of the hole is calculated with the help of triangular diagram. This diagram is obtained by
joining the center points of every adjacent sensor node which as a result forms a triangle for every
three adjacent nodes in the network, see fig 21.
Figure 21. Triangular structure.[3]
Depending on the location of adjacent sensor nodes and distance between them several cases may
arise as shown in fig 22. Here, we can see the location of hole and intersection between adjacent
sensor nodes. s1,s2 and s3 is the area of intersection between the sensor’s sensing region and the
triangle.
14. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
14
Figure 22. All cases for three adjacent sensors.[3]
In order to calculate the area of the hole, we have to do some calculations first. Let a,b,c be the
three sides of the triangles shown in different cases in fig 22. Then the area of these triangles
represented by s∆ is calculated as[3]:
s∆ = (1/4) √(a+b+c)(a-b+c)(b-a+c)(c-a+b) ;
and the relationship between region s1, s2 and s3 is given as[3]:
s1+ s2+ s3= (1/2)πR2
; where R is the sensing radius.
Now the area of the intersection of two circles or nodes represented by sintersect is calculated as
shown in fig 23. Here, two circles with different radius R, r and location (0,0), (d,0) respectively
are considered.
Figure 23. Calculation for the area of intersection of two circles.[3]
From fig 23, area of the intersection represented by A is given as[3]:
where A(r,d2) is the area of left portion of the intersection divided by line segment ‘a’ and A(R,
d1) is for the right portion. d1 and d2 is given as[3]:
Now in fig 22 sensor nodes are homogeneous, therefore here r=R and area of hole sh for all these
cases is thus calculated as[3]:
• For fig 22a,22b,22c,22h area is given by[3]:
sh = s∆ – (s1 + s2 + s3) ;
15. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
15
• For fig 22d,22g area is given by[3]:
sh = s∆ – (s1 + s2 + s3) + (1/2)sintersect; and
• For fig 22e area is given by[3]:
• In fig 22f , hole doesn’t exist.
• For fig 22i area is given by[3]:
After calculating area of the hole, healing process starts. Each hole is healed by a single sensor
node. New sensor nodes are deployed in uncovered regions by following two methods:
• If the sensing area of the sensor is greater than area of the hole than circumcircle methods
is used as shown in fig 24. The circumcircle is obtained by the perpendicular bisectors of the
three sides of the triangle. The point where these perpendicular bisectors intersect is called the
circumcircle center of the triangle and this is the point where new nodes is deployed.
Figure 24. Calculation for circumcircle center of the triangle.[3]
• If the sensing area of the sensor is less than the area of the hole than incircle method is
used as shown in fig 25.The incircle is obtained by the angle bisectors of the three angles of
triangle. The point where these three angle bisectors intersect is called incircle center of the
triangle and this is the point where new node is deployed. The incircle is inscribed inside the
triangle and it is tangent to each side of the triangle.
16. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
16
Figure 25. Calculation for incircle center of the triangle.[3]
3.3. Delaunay’s Triangulation
Delaunay’s Triangulation[8][18][19] is a geometrical structure which is formed by a given set of
points. It is a triangulation method in which triangles are formed in such a way that circumcircle
of each triangle will not contain any other point of the given set. This means the vertices of the
triangle will lie on the circumference of the circle and the circle will be empty inside. In fig 26(a),
the triangulation formed is Delaunay’s triangulation because each circumcicle is empty and 26(b)
is not Delaunay’s triangulation because each cicumcircle encloses a point inside it. Also the
minimum angle of a triangle formed by Delaunay’s Triangulation is maximum for other
triangulations for the same set of points.
Figure 26. Triangulation for a given set of four points. The minimum angle α shown in (a) is greater than
the minimum angle shown in (b).[8]
In[4], an algorithm is proposed to heal coverage holes using Delaunay’s triangulation as shown in
fig 27. Holes with irregular shapes and boundaries are analyzed and the point where the irregular
curve turns is considered as a vertex. All these vertices together form a closed polygon and then
the Delaunay’s triangulation is performed over the polygon vertices. The radius for the
circumcircle of the triangles formed is calculated and new node is deployed at the center of the
circumcircle whose radius is maximum.
Figure 27. Delaunay Triangulation of holes.[4]
2.4. Equally Divided Path Selection Method
This method says that new nodes should be patched along the angle bisector of the hole angle
discussed in section 2.5 for healing the hole. This path is the shortest path for data to travel to the
sink. To prove this, a hole Hi is considered inside a parallelogram TUVW as shown in fig 28. A
and B are two nodes equidistant and symmetrical from the sink. Let q is a point on AB and p is a
point on TU such that Aq=x, Bq=y, Ap=a, Bp=b and the distance between line AB and p i.e.
qp=h. Now using the property of a right angled triangle[6]:
a2
= h2
+ x2
;
b2
= h2
+ y2
;
17. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
17
Let a function f(x) = a+b; and AB=x+y=L;
=> f(x) = √ h2
+ x2
+ √ h2
+ (L-x)2
;
First and Second order derivative of f(x) is given as[6]:
Now by using maximum value theorem, the minimum value of x for the function f(x) comes out
to be L/2. This means minimum value for a+b will be obtained when x and y are equal i.e. q lies
in the center and passes through the angle bisector. Hence, the shortest path to reach sink through
the hole will be along the angle bisector. New nodes will be patched along this path.
Figure 28. Calculation for shortest path along the angle bisector.[6]
3.5. Comparative Study
The experimental results for direction adjustment and sensor movement with direction adjustment
is given in fig 29 and fig 30. The results shows that out of these two voronoi diagram based
healing techniques, sensor movement with direction adjustment is better. The results are obtained
for sensor nodes with angle of view α=120o
and sensing radius=50metres and field
size=500m*500m. This shows that providing sensor nodes with moving capabilities helps in
improving overall coverage of the network.
Figure 29. IDA represents Direction Adjustment.[1]
18. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
18
Figure 30. DVSA represents Sensor Movement with Direction Adjustment.[2]
The graph for Delaunay’s triangulation and equally divided path selection method is discussed
earlier in section 2.6. with fig 9 and fig 8, where they are implemented along with travelling
salesman method and weighted method. The equally divided path selection method is evaluated
in terms of average delivery hops whereas other methods are evaluated based on coverage ratio.
This is because equally divided path selection method focus on improving connectivity by
providing shorter routes to the active nodes in the network. A comparative study of these methods
is given in table 2.
Table 2. Comparative study for healing process methods.
Healing Process Method Mechanism Utility Type of Sensor
Network
Voronoi
Diagram
Based
Approach
Direction
Adjustment
Voronoi cell vertex is selected
as working direction of the
sensor.
Can be used
for both hole
detection and
Healing
Directional
Sensor Network
Sensor
Movement with
Direction
Adjustment
Voronoi cell vertex is selected
as the new location for the
sensor.
Triangular Diagram Based
Approach
New node is deployed either on
circumcircle center or incircle
center of the triangle, based on
the size of the hole.
Hole
Detection and
Healing
Omni-
Directional
Delaunay’s Triangulation
Method
Hole is divided into triangles
and new node is deployed on
circumcircle center of the
largest triangle.
Hole Healing Omni-
Directional
Equally divided path selection
Method
New nodes are deployed along
the angle bisector of the hole
angle.
Hole Healing Omni-
Directional
4. CONCLUSION
In this study, we discussed about various coverage problems and hole healing strategies in WSN.
It can be noticed that with the heterogeneity in sensor nodes we get different type of coverage
problems and hence will need different strategies to overcome these problems e.g. in mobile
sensor networks, coverage is improved by moving the sensors to appropriate locations, in
directional sensor networks, coverage is improved by adjusting the sensing directions of these
sensors, and in static sensor networks, we can patch failed nodes or can use redeployment
methods. The coverage holes can be healed in a random order or a proper sequence can be
followed. This sequence can be obtained by converting the problem into travelling salesman
problem, covering each hole once and returning back to the initial hole[4]. Priority healing is
another option where holes can be assigned a priority value based on some properties of the
hole[6]. All these techniques have their own advantages and disadvantages. Some algorithms are
centralized while others are distributed. The centralized algorithms results in optimal routes while
poses communication overhead. The distributed algorithms may not result in optimal routes but
19. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
19
they are energy efficient and can be used for scalable networks. Random healing result in
increasing the coverage ratio only while priority healing not only increases coverage but it can
also reduce energy consumption of the network during the healing process. Keeping in mind all
these factors we can choose an appropriate healing method suitable for our application.
REFERENCES
[1] T.-W. Sung and C.-S. Yang, (2013) “Voronoi-based coverage improvement approach for wireless
directional sensor networks”, Journal of Network and Computer Applications.
[2] T.-W. Sung and C.-S. Yang, (2013) “Distributed voronoi-based self-redeployment for coverage
enhancement in a mobile directional sensor network,” International Journal of Distributed Sensor
Networks, Article ID 165498, 15 pages.
[3] S. Babaie and S. S. Pirahesh, (2012) “Hole detection for increasing coverage in wireless sensor
network using triangular structure,” IJCSI International Journal of Computer Science Issues, vol. 9,
no.1, article 2.
[4] P. Si, C. Wu, Y. Zhang, Z. Xia, and L. Cheng, (2011) “A hole detection and redeployment strategy in
wireless sensor network,” Journal of Information and Computational Science, vol. 8, no. 13, pp.2577–
2585.
[5] C. Zhang, Y. Zhang, and Y. Fang, (2010) “A coverage inference protocol for wireless sensor
networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 6, pp. 850–864.
[6] Fu-Tian Lin, Tien-Wen Sung, and Chu-Sing Yang, (2013) “A Coverage Hole Healing Strategy with
Awareness of Data Delivery Time in Wireless Sensor Networks,” International Journal of Distributed
Sensor Networks, Volume 2013, Article ID 790794, 11 pages.
[7] Waltenegus Dargie and Christian Poellabauer (2010) Fundamentals of Wireless Sensor Networks,
Theory and Practice; A John Wiley and Sons, Ltd., Publication.
[8] F. Aurenhammer, (1991) “Voronoi diagrams—a survey of a fundamental geometric data structure,”
ACM Computing Surveys, vol. 23, no. 3, pp. 345–405.
[9] Junbin LIANG, Ming LIU and Xiaoyan KUI, (2014) “A Survey of Coverage Problems in Wireless
Sensor Networks,” Sensors & Transducers, Vol. 163 , Issue 1, pp. 240-246.
[10] J. Yick, B. Mukherjee and D.Ghosal, (2008) “Wireless sensor network survey,” Computer Networks,
vol. 52, no. 12, pp. 2292–2330.
[11] F. Ye, G. Zhong, S. Lu and L. Zhang, (2002) “PEAS, a robust energy conserving protocol for long
lived sensor networks,” in Proceedings of 10th IEEE International Conference on Network Protocols
(ICNP’02), Paris, France, pp. 200-201.
[12] D. Tian and N. D. Georganas, (2003) “A node scheduling scheme for energy conservation in large
wireless sensor networks,” Wireless Communications and Mobile Computing, Vol. 3, Issue 2, pp.
271-290.
[13] J. Wu and S. Yang, (2004) “Coverage issue in sensor networks with adjustable ranges,” in
Proceedings of International Workshop on Mobile and Wireless Networking (MWN’04) in
conjunction with International Conference on Parallel Processing Workshops (ICPPW'04), Montreal,
Quebec, Canada, pp. 61-68.
[14] M. Cardei, M. Thai, Y. Li, and W. Wu, (2005) “Energy efficient target coverage in wireless sensor
networks,” in Proceedings of the 24th Conference of the IEEE Communications Society
(INFOCOM’05), pp. 1976-1984.
20. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.7, No.1, February 2016
20
[15] Hang Ding Xing, Zhang Bo Yun and Tang Wen Shen, (2009) “Distributed connected algorithm for
wireless sensor networks,” Computer Engineering and Application, Vol. 45, Issue 7, pp. 17-19.
[16] I. Vasilescu, K. Kotay, D. Rus, M. Dunbabin and P. Corke, (2005) “Data collection, storage, retrieval
with an underwater sensor network,” in: Proceedings of the Third International Conference on
Embedded Networked Sensor Systems (Sensys), SanDiego, CA.
[17] Smita Karmakar and Alak Roy, (2014) “Holes Detection in Wireless Sensor Networks: A Survey,”
I.J. Modern Education and Computer Science, 4, 24-30
[18] D. Du, F. Hwang, S. Fortune, (1992) “Voronoi diagrams and Delaunay triangulations,” Euclidean
Geometry and Computers.
[19] ChunHsien Wu, KuoChuan Lee, YehChing Chung, (2006) “A Delaunay Triangulation Based Method
for Wireless Sensor Network Depoyment,” In Proceedings of the 12th International Conference on
Parallel and Distributed Systems, pp. 1521-1530
[20] A. Okabe, B. Boots, and K. Sugihara, (2000) Spatial Tessellations, Concepts and Applications of
Voronoi Diagrams, John Wiley & Sons, 2nd edition.
AUTHORS
Latesh Mehta is pursuing his Master degree in Computer Science Engineering from
Chitkara University, Himachal Pradesh, India. He is enrolled in Integrated Bachelor +
Master Degree course in Computer Science Engineering from Chitkara University,
Himachal Pradesh, India. His main research area includes, Wireless Sensor Network.
Manik Gupta is Assistant Professor in the Department of Computer Science at Chitkara
University, Himachal Pradesh, India. He has a good number of publications in the field of
wireless sensor networks in various international conferences and journals of good repute.
He had been awarded for Best Research Paper, in December, 2010. He also worked as
Software Developer for one year after completing his Bachelors in Engineering and as
Consultant in LSI, Research and Development. He also remained a regular columnist of
column “Manik’s Tech Tonics” in the newspaper- “Student Age”. His research area is Security, Energy
Efficiency, Fault Tolerance, Fault Revoking, Coverage, Connectivity and Mobility in Wireless Sensor
Networks and Body Area Sensor Networks.